From 98403fbfa758841a55b18d223cab884316ee9bb0 Mon Sep 17 00:00:00 2001 From: david grossman Date: Tue, 10 Mar 2026 09:42:40 -0400 Subject: [PATCH 1/6] task: v3+v4 (from file for now) --- scripts/generate.sh | 9 +++++---- tests/backup.py | 11 +++++------ tests/backup_aio.py | 17 ++++++++--------- tests/cpe.py | 2 +- tests/cpe_aio.py | 2 +- tests/index.py | 2 +- tests/index_aio.py | 2 +- tests/indicies.py | 2 +- tests/indicies_aio.py | 2 +- tests/integration_aio.py | 2 +- tests/integration_test.py | 6 +++--- tests/pagination.py | 2 +- tests/pagination_aio.py | 2 +- tests/purl.py | 2 +- tests/purl_aio.py | 2 +- tests/quickstart.py | 11 +++++------ tests/quickstart_aio.py | 2 +- tests/readme_examples_test.py | 5 ++++- 18 files changed, 42 insertions(+), 41 deletions(-) diff --git a/scripts/generate.sh b/scripts/generate.sh index f0329164..3bd14f27 100755 --- a/scripts/generate.sh +++ b/scripts/generate.sh @@ -24,10 +24,11 @@ clean() { } get_openapi_spec() { - curl --request GET \ - --url https://api.vulncheck.com/v3/openapi \ - --verbose \ - --header "Accept: application/json" >$OPENAPI_JSON + # curl --request GET \ + # --url https://api.vulncheck.com/v3/openapi \ + # --verbose \ + # --header "Accept: application/json" >$OPENAPI_JSON + cat /Users/dgrossman/v3_combined.json >$OPENAPI_JSON } bump_patch() { diff --git a/tests/backup.py b/tests/backup.py index bc10dbb5..6f1306dc 100644 --- a/tests/backup.py +++ b/tests/backup.py @@ -1,4 +1,4 @@ -import requests +import urllib.request import vulncheck_sdk import os @@ -6,7 +6,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -16,8 +16,7 @@ api_response = endpoints_client.backup_index_get(index) - backup_url = requests.get(api_response.data[0].url) - file_path = f"{index}.zip" - with open(file_path, "wb") as file: - file.write(backup_url.content) + with urllib.request.urlopen(api_response.data[0].url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) diff --git a/tests/backup_aio.py b/tests/backup_aio.py index 6e43dcfc..9b42ffad 100644 --- a/tests/backup_aio.py +++ b/tests/backup_aio.py @@ -1,6 +1,6 @@ import asyncio import os -import requests +import urllib.request import vulncheck_sdk.aio as vcaio # Configuration @@ -8,19 +8,18 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN def download_sync(url, file_path): """ - Standard synchronous download using requests. + Standard synchronous download using urllib.request. This runs in a separate thread to avoid blocking the event loop. """ - response = requests.get(url) - response.raise_for_status() - with open(file_path, "wb") as file: - file.write(response.content) + with urllib.request.urlopen(url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) async def main(): @@ -39,9 +38,9 @@ async def main(): download_url = api_response.data[0].url file_path = f"{index}.zip" - print(f"Downloading {index} via requests (offloaded to thread)...") + print(f"Downloading {index} via urllib (offloaded to thread)...") - # Use asyncio.to_thread to run the blocking requests call safely + # Use asyncio.to_thread to run the blocking call safely # 'await' the coroutine to get the actual response data await asyncio.to_thread(download_sync, download_url, file_path) diff --git a/tests/cpe.py b/tests/cpe.py index 206f0c78..153560c1 100644 --- a/tests/cpe.py +++ b/tests/cpe.py @@ -5,7 +5,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/cpe_aio.py b/tests/cpe_aio.py index 8230da86..cf404ce1 100644 --- a/tests/cpe_aio.py +++ b/tests/cpe_aio.py @@ -7,7 +7,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/index.py b/tests/index.py index 46602fc0..fda8b293 100644 --- a/tests/index.py +++ b/tests/index.py @@ -5,7 +5,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/index_aio.py b/tests/index_aio.py index 3970ec0c..8ea4aecf 100644 --- a/tests/index_aio.py +++ b/tests/index_aio.py @@ -7,7 +7,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/indicies.py b/tests/indicies.py index 85e29e7e..5396bb5b 100644 --- a/tests/indicies.py +++ b/tests/indicies.py @@ -5,7 +5,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/indicies_aio.py b/tests/indicies_aio.py index de688767..d84b5864 100644 --- a/tests/indicies_aio.py +++ b/tests/indicies_aio.py @@ -7,7 +7,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/integration_aio.py b/tests/integration_aio.py index a1092b91..98cee9bd 100644 --- a/tests/integration_aio.py +++ b/tests/integration_aio.py @@ -118,7 +118,7 @@ async def main(): if not API_TOKEN: print("Warning: VULNCHECK_API_TOKEN is not set.") - config = vcaio.Configuration(host=DEFAULT_API) + config = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) config.api_key["Bearer"] = API_TOKEN # The 'async with' ensures the ClientSession is closed diff --git a/tests/integration_test.py b/tests/integration_test.py index 0ed4efb4..9296d779 100644 --- a/tests/integration_test.py +++ b/tests/integration_test.py @@ -123,11 +123,11 @@ def _get_http_status(func, params=None, limit=None, page=None) -> int: return 401 except ApiException as e: print(f"ApiException when calling {func}: {e}\n") - return api_response.status_code + return e.status def _get_api_instance(token: str = "") -> EndpointsApi: - config = vulncheck_sdk.Configuration(host=DEFAULT_API) + config = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) if token != "": config.api_key["Bearer"] = token client = vulncheck_sdk.ApiClient(config) @@ -135,7 +135,7 @@ def _get_api_instance(token: str = "") -> EndpointsApi: def _get_indices_instance(token: str = "") -> IndicesApi: - config = vulncheck_sdk.Configuration(host=DEFAULT_API) + config = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) if token != "": config.api_key["Bearer"] = token client = vulncheck_sdk.ApiClient(config) diff --git a/tests/pagination.py b/tests/pagination.py index be1bc83a..9ca75635 100644 --- a/tests/pagination.py +++ b/tests/pagination.py @@ -5,7 +5,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/pagination_aio.py b/tests/pagination_aio.py index f48a3ffa..ead989f0 100644 --- a/tests/pagination_aio.py +++ b/tests/pagination_aio.py @@ -7,7 +7,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/purl.py b/tests/purl.py index 800a7261..8de5ea43 100644 --- a/tests/purl.py +++ b/tests/purl.py @@ -8,7 +8,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/purl_aio.py b/tests/purl_aio.py index 745b547d..3fb09262 100644 --- a/tests/purl_aio.py +++ b/tests/purl_aio.py @@ -10,7 +10,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/quickstart.py b/tests/quickstart.py index 745abb94..d3c564a6 100644 --- a/tests/quickstart.py +++ b/tests/quickstart.py @@ -1,6 +1,6 @@ +import urllib.request import vulncheck_sdk import os -import requests # First let's setup a few variables to help us DEFAULT_HOST = "https://api.vulncheck.com" @@ -8,7 +8,7 @@ TOKEN = os.environ["VULNCHECK_API_TOKEN"] # Remember to store your token securely! # Now let's create a configuration object -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN # Pass that config object to our API client and now... @@ -33,11 +33,10 @@ # Download a Backup index = "initial-access" api_response = endpoints_client.backup_index_get(index) - backup_url = requests.get(api_response.data[0].url) - file_path = f"{index}.zip" - with open(file_path, "wb") as file: - file.write(backup_url.content) + with urllib.request.urlopen(api_response.data[0].url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) ### IndicesApi has methods for each index indices_client = vulncheck_sdk.IndicesApi(api_client) diff --git a/tests/quickstart_aio.py b/tests/quickstart_aio.py index 92463519..4969c8db 100644 --- a/tests/quickstart_aio.py +++ b/tests/quickstart_aio.py @@ -8,7 +8,7 @@ DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) configuration.api_key["Bearer"] = TOKEN diff --git a/tests/readme_examples_test.py b/tests/readme_examples_test.py index a77a3445..3bdf2c76 100644 --- a/tests/readme_examples_test.py +++ b/tests/readme_examples_test.py @@ -46,9 +46,12 @@ def test_external_program(program_file): # Execute the program # capture_output=True allows us to see stdout/stderr if the test fails + env = os.environ.copy() + project_root = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) + env["PYTHONPATH"] = project_root + (os.pathsep + env["PYTHONPATH"] if "PYTHONPATH" in env else "") result = subprocess.run( [sys.executable, program_file], - env=os.environ.copy(), + env=env, capture_output=True, text=True, ) From fa3ac3c31f69d221c5b1af732c9f88552c330986 Mon Sep 17 00:00:00 2001 From: david grossman Date: Tue, 10 Mar 2026 12:09:13 -0400 Subject: [PATCH 2/6] chore: get combined openapi spec from api --- scripts/generate.sh | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/scripts/generate.sh b/scripts/generate.sh index 3bd14f27..879656b3 100755 --- a/scripts/generate.sh +++ b/scripts/generate.sh @@ -24,11 +24,11 @@ clean() { } get_openapi_spec() { - # curl --request GET \ - # --url https://api.vulncheck.com/v3/openapi \ - # --verbose \ - # --header "Accept: application/json" >$OPENAPI_JSON - cat /Users/dgrossman/v3_combined.json >$OPENAPI_JSON + # use the combined output + curl --silent --fail \ + --url https://api.vulncheck.com/openapi/combined \ + --header "Accept: application/json" \ + >"$OPENAPI_JSON" } bump_patch() { From 9b39e80a5e996531d38b4bdbbb928fe798f9586c Mon Sep 17 00:00:00 2001 From: david grossman Date: Tue, 10 Mar 2026 14:17:42 -0400 Subject: [PATCH 3/6] task: redo tests after updating openapi gen to include url --- tests/backup.py | 4 +--- tests/backup_aio.py | 4 +--- tests/cpe.py | 4 +--- tests/cpe_aio.py | 4 +--- tests/index.py | 4 +--- tests/index_aio.py | 4 +--- tests/indicies.py | 4 +--- tests/indicies_aio.py | 4 +--- tests/integration_aio.py | 4 +--- tests/integration_test.py | 6 ++---- tests/pagination.py | 4 +--- tests/pagination_aio.py | 4 +--- tests/purl.py | 4 +--- tests/purl_aio.py | 4 +--- tests/quickstart.py | 4 +--- tests/quickstart_aio.py | 4 +--- tests/readme_examples_test.py | 2 -- 17 files changed, 17 insertions(+), 51 deletions(-) diff --git a/tests/backup.py b/tests/backup.py index 6f1306dc..36c5d23e 100644 --- a/tests/backup.py +++ b/tests/backup.py @@ -2,11 +2,9 @@ import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/backup_aio.py b/tests/backup_aio.py index 9b42ffad..cedabd70 100644 --- a/tests/backup_aio.py +++ b/tests/backup_aio.py @@ -4,11 +4,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/cpe.py b/tests/cpe.py index 153560c1..84a01f2d 100644 --- a/tests/cpe.py +++ b/tests/cpe.py @@ -1,11 +1,9 @@ import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/cpe_aio.py b/tests/cpe_aio.py index cf404ce1..17fbca8f 100644 --- a/tests/cpe_aio.py +++ b/tests/cpe_aio.py @@ -3,11 +3,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/index.py b/tests/index.py index fda8b293..8134a0c1 100644 --- a/tests/index.py +++ b/tests/index.py @@ -1,11 +1,9 @@ import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/index_aio.py b/tests/index_aio.py index 8ea4aecf..654d43e9 100644 --- a/tests/index_aio.py +++ b/tests/index_aio.py @@ -3,11 +3,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/indicies.py b/tests/indicies.py index 5396bb5b..0241e8a1 100644 --- a/tests/indicies.py +++ b/tests/indicies.py @@ -1,11 +1,9 @@ import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/indicies_aio.py b/tests/indicies_aio.py index d84b5864..88a45661 100644 --- a/tests/indicies_aio.py +++ b/tests/indicies_aio.py @@ -3,11 +3,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/integration_aio.py b/tests/integration_aio.py index 98cee9bd..f7dfcd94 100644 --- a/tests/integration_aio.py +++ b/tests/integration_aio.py @@ -5,8 +5,6 @@ from vulncheck_sdk.aio.api.indices_api import IndicesApi from vulncheck_sdk.aio.exceptions import ApiException, UnauthorizedException -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" API_TOKEN = os.environ.get("VULNCHECK_API_TOKEN", "") # --- Helpers --- @@ -118,7 +116,7 @@ async def main(): if not API_TOKEN: print("Warning: VULNCHECK_API_TOKEN is not set.") - config = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) + config = vcaio.Configuration() config.api_key["Bearer"] = API_TOKEN # The 'async with' ensures the ClientSession is closed diff --git a/tests/integration_test.py b/tests/integration_test.py index 9296d779..77bbbb31 100644 --- a/tests/integration_test.py +++ b/tests/integration_test.py @@ -5,8 +5,6 @@ from vulncheck_sdk.api_response import ApiResponse from vulncheck_sdk.exceptions import ApiException, UnauthorizedException -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" API_TOKEN = os.environ["VULNCHECK_API_TOKEN"] """ @@ -127,7 +125,7 @@ def _get_http_status(func, params=None, limit=None, page=None) -> int: def _get_api_instance(token: str = "") -> EndpointsApi: - config = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) + config = vulncheck_sdk.Configuration() if token != "": config.api_key["Bearer"] = token client = vulncheck_sdk.ApiClient(config) @@ -135,7 +133,7 @@ def _get_api_instance(token: str = "") -> EndpointsApi: def _get_indices_instance(token: str = "") -> IndicesApi: - config = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) + config = vulncheck_sdk.Configuration() if token != "": config.api_key["Bearer"] = token client = vulncheck_sdk.ApiClient(config) diff --git a/tests/pagination.py b/tests/pagination.py index 9ca75635..4c125d01 100644 --- a/tests/pagination.py +++ b/tests/pagination.py @@ -1,11 +1,9 @@ import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/pagination_aio.py b/tests/pagination_aio.py index ead989f0..4adabce9 100644 --- a/tests/pagination_aio.py +++ b/tests/pagination_aio.py @@ -3,11 +3,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/purl.py b/tests/purl.py index 8de5ea43..b42e8dac 100644 --- a/tests/purl.py +++ b/tests/purl.py @@ -4,11 +4,9 @@ ) import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: diff --git a/tests/purl_aio.py b/tests/purl_aio.py index 3fb09262..d39586f0 100644 --- a/tests/purl_aio.py +++ b/tests/purl_aio.py @@ -6,11 +6,9 @@ ) # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/quickstart.py b/tests/quickstart.py index d3c564a6..0e832c28 100644 --- a/tests/quickstart.py +++ b/tests/quickstart.py @@ -3,12 +3,10 @@ import os # First let's setup a few variables to help us -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] # Remember to store your token securely! # Now let's create a configuration object -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN # Pass that config object to our API client and now... diff --git a/tests/quickstart_aio.py b/tests/quickstart_aio.py index 4969c8db..1676f97e 100644 --- a/tests/quickstart_aio.py +++ b/tests/quickstart_aio.py @@ -4,11 +4,9 @@ import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API, ignore_operation_servers=True) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/tests/readme_examples_test.py b/tests/readme_examples_test.py index 3bdf2c76..068d6a62 100644 --- a/tests/readme_examples_test.py +++ b/tests/readme_examples_test.py @@ -8,8 +8,6 @@ from vulncheck_sdk.api_response import ApiResponse from vulncheck_sdk.exceptions import ApiException, UnauthorizedException -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" API_TOKEN = os.environ["VULNCHECK_API_TOKEN"] From ffede04bd5b22721c6a072eb36afd3662afd0ab6 Mon Sep 17 00:00:00 2001 From: david grossman Date: Mon, 16 Mar 2026 12:41:20 -0400 Subject: [PATCH 4/6] bug: fix var_date --- scripts/generate.sh | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/scripts/generate.sh b/scripts/generate.sh index 879656b3..179b017c 100755 --- a/scripts/generate.sh +++ b/scripts/generate.sh @@ -24,7 +24,7 @@ clean() { } get_openapi_spec() { - # use the combined output + use the combined output curl --silent --fail \ --url https://api.vulncheck.com/openapi/combined \ --header "Accept: application/json" \ @@ -219,6 +219,12 @@ post_build_cleanup() { rm -rf vulncheck_sdk/aio/.openapi-generator-ignore vulncheck_sdk/aio/.travis.yml vulncheck_sdk/aio/README.md vulncheck_sdk/aio/git_push.sh rm -rf vulncheck_sdk/aio/tox.ini vulncheck_sdk/aio/test-requirements.txt rm -rf vulncheck_sdk/aio/vulncheck_sdk tox.ini + + # Rename var_date -> date in generated Python files. + # The openapi-generator prefixes 'date' with 'var_' because it conflicts with + # the Python datetime.date builtin. The wire format remains 'date' unchanged. + echo "--- renaming var_date -> date in generated files ---" + find vulncheck_sdk -name "*.py" | xargs sed "${SED_FLAGS[@]}" 's/var_date/date/g' } check_git_status() { From 1bf41e9d503dc9f43301b65b50295d83de624436 Mon Sep 17 00:00:00 2001 From: david grossman Date: Wed, 18 Mar 2026 10:47:32 -0400 Subject: [PATCH 5/6] bug: missed a # for a comment --- scripts/generate.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/generate.sh b/scripts/generate.sh index 179b017c..9982a9ec 100755 --- a/scripts/generate.sh +++ b/scripts/generate.sh @@ -24,7 +24,7 @@ clean() { } get_openapi_spec() { - use the combined output + #use the combined output curl --silent --fail \ --url https://api.vulncheck.com/openapi/combined \ --header "Accept: application/json" \ From 5d633eb98e9537fca68e5296970bef60f522221f Mon Sep 17 00:00:00 2001 From: "vulncheck-oss-release-bot[bot]" <187049212+vulncheck-oss-release-bot[bot]@users.noreply.github.com> Date: Thu, 19 Mar 2026 13:29:54 -0400 Subject: [PATCH 6/6] Update Python SDK (#145) [bot](2026-03-19 13:44:01) Sync SDK with OpenAPI spec Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> --- README.md | 89 +- docs/AdvisoryA10.md | 1 + docs/AdvisoryABBAdvisory.md | 1 + docs/AdvisoryADP.md | 1 + docs/AdvisoryADPContainer.md | 3 +- docs/AdvisoryAIX.md | 1 + docs/AdvisoryAMD.md | 1 + docs/AdvisoryAMI.md | 1 + docs/AdvisoryASRG.md | 1 + docs/AdvisoryAVEVAAdvisory.md | 1 + docs/AdvisoryAVIDMLAdvs.md | 1 + docs/AdvisoryAWS.md | 1 + docs/AdvisoryAbbott.md | 1 + docs/AdvisoryAbsolute.md | 1 + docs/AdvisoryAcknowledgement.md | 1 + docs/AdvisoryAcronis.md | 1 + docs/AdvisoryAdobeAdvisory.md | 1 + docs/AdvisoryAdobeAffected.md | 1 + docs/AdvisoryAdobeCVE.md | 1 + docs/AdvisoryAdobeSolution.md | 1 + docs/AdvisoryAdvantech.md | 1 + docs/AdvisoryAdvisory.md | 1 + docs/AdvisoryAdvisoryDetails.md | 5 +- docs/AdvisoryAdvisoryRecord.md | 1 + docs/AdvisoryAffected.md | 5 +- docs/AdvisoryAffectedChrome.md | 1 + docs/AdvisoryAffectedDebianPackage.md | 1 + docs/AdvisoryAffectedDebianRelease.md | 1 + docs/AdvisoryAffectedDebianRepository.md | 1 + docs/AdvisoryAffectedFile.md | 1 + docs/AdvisoryAffectedProduct.md | 1 + docs/AdvisoryAffectedRel.md | 1 + docs/AdvisoryAffectedUbuntuPackage.md | 1 + docs/AdvisoryAlephResearch.md | 1 + docs/AdvisoryAlibaba.md | 1 + docs/AdvisoryAlmaDate.md | 1 + docs/AdvisoryAlmaLinuxUpdate.md | 1 + docs/AdvisoryAlmaObjectID.md | 1 + docs/AdvisoryAlmaPackage.md | 1 + docs/AdvisoryAlmaPackageList.md | 1 + docs/AdvisoryAlmaReference.md | 1 + docs/AdvisoryAlpineLinuxSecDB.md | 1 + docs/AdvisoryAlpineLinuxSecDBPackage.md | 1 + docs/AdvisoryAlpineLinuxSecurityFix.md | 1 + docs/AdvisoryAmazonAffectedPackage.md | 1 + docs/AdvisoryAmazonCVE.md | 1 + docs/AdvisoryAnchoreNVDOverride.md | 1 + docs/AdvisoryAndroidAdvisory.md | 1 + docs/AdvisoryAndroidAffected.md | 1 + docs/AdvisoryAndroidEvent.md | 1 + docs/AdvisoryAndroidPackage.md | 1 + docs/AdvisoryAndroidRange.md | 1 + docs/AdvisoryAndroidReference.md | 1 + docs/AdvisoryApacheActiveMQ.md | 1 + docs/AdvisoryApacheArchiva.md | 1 + docs/AdvisoryApacheArrow.md | 1 + docs/AdvisoryApacheCamel.md | 1 + docs/AdvisoryApacheCommons.md | 1 + docs/AdvisoryApacheCouchDB.md | 1 + docs/AdvisoryApacheFlink.md | 1 + docs/AdvisoryApacheGuacamole.md | 1 + docs/AdvisoryApacheHTTP.md | 1 + docs/AdvisoryApacheHadoop.md | 1 + docs/AdvisoryApacheJSPWiki.md | 1 + docs/AdvisoryApacheKafka.md | 1 + docs/AdvisoryApacheLoggingServices.md | 1 + docs/AdvisoryApacheNiFi.md | 1 + docs/AdvisoryApacheOFBiz.md | 1 + docs/AdvisoryApacheOpenMeetings.md | 1 + docs/AdvisoryApacheOpenOffice.md | 1 + docs/AdvisoryApachePulsar.md | 1 + docs/AdvisoryApacheShiro.md | 1 + docs/AdvisoryApacheSpark.md | 1 + docs/AdvisoryApacheStruts.md | 1 + docs/AdvisoryApacheSubversion.md | 1 + docs/AdvisoryApacheSuperset.md | 1 + docs/AdvisoryApacheTomcat.md | 1 + docs/AdvisoryApacheZooKeeper.md | 1 + docs/AdvisoryApi.md | 206 + docs/AdvisoryAppCheck.md | 1 + docs/AdvisoryAppgate.md | 1 + docs/AdvisoryAppleAdvisory.md | 1 + docs/AdvisoryAppleComponent.md | 1 + docs/AdvisoryArchIssue.md | 1 + docs/AdvisoryArista.md | 1 + docs/AdvisoryAruba.md | 1 + docs/AdvisoryAssetNote.md | 1 + docs/AdvisoryAsterisk.md | 1 + docs/AdvisoryAstra.md | 1 + docs/AdvisoryAsus.md | 1 + docs/AdvisoryAtlassianAdvisory.md | 1 + docs/AdvisoryAtlassianProducts.md | 1 + docs/AdvisoryAtlassianVuln.md | 1 + docs/AdvisoryAtredis.md | 1 + docs/AdvisoryAudiocodes.md | 1 + docs/AdvisoryAusCert.md | 1 + docs/AdvisoryAutodesk.md | 1 + docs/AdvisoryAvaya.md | 1 + docs/AdvisoryAvigilon.md | 1 + docs/AdvisoryAward.md | 1 + docs/AdvisoryAxis.md | 1 + docs/AdvisoryAzul.md | 1 + docs/AdvisoryBBraunAdvisory.md | 1 + docs/AdvisoryBDUAdvisory.md | 1 + docs/AdvisoryBDUCvss.md | 1 + docs/AdvisoryBDUCvss3.md | 1 + docs/AdvisoryBDUEnvironment.md | 1 + docs/AdvisoryBDUOs.md | 1 + docs/AdvisoryBDUSoft.md | 1 + docs/AdvisoryBDUTypes.md | 1 + docs/AdvisoryBDUVector.md | 1 + docs/AdvisoryBDUVulnerableSoftware.md | 1 + docs/AdvisoryBLS.md | 1 + docs/AdvisoryBandr.md | 1 + docs/AdvisoryBaxterAdvisory.md | 1 + docs/AdvisoryBeckhoffAdvisory.md | 1 + docs/AdvisoryBeckmanCoulter.md | 1 + docs/AdvisoryBectonDickinsonAdvisory.md | 1 + docs/AdvisoryBeldenAdvisory.md | 1 + docs/AdvisoryBeyondTrust.md | 1 + docs/AdvisoryBinarly.md | 1 + docs/AdvisoryBitDefender.md | 1 + docs/AdvisoryBlackBerry.md | 1 + docs/AdvisoryBoschAdvisory.md | 1 + docs/AdvisoryBostonScientificAdvisory.md | 1 + docs/AdvisoryBotnet.md | 1 + docs/AdvisoryBugzilla.md | 1 + docs/AdvisoryCACyberCentreAdvisory.md | 1 + docs/AdvisoryCBLMariner.md | 1 + docs/AdvisoryCERTEUAdvisory.md | 1 + docs/AdvisoryCESA.md | 1 + docs/AdvisoryCISAAlert.md | 1 + docs/AdvisoryCISControl.md | 1 + docs/AdvisoryCNNVDEntryJSON.md | 1 + docs/AdvisoryCNVDBulletin.md | 1 + docs/AdvisoryCNVDFlaw.md | 1 + docs/AdvisoryCOSUpdate.md | 1 + docs/AdvisoryCPEMatch.md | 1 + docs/AdvisoryCPENode.md | 1 + docs/AdvisoryCSAF.md | 5 +- docs/AdvisoryCSAFNote.md | 1 + docs/AdvisoryCSAFReference.md | 1 + docs/AdvisoryCSAFRelationship.md | 1 + docs/AdvisoryCSAFScore.md | 1 + docs/AdvisoryCSAFVulnerability.md | 1 + docs/AdvisoryCVEDetail.md | 1 + docs/AdvisoryCVEDetailsLink.md | 1 + docs/AdvisoryCVEReference.md | 1 + docs/AdvisoryCVRFReference.md | 30 - docs/AdvisoryCVSS.md | 1 + docs/AdvisoryCVSSV2.md | 1 + docs/AdvisoryCVSSV3.md | 1 + docs/AdvisoryCVSSV40.md | 1 + docs/AdvisoryCVSSV40Threat.md | 1 + docs/AdvisoryCanvasExploit.md | 1 + docs/AdvisoryCapec.md | 1 + docs/AdvisoryCarestreamAdvisory.md | 1 + docs/AdvisoryCarrier.md | 1 + docs/AdvisoryCentosPackage.md | 1 + docs/AdvisoryCertBE.md | 1 + docs/AdvisoryCertFRAdvisory.md | 1 + docs/AdvisoryCertIN.md | 1 + docs/AdvisoryCertIRSecurityAlert.md | 1 + docs/AdvisoryCertSE.md | 1 + docs/AdvisoryCertUA.md | 1 + docs/AdvisoryChainGuard.md | 1 + docs/AdvisoryChainGuardPackage.md | 1 + docs/AdvisoryChainGuardSecFix.md | 1 + docs/AdvisoryCheckPoint.md | 1 + docs/AdvisoryChrome.md | 1 + docs/AdvisoryCiena.md | 1 + docs/AdvisoryCisaCsafAdv.md | 1 + docs/AdvisoryCiscoAdvisory.md | 1 + docs/AdvisoryCiscoCSAF.md | 1 + docs/AdvisoryCiscoKnownGoodValue.md | 1 + docs/AdvisoryCitrixAdvisory.md | 1 + docs/AdvisoryClarotyVulnerability.md | 1 + docs/AdvisoryCloudBees.md | 1 + docs/AdvisoryCloudVulnDBAdvisory.md | 1 + docs/AdvisoryCodesysAdvisory.md | 1 + docs/AdvisoryCommVault.md | 1 + docs/AdvisoryCommVaultCVEDetails.md | 1 + docs/AdvisoryCommVaultImpactedProduct.md | 1 + ...AdvisoryCommVaultImpactedProductDetails.md | 1 + docs/AdvisoryCommVaultResolution.md | 1 + docs/AdvisoryCommVaultResolutionDetails.md | 1 + docs/AdvisoryCompassSecurity.md | 1 + docs/AdvisoryContainerOS.md | 1 + docs/AdvisoryCoreImpactExploit.md | 1 + docs/AdvisoryCorrection.md | 1 + docs/AdvisoryCredit.md | 1 + docs/AdvisoryCrestron.md | 1 + docs/AdvisoryCrowdSec.md | 1 + docs/AdvisoryCurl.md | 1 + docs/AdvisoryCurlAffected.md | 1 + docs/AdvisoryCurlCWE.md | 1 + docs/AdvisoryCurlCredit.md | 1 + docs/AdvisoryCurlRange.md | 1 + docs/AdvisoryCvrf.md | 7 +- docs/AdvisoryCvsssV23.md | 1 + docs/AdvisoryCwe.md | 1 + docs/AdvisoryCweAcceptanceLevel.md | 1 + docs/AdvisoryCweData.md | 1 + docs/AdvisoryCwes.md | 4 +- docs/AdvisoryCycle.md | 1 + docs/AdvisoryDBSpecific.md | 1 + docs/AdvisoryDFNCert.md | 1 + docs/AdvisoryDLink.md | 1 + docs/AdvisoryDNN.md | 1 + docs/AdvisoryDahua.md | 1 + docs/AdvisoryDanFossCVEDetails.md | 1 + docs/AdvisoryDanfoss.md | 1 + docs/AdvisoryDassault.md | 1 + docs/AdvisoryDateTime.md | 29 - docs/AdvisoryDebianCVE.md | 1 + docs/AdvisoryDebianSecurityAdvisory.md | 1 + docs/AdvisoryDell.md | 1 + docs/AdvisoryDellCVE.md | 1 + docs/AdvisoryDeltaAdvisory.md | 1 + docs/AdvisoryDistroPackage.md | 1 + docs/AdvisoryDistroVersion.md | 1 + docs/AdvisoryDjango.md | 1 + docs/AdvisoryDocumentMetadata.md | 3 +- docs/AdvisoryDocumentNote.md | 31 - docs/AdvisoryDocumentPublisher.md | 1 + docs/AdvisoryDocumentTracking.md | 34 - docs/AdvisoryDotCMS.md | 1 + docs/AdvisoryDragosAdvisory.md | 1 + docs/AdvisoryDraytek.md | 1 + docs/AdvisoryDrupal.md | 1 + docs/AdvisoryEOLAlibaba.md | 1 + docs/AdvisoryEOLMicrosoft.md | 1 + docs/AdvisoryEOLReleaseData.md | 1 + docs/AdvisoryEUVD.md | 1 + docs/AdvisoryEatonAdvisory.md | 1 + docs/AdvisoryEcoSystem.md | 1 + docs/AdvisoryElastic.md | 1 + docs/AdvisoryElspec.md | 1 + docs/AdvisoryEmergingThreatsSnort.md | 1 + docs/AdvisoryEmersonAdvisory.md | 1 + docs/AdvisoryEndOfLife.md | 1 + docs/AdvisoryEndress.md | 1 + docs/AdvisoryEnisaIDProduct.md | 1 + docs/AdvisoryEnisaIDVendor.md | 1 + docs/AdvisoryEvent.md | 1 + docs/AdvisoryExodusIntel.md | 1 + docs/AdvisoryExploitDBExploitv2.md | 1 + docs/AdvisoryExternalReferences.md | 1 + docs/AdvisoryF5.md | 1 + docs/AdvisoryFSecure.md | 1 + docs/AdvisoryFanuc.md | 1 + docs/AdvisoryFastly.md | 1 + docs/AdvisoryFesto.md | 1 + docs/AdvisoryFileCloud.md | 1 + docs/AdvisoryFileZilla.md | 1 + docs/AdvisoryFixAff.md | 1 + docs/AdvisoryFlag.md | 1 + docs/AdvisoryFlattSecurity.md | 1 + docs/AdvisoryForgeRock.md | 1 + docs/AdvisoryFortinetAdvisory.md | 1 + docs/AdvisoryFortinetIPS.md | 1 + docs/AdvisoryFoxit.md | 1 + docs/AdvisoryFoxitAffected.md | 1 + docs/AdvisoryFresenius.md | 1 + docs/AdvisoryGCP.md | 1 + docs/AdvisoryGEGas.md | 1 + docs/AdvisoryGEHealthcareAdvisory.md | 1 + docs/AdvisoryGHAdvisoryJSONLean.md | 1 + docs/AdvisoryGHCvss.md | 1 + docs/AdvisoryGHIdentifier.md | 1 + docs/AdvisoryGHNode.md | 1 + docs/AdvisoryGHPackage.md | 1 + docs/AdvisoryGHReference.md | 1 + docs/AdvisoryGHSA.md | 1 + docs/AdvisoryGHSAAffected.md | 1 + docs/AdvisoryGHSADatabaseSpecific.md | 1 + docs/AdvisoryGHSAEcoSystemSpecific.md | 1 + docs/AdvisoryGHSAEvent.md | 1 + docs/AdvisoryGHSAPackage.md | 1 + docs/AdvisoryGHSARange.md | 1 + docs/AdvisoryGHSAReference.md | 1 + docs/AdvisoryGHSASeverity.md | 1 + docs/AdvisoryGHVulnerabilities.md | 1 + docs/AdvisoryGMOCyberSecurity.md | 1 + docs/AdvisoryGallagher.md | 1 + docs/AdvisoryGen.md | 1 + docs/AdvisoryGenetec.md | 1 + docs/AdvisoryGigabyte.md | 1 + docs/AdvisoryGitHubExploit.md | 1 + docs/AdvisoryGitLabExploit.md | 1 + docs/AdvisoryGiteeExploit.md | 1 + docs/AdvisoryGitlabAdvisory.md | 1 + docs/AdvisoryGlibc.md | 1 + docs/AdvisoryGnuTLS.md | 1 + docs/AdvisoryGoCredits.md | 1 + docs/AdvisoryGoEvent.md | 1 + docs/AdvisoryGoVulnAffected.md | 1 + docs/AdvisoryGoVulnDatabaseSpecific.md | 1 + docs/AdvisoryGoVulnEcosystemSpecific.md | 1 + docs/AdvisoryGoVulnImport.md | 1 + docs/AdvisoryGoVulnJSON.md | 1 + docs/AdvisoryGoVulnPackage.md | 1 + docs/AdvisoryGoVulnRanges.md | 1 + docs/AdvisoryGoVulnReference.md | 1 + docs/AdvisoryGrafana.md | 1 + docs/AdvisoryGreyNoiseDetection.md | 1 + docs/AdvisoryGreyNoiseTags.md | 1 + docs/AdvisoryHCL.md | 1 + docs/AdvisoryHIKVision.md | 1 + docs/AdvisoryHKCert.md | 1 + docs/AdvisoryHMS.md | 1 + docs/AdvisoryHP.md | 1 + docs/AdvisoryHPE.md | 1 + docs/AdvisoryHacktivity.md | 1 + docs/AdvisoryHardwareUpdate.md | 1 + docs/AdvisoryHarmonyOS.md | 1 + docs/AdvisoryHashiCorp.md | 1 + docs/AdvisoryHaskellAffected.md | 1 + docs/AdvisoryHaskellSADBAdvisory.md | 1 + docs/AdvisoryHaskellVersion.md | 1 + docs/AdvisoryHillromAdvisory.md | 1 + docs/AdvisoryHitachi.md | 1 + docs/AdvisoryHitachiEnergy.md | 1 + docs/AdvisoryHoneywell.md | 1 + docs/AdvisoryHuawei.md | 1 + docs/AdvisoryHuaweiEulerOS.md | 1 + docs/AdvisoryHuaweiIPS.md | 1 + docs/AdvisoryIAVA.md | 1 + docs/AdvisoryIBM.md | 1 + docs/AdvisoryITW.md | 1 + docs/AdvisoryITWExploit.md | 1 + docs/AdvisoryIVal.md | 1 + docs/AdvisoryIdemia.md | 1 + docs/AdvisoryIgel.md | 1 + docs/AdvisoryImpact.md | 1 + docs/AdvisoryIncibeAdvisory.md | 1 + docs/AdvisoryIntel.md | 1 + docs/AdvisoryIpIntelRecord.md | 1 + docs/AdvisoryIsraeliAlert.md | 1 + docs/AdvisoryIsraeliVulnerability.md | 1 + docs/AdvisoryIssued.md | 29 - docs/AdvisoryIstio.md | 1 + docs/AdvisoryIvanti.md | 1 + docs/AdvisoryIvantiRSS.md | 1 + docs/AdvisoryJFrog.md | 1 + docs/AdvisoryJNJAdvisory.md | 1 + docs/AdvisoryJVN.md | 1 + docs/AdvisoryJVNAdvisoryItem.md | 1 + docs/AdvisoryJVNCPE.md | 1 + docs/AdvisoryJVNReference.md | 1 + docs/AdvisoryJenkins.md | 1 + docs/AdvisoryJetBrains.md | 1 + docs/AdvisoryJohnsonControls.md | 1 + docs/AdvisoryJuniper.md | 1 + docs/AdvisoryK8S.md | 1 + docs/AdvisoryKEVCatalogVulnerability.md | 1 + docs/AdvisoryKRCertAdvisory.md | 1 + docs/AdvisoryKasperskyICSCERTAdvisory.md | 1 + docs/AdvisoryKb.md | 1 + docs/AdvisoryKbThreatDescription.md | 1 + docs/AdvisoryKoreLogic.md | 1 + docs/AdvisoryKunbus.md | 1 + docs/AdvisoryLG.md | 1 + docs/AdvisoryLantronix.md | 1 + docs/AdvisoryLenovo.md | 1 + docs/AdvisoryLexmarkAdvisory.md | 1 + docs/AdvisoryLibreOffice.md | 1 + docs/AdvisoryLinux.md | 1 + docs/AdvisoryLogSource.md | 1 + docs/AdvisoryLolAdvs.md | 1 + docs/AdvisoryMACert.md | 1 + docs/AdvisoryMAffected.md | 1 + docs/AdvisoryMBranch.md | 1 + docs/AdvisoryMCPEApplicability.md | 1 + docs/AdvisoryMCPEMatch.md | 1 + docs/AdvisoryMCna.md | 1 + docs/AdvisoryMContainers.md | 1 + docs/AdvisoryMCveMetadata.md | 1 + docs/AdvisoryMCvssV20.md | 1 + docs/AdvisoryMCvssV30.md | 1 + docs/AdvisoryMCvssV31.md | 1 + docs/AdvisoryMCvssV40.md | 1 + docs/AdvisoryMDescriptions.md | 1 + docs/AdvisoryMDocumentTracking.md | 1 + docs/AdvisoryMEProduct.md | 1 + docs/AdvisoryMFiles.md | 1 + docs/AdvisoryMFullProductName.md | 1 + docs/AdvisoryMISPValueNoID.md | 1 + docs/AdvisoryMITREAttackGroupNoID.md | 1 + docs/AdvisoryMIdentification.md | 1 + docs/AdvisoryMItem.md | 1 + docs/AdvisoryMNodes.md | 1 + docs/AdvisoryMProblemTypes.md | 1 + docs/AdvisoryMProductStatus.md | 1 + docs/AdvisoryMProductTree.md | 1 + docs/AdvisoryMProviderMetadata.md | 1 + docs/AdvisoryMReference.md | 1 + docs/AdvisoryMRemediation.md | 1 + docs/AdvisoryMSCVRF.md | 1 + docs/AdvisoryMSDocumentTitle.md | 1 + docs/AdvisoryMVersion.md | 1 + docs/AdvisoryMVulnerability.md | 1 + docs/AdvisoryMaliciousPackage.md | 1 + docs/AdvisoryManageEngine.md | 1 + docs/AdvisoryManageEngineAdvisory.md | 1 + docs/AdvisoryMbedTLS.md | 1 + docs/AdvisoryMcAfee.md | 1 + docs/AdvisoryMcAfeeScore.md | 1 + docs/AdvisoryMediatek.md | 1 + docs/AdvisoryMedtronicAdvisory.md | 1 + docs/AdvisoryMendix.md | 1 + docs/AdvisoryMetaAdvisories.md | 1 + docs/AdvisoryMetaData.md | 1 + docs/AdvisoryMetasploitExploit.md | 1 + docs/AdvisoryMetric.md | 1 + docs/AdvisoryMetricScenario.md | 1 + docs/AdvisoryMetricsOther.md | 1 + docs/AdvisoryMicrosoftCSAF.md | 1 + docs/AdvisoryMicrosoftCVRF.md | 1 + docs/AdvisoryMicrosoftDriverBlockList.md | 3 +- docs/AdvisoryMicrosoftFileMetadata.md | 1 + docs/AdvisoryMicrosoftKb.md | 1 + docs/AdvisoryMikrotik.md | 1 + docs/AdvisoryMindray.md | 1 + docs/AdvisoryMispMeta.md | 1 + docs/AdvisoryMispRelatedItem.md | 1 + docs/AdvisoryMispValue.md | 1 + docs/AdvisoryMitel.md | 1 + docs/AdvisoryMitreAttackRef.md | 1 + docs/AdvisoryMitreAttackTechWithRefs.md | 1 + docs/AdvisoryMitreAttackTechnique.md | 1 + docs/AdvisoryMitreCVEListV5.md | 1 + docs/AdvisoryMitreCVEListV5Ref.md | 1 + docs/AdvisoryMitreGroupCTI.md | 1 + docs/AdvisoryMitsubishiElectricAdvisory.md | 1 + docs/AdvisoryMongoDB.md | 1 + docs/AdvisoryMoxaAdvisory.md | 1 + docs/AdvisoryMozillaAdvisory.md | 1 + docs/AdvisoryMozillaComponent.md | 1 + docs/AdvisoryNCSC.md | 1 + docs/AdvisoryNCSCCVE.md | 1 + docs/AdvisoryNEC.md | 1 + docs/AdvisoryNHS.md | 1 + docs/AdvisoryNI.md | 1 + docs/AdvisoryNISTControl.md | 1 + docs/AdvisoryNTP.md | 1 + docs/AdvisoryNVD20CVECPEMatch.md | 1 + docs/AdvisoryNVD20Configuration.md | 1 + docs/AdvisoryNVD20Node.md | 1 + docs/AdvisoryNVD20Source.md | 1 + docs/AdvisoryNVDCPEDictionary.md | 1 + docs/AdvisoryNZAdvisory.md | 1 + docs/AdvisoryNaver.md | 1 + docs/AdvisoryNessus.md | 1 + docs/AdvisoryNetApp.md | 1 + docs/AdvisoryNetatalk.md | 1 + docs/AdvisoryNetgate.md | 1 + docs/AdvisoryNetgear.md | 1 + docs/AdvisoryNetskope.md | 1 + docs/AdvisoryNexpose.md | 1 + docs/AdvisoryNginxAdvisory.md | 1 + docs/AdvisoryNodeAuthor.md | 1 + docs/AdvisoryNodeJS.md | 1 + docs/AdvisoryNodeSecurity.md | 1 + docs/AdvisoryNokia.md | 1 + docs/AdvisoryNote.md | 1 + docs/AdvisoryNotePadPlusPlus.md | 1 + docs/AdvisoryNozomi.md | 1 + docs/AdvisoryNuclei.md | 1 + docs/AdvisoryNvidiaRevision.md | 1 + docs/AdvisoryOCurl.md | 1 + docs/AdvisoryOSV.md | 1 + docs/AdvisoryOSVObj.md | 1 + docs/AdvisoryOSVPackage.md | 1 + docs/AdvisoryOSVReference.md | 1 + docs/AdvisoryOTRS.md | 1 + docs/AdvisoryOctopusDeploy.md | 1 + docs/AdvisoryOkta.md | 1 + docs/AdvisoryOmron.md | 1 + docs/AdvisoryOneE.md | 1 + docs/AdvisoryOpenBSD.md | 1 + docs/AdvisoryOpenCVDB.md | 1 + docs/AdvisoryOpenJDK.md | 1 + docs/AdvisoryOpenJDKCVE.md | 1 + docs/AdvisoryOpenSSH.md | 1 + docs/AdvisoryOpenSSLSecAdv.md | 1 + docs/AdvisoryOpenSSLVulnerability.md | 1 + docs/AdvisoryOpenStack.md | 1 + docs/AdvisoryOpengear.md | 1 + docs/AdvisoryOracleCPU.md | 1 + docs/AdvisoryOracleCPUCSAF.md | 1 + docs/AdvisoryOriginalGHSA.md | 1 + docs/AdvisoryOvalCVE.md | 1 + docs/AdvisoryOvalReference.md | 1 + docs/AdvisoryOverride.md | 1 + docs/AdvisoryOverrideAnnotation.md | 1 + docs/AdvisoryOverrideCVE.md | 1 + docs/AdvisoryOverrideConfiguration.md | 1 + docs/AdvisoryOwnCloud.md | 1 + docs/AdvisoryPGFix.md | 1 + docs/AdvisoryPHPMyAdmin.md | 1 + docs/AdvisoryPKCert.md | 1 + docs/AdvisoryPTC.md | 1 + docs/AdvisoryPTMDescriptions.md | 1 + docs/AdvisoryPackage.md | 1 + docs/AdvisoryPackageStat.md | 1 + docs/AdvisoryPacketstormExploit.md | 1 + docs/AdvisoryPalantir.md | 1 + docs/AdvisoryPaloAltoAdvisory.md | 1 + docs/AdvisoryPanasonic.md | 1 + docs/AdvisoryPaperCut.md | 1 + docs/AdvisoryPatch.md | 1 + docs/AdvisoryPega.md | 1 + docs/AdvisoryPhilipsAdvisory.md | 1 + docs/AdvisoryPhoenixContactAdvisory.md | 1 + docs/AdvisoryPostgresSQL.md | 1 + docs/AdvisoryPowerDNS.md | 1 + docs/AdvisoryPrimeVersion.md | 1 + docs/AdvisoryProduct.md | 3 +- docs/AdvisoryProductBranch.md | 1 + docs/AdvisoryProductSpecificDetail.md | 1 + docs/AdvisoryProductTree.md | 29 - docs/AdvisoryProductsAffected.md | 1 + docs/AdvisoryProgress.md | 1 + docs/AdvisoryProofpoint.md | 1 + docs/AdvisoryPublisher.md | 1 + docs/AdvisoryPureStorage.md | 1 + docs/AdvisoryPyPAAdvisory.md | 1 + docs/AdvisoryPyPAAffected.md | 1 + docs/AdvisoryPyPAEvent.md | 1 + docs/AdvisoryPyPAPackage.md | 1 + docs/AdvisoryPyPARange.md | 1 + docs/AdvisoryPyPAReference.md | 1 + docs/AdvisoryQNAPAdvisory.md | 1 + docs/AdvisoryQQID.md | 1 + docs/AdvisoryQSB.md | 1 + docs/AdvisoryQualcomm.md | 1 + docs/AdvisoryQualys.md | 1 + docs/AdvisoryQualysQID.md | 1 + docs/AdvisoryRDescription.md | 1 + docs/AdvisoryRNote.md | 1 + docs/AdvisoryRRevision.md | 1 + docs/AdvisoryRScoreSet.md | 1 + docs/AdvisoryRThreat.md | 1 + docs/AdvisoryRange.md | 1 + docs/AdvisoryRansomwareExploit.md | 1 + docs/AdvisoryRecordType.md | 1 + docs/AdvisoryRedLion.md | 1 + docs/AdvisoryRedhatCVE.md | 1 + docs/AdvisoryReference.md | 1 + docs/AdvisoryRelatedRule.md | 1 + docs/AdvisoryRelationship.md | 31 - docs/AdvisoryRemediationData.md | 1 + docs/AdvisoryRenesas.md | 1 + docs/AdvisoryReportedExploit.md | 1 + docs/AdvisoryRestartData.md | 1 + docs/AdvisoryRevision.md | 31 - docs/AdvisoryRevisionHistory.md | 1 + docs/AdvisoryRevive.md | 1 + docs/AdvisoryRhelCVE.md | 1 + docs/AdvisoryRoche.md | 1 + docs/AdvisoryRocheCVE.md | 1 + docs/AdvisoryRockwell.md | 1 + docs/AdvisoryRockwellAffectedProduct.md | 1 + docs/AdvisoryRockyAdvisory.md | 3 +- docs/AdvisoryRockyCve.md | 1 + docs/AdvisoryRockyErrata.md | 1 + docs/AdvisoryRockyFix.md | 1 + docs/AdvisoryRockyPackage.md | 1 + docs/AdvisoryRockyVersion.md | 1 + docs/AdvisoryRsync.md | 1 + docs/AdvisoryRuckus.md | 1 + docs/AdvisoryRustsecAdvisory.md | 1 + docs/AdvisoryRustsecAffected.md | 1 + docs/AdvisoryRustsecFrontMatterAdvisory.md | 1 + docs/AdvisoryRustsecFrontMatterVersions.md | 1 + docs/AdvisorySAAdvisory.md | 1 + docs/AdvisorySAP.md | 1 + docs/AdvisorySECConsult.md | 1 + docs/AdvisorySSASource.md | 1 + docs/AdvisorySSDAdvisory.md | 1 + docs/AdvisorySafran.md | 1 + docs/AdvisorySaintExploit.md | 1 + docs/AdvisorySalesForce.md | 1 + docs/AdvisorySamba.md | 1 + docs/AdvisorySandisk.md | 1 + docs/AdvisorySansDshield.md | 1 + docs/AdvisorySchneiderCVE.md | 1 + docs/AdvisorySchneiderElectricAdvisory.md | 1 + docs/AdvisorySchutzwerk.md | 1 + docs/AdvisoryScoreSet.md | 30 - docs/AdvisorySecFix.md | 1 + docs/AdvisorySecurityBulletin.md | 1 + docs/AdvisorySecurityLab.md | 1 + docs/AdvisorySeebugExploit.md | 1 + docs/AdvisorySel.md | 1 + docs/AdvisorySentinelOne.md | 1 + docs/AdvisoryServiceNow.md | 1 + docs/AdvisorySevenZip.md | 1 + docs/AdvisorySeverity.md | 1 + ...isoryShadowServerExploitedVulnerability.md | 1 + docs/AdvisoryShielder.md | 1 + docs/AdvisorySick.md | 1 + docs/AdvisorySiemensAcknowledgments.md | 1 + docs/AdvisorySiemensAdvisory.md | 1 + docs/AdvisorySiemensBranch.md | 1 + docs/AdvisorySiemensCVSSV3.md | 1 + docs/AdvisorySiemensCWE.md | 1 + docs/AdvisorySiemensDistribution.md | 1 + docs/AdvisorySiemensDocument.md | 1 + docs/AdvisorySiemensEngine.md | 1 + docs/AdvisorySiemensGenerator.md | 1 + docs/AdvisorySiemensNotes.md | 1 + docs/AdvisorySiemensProduct.md | 1 + ...isorySiemensProductIdentificationHelper.md | 1 + docs/AdvisorySiemensProductStatus.md | 1 + docs/AdvisorySiemensProductTree.md | 1 + docs/AdvisorySiemensPublisher.md | 1 + docs/AdvisorySiemensReferences.md | 1 + docs/AdvisorySiemensRemediation.md | 1 + docs/AdvisorySiemensRevisionHistory.md | 1 + docs/AdvisorySiemensScore.md | 1 + docs/AdvisorySiemensSubBranch.md | 1 + docs/AdvisorySiemensSubSubBranch.md | 1 + docs/AdvisorySiemensTLP.md | 1 + docs/AdvisorySiemensTracking.md | 1 + docs/AdvisorySiemensVulnerability.md | 1 + docs/AdvisorySierraWireless.md | 1 + docs/AdvisorySigmaRule.md | 1 + docs/AdvisorySigmaRuleRule.md | 1 + docs/AdvisorySingCert.md | 1 + docs/AdvisorySitecore.md | 1 + docs/AdvisorySlackware.md | 1 + docs/AdvisorySoftwareUpdate.md | 1 + docs/AdvisorySolarWindsAdvisory.md | 1 + docs/AdvisorySolr.md | 1 + docs/AdvisorySonatype.md | 1 + docs/AdvisorySonicWallAdvisory.md | 1 + docs/AdvisorySpacelabsHealthcareAdvisory.md | 1 + docs/AdvisorySplunk.md | 1 + docs/AdvisorySplunkProduct.md | 1 + docs/AdvisorySpring.md | 1 + docs/AdvisoryStatus.md | 30 - docs/AdvisoryStormshield.md | 1 + docs/AdvisoryStrykerAdvisory.md | 1 + docs/AdvisorySudo.md | 1 + docs/AdvisorySuseSecurity.md | 1 + docs/AdvisorySwisslogHealthcareAdvisory.md | 1 + docs/AdvisorySymfony.md | 1 + docs/AdvisorySynacktiv.md | 1 + docs/AdvisorySyncroSoft.md | 1 + docs/AdvisorySynology.md | 1 + docs/AdvisorySyss.md | 1 + docs/AdvisoryTI.md | 1 + docs/AdvisoryTPLink.md | 1 + docs/AdvisoryTWCertAdvisory.md | 1 + docs/AdvisoryTailscale.md | 1 + docs/AdvisoryTalosAdvisory.md | 1 + docs/AdvisoryTeamViewer.md | 1 + docs/AdvisoryTenableResearchAdvisory.md | 1 + docs/AdvisoryTencent.md | 1 + docs/AdvisoryThales.md | 1 + docs/AdvisoryTheMissingLink.md | 1 + docs/AdvisoryThermoFisher.md | 1 + docs/AdvisoryThreat.md | 30 - .../AdvisoryThreatActorWithExternalObjects.md | 1 + docs/AdvisoryThreatData.md | 1 + docs/AdvisoryTibco.md | 1 + docs/AdvisoryTimeline.md | 1 + docs/AdvisoryTool.md | 1 + docs/AdvisoryToolRef.md | 1 + docs/AdvisoryTracking.md | 1 + docs/AdvisoryTrackingID.md | 1 + docs/AdvisoryTraneTechnology.md | 1 + docs/AdvisoryTrendMicro.md | 1 + docs/AdvisoryTriageNotes.md | 1 + docs/AdvisoryTrustwave.md | 1 + docs/AdvisoryUSD.md | 1 + docs/AdvisoryUSOMAdvisory.md | 1 + docs/AdvisoryUbiquiti.md | 1 + docs/AdvisoryUbuntuCVE.md | 1 + docs/AdvisoryUbuntuPackageReleaseStatus.md | 1 + docs/AdvisoryUnify.md | 1 + docs/AdvisoryUnisoc.md | 1 + docs/AdvisoryUpdate.md | 5 +- docs/AdvisoryUpdated.md | 29 - docs/AdvisoryV3AcceptanceLevel.md | 1 + docs/AdvisoryVCCPEDictionary.md | 1 + docs/AdvisoryVCVulnerableCPEs.md | 1 + docs/AdvisoryVDEAdvisory.md | 1 + docs/AdvisoryVLC.md | 1 + docs/AdvisoryVMWareAdvisory.md | 1 + docs/AdvisoryVYAIREAdvisory.md | 1 + docs/AdvisoryVanDyke.md | 1 + docs/AdvisoryVapidLabsAdvisory.md | 1 + docs/AdvisoryVeeam.md | 1 + docs/AdvisoryVendorNameForThreatActor.md | 1 + docs/AdvisoryVendorProduct.md | 1 + docs/AdvisoryVendorRef.md | 1 + docs/AdvisoryVeritas.md | 1 + docs/AdvisoryVirtuozzo.md | 1 + docs/AdvisoryVoidSec.md | 1 + docs/AdvisoryVulnCheck.md | 1 + docs/AdvisoryVulnCheckCVEListV5.md | 1 + docs/AdvisoryVulnCheckConfig.md | 1 + docs/AdvisoryVulnCheckKEV.md | 1 + docs/AdvisoryVulnCheckPackage.md | 1 + docs/AdvisoryVulnerability.md | 35 - docs/AdvisoryVulnerableDebianPackage.md | 1 + docs/AdvisoryVulnerableProduct.md | 1 + docs/AdvisoryVulnrichment.md | 1 + docs/AdvisoryVulnrichmentCVERef.md | 1 + docs/AdvisoryVulnrichmentContainers.md | 1 + docs/AdvisoryVulnrichmentContent.md | 1 + docs/AdvisoryVulnrichmentMetric.md | 1 + docs/AdvisoryVulnrichmentOption.md | 1 + docs/AdvisoryVulnrichmentOther.md | 1 + docs/AdvisoryWRT.md | 1 + docs/AdvisoryWatchGuard.md | 1 + docs/AdvisoryWhatsApp.md | 1 + docs/AdvisoryWibu.md | 1 + docs/AdvisoryWireshark.md | 1 + docs/AdvisoryWithSecure.md | 1 + docs/AdvisoryWolfSSL.md | 1 + docs/AdvisoryWolfi.md | 1 + docs/AdvisoryWolfiPackage.md | 1 + docs/AdvisoryWolfiSecFix.md | 1 + docs/AdvisoryWordfence.md | 1 + docs/AdvisoryXDB.md | 1 + docs/AdvisoryXen.md | 1 + docs/AdvisoryXerox.md | 1 + docs/AdvisoryXiaomi.md | 1 + docs/AdvisoryXylem.md | 1 + docs/AdvisoryYamaha.md | 1 + docs/AdvisoryYokogawaAdvisory.md | 1 + docs/AdvisoryYubico.md | 1 + docs/AdvisoryZDI.md | 1 + docs/AdvisoryZDIProduct.md | 1 + docs/AdvisoryZDIResponse.md | 1 + docs/AdvisoryZDIResponseVendor.md | 1 + docs/AdvisoryZDIVendor.md | 1 + docs/AdvisoryZebra.md | 1 + docs/AdvisoryZeroDayAdvisory.md | 1 + docs/AdvisoryZeroScienceAdvisory.md | 1 + docs/AdvisoryZimbra.md | 1 + docs/AdvisoryZoom.md | 1 + docs/AdvisoryZscaler.md | 1 + docs/AdvisoryZuluVersion.md | 1 + docs/AdvisoryZuso.md | 1 + docs/AdvisoryZyxel.md | 1 + docs/ApiBaseMetricV2.md | 1 + docs/ApiBaseMetricV3.md | 1 + docs/ApiCPE.md | 1 + docs/ApiCPEMatch.md | 1 + docs/ApiCPEName.md | 1 + docs/ApiCVE.md | 1 + docs/ApiCVEDataMeta.md | 1 + docs/ApiCVEDataMetaExtended.md | 1 + docs/ApiCVEExtended.md | 1 + docs/ApiCVSSV2.md | 1 + docs/ApiCVSSV3.md | 1 + docs/ApiCWE.md | 1 + docs/ApiCategorizationExtended.md | 1 + docs/ApiClientFingerprints.md | 1 + docs/ApiConfigurations.md | 1 + docs/ApiCveItems.md | 1 + docs/ApiCveItemsExtended.md | 1 + docs/ApiDateTime.md | 29 - docs/ApiDescription.md | 1 + docs/ApiDescriptionData.md | 1 + docs/ApiEPSS.md | 1 + docs/ApiEPSSData.md | 1 + docs/ApiExploitChain.md | 1 + docs/ApiExploitChainCVE.md | 1 + docs/ApiExploitV3Result.md | 3 +- docs/ApiExploitsChange.md | 1 + docs/ApiExploitsChangelog.md | 1 + docs/ApiExploitsTrending.md | 1 + docs/ApiExploitsV3Count.md | 1 + docs/ApiExploitsV3Timeline.md | 1 + docs/ApiHTTPDetails.md | 1 + docs/ApiImpact.md | 3 +- docs/ApiImpactExtended.md | 1 + docs/ApiInitialAccess.md | 1 + docs/ApiInitialAccessArtifact.md | 1 + docs/ApiMitreAttackTech.md | 1 + docs/ApiMitreAttackToCVE.md | 1 + docs/ApiMitreD3fendTechnique.md | 1 + docs/ApiMitreDetectionTech.md | 1 + docs/ApiMitreMitigation2D3fendMapping.md | 1 + docs/ApiMitreMitigationTech.md | 1 + docs/ApiNVD20CPEMatch.md | 1 + docs/ApiNVD20CPEName.md | 1 + docs/ApiNVD20CVE.md | 1 + docs/ApiNVD20CVEExtended.md | 1 + docs/ApiNVD20CvssDataV2.md | 1 + docs/ApiNVD20CvssDataV3.md | 1 + docs/ApiNVD20CvssMetricV2.md | 1 + docs/ApiNVD20CvssMetricV3.md | 1 + docs/ApiNVD20CvssMetricV40.md | 1 + docs/ApiNVD20Description.md | 1 + docs/ApiNVD20Metric.md | 1 + docs/ApiNVD20MetricExtended.md | 1 + docs/ApiNVD20Reference.md | 1 + docs/ApiNVD20ReferenceExtended.md | 1 + docs/ApiNVD20TemporalAssociatedBaseMetric.md | 1 + docs/ApiNVD20TemporalCVSSV2.md | 1 + docs/ApiNVD20TemporalCVSSV3.md | 1 + docs/ApiNVD20ThreatAssociatedBaseMetric.md | 1 + docs/ApiNVD20ThreatCVSSV40.md | 1 + docs/ApiNVD20VendorComment.md | 1 + docs/ApiNVD20Weakness.md | 1 + docs/ApiNVD20WeaknessDescExtended.md | 1 + docs/ApiNVD20WeaknessExtended.md | 1 + docs/ApiNodes.md | 1 + docs/ApiNormalizedExploitV3Entry.md | 1 + docs/ApiNormalizedReportV3Entry.md | 1 + docs/ApiOSSPackage.md | 1 + docs/ApiOSSPackageArtifacts.md | 1 + docs/ApiOSSPackageDownloadInfo.md | 1 + docs/ApiOSSPackageHashInfo.md | 1 + docs/ApiOSSPackageResearchAttributes.md | 1 + docs/ApiOSSPackageVulnerability.md | 1 + docs/ApiPackage.md | 1 + docs/ApiProblemType.md | 1 + docs/ApiProblemTypeData.md | 1 + docs/ApiProblemTypeDataExtended.md | 1 + docs/ApiProblemTypeDescription.md | 1 + docs/ApiProblemTypeDescriptionExtended.md | 1 + docs/ApiProblemTypeExtended.md | 1 + docs/ApiReference.md | 1 + docs/ApiReferenceData.md | 1 + docs/ApiReferenceDataExtended.md | 1 + docs/ApiReferences.md | 1 + docs/ApiReferencesExtended.md | 1 + docs/ApiRelatedAttackPattern.md | 1 + docs/ApiSSVC.md | 1 + docs/ApiTemporalCVSSV2.md | 1 + docs/ApiTemporalCVSSV3.md | 1 + docs/ApiTemporalMetricV2.md | 1 + docs/ApiTemporalMetricV3.md | 1 + docs/ApiUpdate.md | 5 +- docs/ApiVulnCheckCanary.md | 1 + docs/ApiVulnerabilityAlias.md | 1 + docs/EndpointsApi.md | 56 +- docs/IndicesApi.md | 6830 ++-- docs/ModelsEntitlements.md | 1 + docs/PaginateMatch.md | 1 + docs/PaginatePagination.md | 1 + docs/PaginateParam.md | 1 + docs/ParamsIndexBackup.md | 1 + docs/ParamsIndexBackupList.md | 1 + docs/ParamsIndexList.md | 1 + docs/PurlBatchVulnFinding.md | 3 +- docs/PurlPackageURLJSON.md | 1 + docs/PurlQualifierJSON.md | 1 + docs/PurlsPurlResponse.md | 3 +- docs/PurlsVulnerability.md | 1 + ...enderResponseArrayParamsIndexBackupList.md | 1 + docs/RenderResponseArrayParamsIndexList.md | 1 + ...adataArrayAdvisoryA10PaginatePagination.md | 1 + ...ayAdvisoryABBAdvisoryPaginatePagination.md | 1 + ...adataArrayAdvisoryAIXPaginatePagination.md | 1 + ...adataArrayAdvisoryAMDPaginatePagination.md | 1 + ...adataArrayAdvisoryAMIPaginatePagination.md | 1 + ...dataArrayAdvisoryASRGPaginatePagination.md | 1 + ...AdvisoryAVEVAAdvisoryPaginatePagination.md | 1 + ...rayAdvisoryAVIDMLAdvsPaginatePagination.md | 1 + ...adataArrayAdvisoryAWSPaginatePagination.md | 1 + ...taArrayAdvisoryAbbottPaginatePagination.md | 1 + ...ArrayAdvisoryAbsolutePaginatePagination.md | 1 + ...aArrayAdvisoryAcronisPaginatePagination.md | 1 + ...AdvisoryAdobeAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryAdvantechPaginatePagination.md | 1 + ...ArrayAdvisoryAdvisoryPaginatePagination.md | 1 + ...dvisoryAdvisoryRecordPaginatePagination.md | 1 + ...AdvisoryAlephResearchPaginatePagination.md | 1 + ...aArrayAdvisoryAlibabaPaginatePagination.md | 1 + ...visoryAlmaLinuxUpdatePaginatePagination.md | 1 + ...isoryAlpineLinuxSecDBPaginatePagination.md | 1 + ...rrayAdvisoryAmazonCVEPaginatePagination.md | 1 + ...oryAnchoreNVDOverridePaginatePagination.md | 1 + ...visoryAndroidAdvisoryPaginatePagination.md | 1 + ...dvisoryApacheActiveMQPaginatePagination.md | 1 + ...AdvisoryApacheArchivaPaginatePagination.md | 1 + ...ayAdvisoryApacheArrowPaginatePagination.md | 1 + ...ayAdvisoryApacheCamelPaginatePagination.md | 1 + ...AdvisoryApacheCommonsPaginatePagination.md | 1 + ...AdvisoryApacheCouchDBPaginatePagination.md | 1 + ...ayAdvisoryApacheFlinkPaginatePagination.md | 1 + ...visoryApacheGuacamolePaginatePagination.md | 1 + ...rayAdvisoryApacheHTTPPaginatePagination.md | 1 + ...yAdvisoryApacheHadoopPaginatePagination.md | 1 + ...AdvisoryApacheJSPWikiPaginatePagination.md | 1 + ...ayAdvisoryApacheKafkaPaginatePagination.md | 1 + ...ApacheLoggingServicesPaginatePagination.md | 1 + ...rayAdvisoryApacheNiFiPaginatePagination.md | 1 + ...ayAdvisoryApacheOFBizPaginatePagination.md | 1 + ...oryApacheOpenMeetingsPaginatePagination.md | 1 + ...isoryApacheOpenOfficePaginatePagination.md | 1 + ...yAdvisoryApachePulsarPaginatePagination.md | 1 + ...ayAdvisoryApacheShiroPaginatePagination.md | 1 + ...ayAdvisoryApacheSparkPaginatePagination.md | 1 + ...yAdvisoryApacheStrutsPaginatePagination.md | 1 + ...isoryApacheSubversionPaginatePagination.md | 1 + ...dvisoryApacheSupersetPaginatePagination.md | 1 + ...yAdvisoryApacheTomcatPaginatePagination.md | 1 + ...visoryApacheZooKeeperPaginatePagination.md | 1 + ...ArrayAdvisoryAppCheckPaginatePagination.md | 1 + ...aArrayAdvisoryAppgatePaginatePagination.md | 1 + ...AdvisoryAppleAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryArchIssuePaginatePagination.md | 1 + ...taArrayAdvisoryAristaPaginatePagination.md | 1 + ...ataArrayAdvisoryArubaPaginatePagination.md | 1 + ...rrayAdvisoryAssetNotePaginatePagination.md | 1 + ...ArrayAdvisoryAsteriskPaginatePagination.md | 1 + ...ataArrayAdvisoryAstraPaginatePagination.md | 1 + ...dataArrayAdvisoryAsusPaginatePagination.md | 1 + ...soryAtlassianAdvisoryPaginatePagination.md | 1 + ...AdvisoryAtlassianVulnPaginatePagination.md | 1 + ...aArrayAdvisoryAtredisPaginatePagination.md | 1 + ...rayAdvisoryAudiocodesPaginatePagination.md | 1 + ...aArrayAdvisoryAusCertPaginatePagination.md | 1 + ...ArrayAdvisoryAutodeskPaginatePagination.md | 1 + ...ataArrayAdvisoryAvayaPaginatePagination.md | 1 + ...ArrayAdvisoryAvigilonPaginatePagination.md | 1 + ...dataArrayAdvisoryAxisPaginatePagination.md | 1 + ...dataArrayAdvisoryAzulPaginatePagination.md | 1 + ...dvisoryBBraunAdvisoryPaginatePagination.md | 1 + ...ayAdvisoryBDUAdvisoryPaginatePagination.md | 1 + ...adataArrayAdvisoryBLSPaginatePagination.md | 1 + ...ataArrayAdvisoryBandrPaginatePagination.md | 1 + ...dvisoryBaxterAdvisoryPaginatePagination.md | 1 + ...isoryBeckhoffAdvisoryPaginatePagination.md | 1 + ...dvisoryBeckmanCoulterPaginatePagination.md | 1 + ...ctonDickinsonAdvisoryPaginatePagination.md | 1 + ...dvisoryBeldenAdvisoryPaginatePagination.md | 1 + ...ayAdvisoryBeyondTrustPaginatePagination.md | 1 + ...aArrayAdvisoryBinarlyPaginatePagination.md | 1 + ...ayAdvisoryBitDefenderPaginatePagination.md | 1 + ...rayAdvisoryBlackBerryPaginatePagination.md | 1 + ...AdvisoryBoschAdvisoryPaginatePagination.md | 1 + ...tonScientificAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryBotnetPaginatePagination.md | 1 + ...CACyberCentreAdvisoryPaginatePagination.md | 1 + ...rayAdvisoryCBLMarinerPaginatePagination.md | 1 + ...dvisoryCERTEUAdvisoryPaginatePagination.md | 1 + ...dataArrayAdvisoryCESAPaginatePagination.md | 1 + ...rrayAdvisoryCISAAlertPaginatePagination.md | 1 + ...dvisoryCNNVDEntryJSONPaginatePagination.md | 1 + ...yAdvisoryCNVDBulletinPaginatePagination.md | 1 + ...ArrayAdvisoryCNVDFlawPaginatePagination.md | 1 + ...AdvisoryCanvasExploitPaginatePagination.md | 1 + ...oryCarestreamAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryCarrierPaginatePagination.md | 1 + ...taArrayAdvisoryCertBEPaginatePagination.md | 1 + ...dvisoryCertFRAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryCertINPaginatePagination.md | 1 + ...ryCertIRSecurityAlertPaginatePagination.md | 1 + ...taArrayAdvisoryCertSEPaginatePagination.md | 1 + ...taArrayAdvisoryCertUAPaginatePagination.md | 1 + ...rayAdvisoryChainGuardPaginatePagination.md | 1 + ...rayAdvisoryCheckPointPaginatePagination.md | 1 + ...taArrayAdvisoryChromePaginatePagination.md | 1 + ...ataArrayAdvisoryCienaPaginatePagination.md | 1 + ...ayAdvisoryCisaCsafAdvPaginatePagination.md | 1 + ...AdvisoryCiscoAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryCiscoCSAFPaginatePagination.md | 1 + ...ryCiscoKnownGoodValuePaginatePagination.md | 1 + ...dvisoryCitrixAdvisoryPaginatePagination.md | 1 + ...yClarotyVulnerabilityPaginatePagination.md | 1 + ...rrayAdvisoryCloudBeesPaginatePagination.md | 1 + ...ryCloudVulnDBAdvisoryPaginatePagination.md | 1 + ...visoryCodesysAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryCommVaultPaginatePagination.md | 1 + ...visoryCompassSecurityPaginatePagination.md | 1 + ...ayAdvisoryContainerOSPaginatePagination.md | 1 + ...soryCoreImpactExploitPaginatePagination.md | 1 + ...ArrayAdvisoryCrestronPaginatePagination.md | 1 + ...ArrayAdvisoryCrowdSecPaginatePagination.md | 1 + ...dataArrayAdvisoryCurlPaginatePagination.md | 1 + ...dataArrayAdvisoryCvrfPaginatePagination.md | 1 + ...aArrayAdvisoryDFNCertPaginatePagination.md | 1 + ...ataArrayAdvisoryDLinkPaginatePagination.md | 1 + ...adataArrayAdvisoryDNNPaginatePagination.md | 1 + ...ataArrayAdvisoryDahuaPaginatePagination.md | 1 + ...aArrayAdvisoryDanfossPaginatePagination.md | 1 + ...ArrayAdvisoryDassaultPaginatePagination.md | 1 + ...ebianSecurityAdvisoryPaginatePagination.md | 1 + ...dataArrayAdvisoryDellPaginatePagination.md | 1 + ...AdvisoryDeltaAdvisoryPaginatePagination.md | 1 + ...AdvisoryDistroPackagePaginatePagination.md | 1 + ...taArrayAdvisoryDjangoPaginatePagination.md | 1 + ...taArrayAdvisoryDotCMSPaginatePagination.md | 1 + ...dvisoryDragosAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryDraytekPaginatePagination.md | 1 + ...taArrayAdvisoryDrupalPaginatePagination.md | 1 + ...rayAdvisoryEOLAlibabaPaginatePagination.md | 1 + ...yAdvisoryEOLMicrosoftPaginatePagination.md | 1 + ...dvisoryEOLReleaseDataPaginatePagination.md | 1 + ...dataArrayAdvisoryEUVDPaginatePagination.md | 1 + ...AdvisoryEatonAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryElasticPaginatePagination.md | 1 + ...taArrayAdvisoryElspecPaginatePagination.md | 1 + ...yEmergingThreatsSnortPaginatePagination.md | 1 + ...visoryEmersonAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryEndOfLifePaginatePagination.md | 1 + ...aArrayAdvisoryEndressPaginatePagination.md | 1 + ...ayAdvisoryExodusIntelPaginatePagination.md | 1 + ...oryExploitDBExploitv2PaginatePagination.md | 1 + ...tadataArrayAdvisoryF5PaginatePagination.md | 1 + ...aArrayAdvisoryFSecurePaginatePagination.md | 1 + ...ataArrayAdvisoryFanucPaginatePagination.md | 1 + ...taArrayAdvisoryFastlyPaginatePagination.md | 1 + ...ataArrayAdvisoryFestoPaginatePagination.md | 1 + ...rrayAdvisoryFileCloudPaginatePagination.md | 1 + ...rrayAdvisoryFileZillaPaginatePagination.md | 1 + ...AdvisoryFlattSecurityPaginatePagination.md | 1 + ...rrayAdvisoryForgeRockPaginatePagination.md | 1 + ...isoryFortinetAdvisoryPaginatePagination.md | 1 + ...ayAdvisoryFortinetIPSPaginatePagination.md | 1 + ...ataArrayAdvisoryFoxitPaginatePagination.md | 1 + ...rrayAdvisoryFreseniusPaginatePagination.md | 1 + ...adataArrayAdvisoryGCPPaginatePagination.md | 1 + ...ataArrayAdvisoryGEGasPaginatePagination.md | 1 + ...yGEHealthcareAdvisoryPaginatePagination.md | 1 + ...oryGHAdvisoryJSONLeanPaginatePagination.md | 1 + ...dataArrayAdvisoryGHSAPaginatePagination.md | 1 + ...isoryGMOCyberSecurityPaginatePagination.md | 1 + ...rrayAdvisoryGallagherPaginatePagination.md | 1 + ...adataArrayAdvisoryGenPaginatePagination.md | 1 + ...aArrayAdvisoryGenetecPaginatePagination.md | 1 + ...ArrayAdvisoryGigabytePaginatePagination.md | 1 + ...AdvisoryGitHubExploitPaginatePagination.md | 1 + ...AdvisoryGitLabExploitPaginatePagination.md | 1 + ...yAdvisoryGiteeExploitPaginatePagination.md | 1 + ...dvisoryGitlabAdvisoryPaginatePagination.md | 1 + ...ataArrayAdvisoryGlibcPaginatePagination.md | 1 + ...taArrayAdvisoryGnuTLSPaginatePagination.md | 1 + ...rayAdvisoryGoVulnJSONPaginatePagination.md | 1 + ...aArrayAdvisoryGrafanaPaginatePagination.md | 1 + ...oryGreyNoiseDetectionPaginatePagination.md | 1 + ...adataArrayAdvisoryHCLPaginatePagination.md | 1 + ...rrayAdvisoryHIKVisionPaginatePagination.md | 1 + ...taArrayAdvisoryHKCertPaginatePagination.md | 1 + ...adataArrayAdvisoryHMSPaginatePagination.md | 1 + ...adataArrayAdvisoryHPEPaginatePagination.md | 1 + ...tadataArrayAdvisoryHPPaginatePagination.md | 1 + ...rayAdvisoryHacktivityPaginatePagination.md | 1 + ...rrayAdvisoryHarmonyOSPaginatePagination.md | 1 + ...rrayAdvisoryHashiCorpPaginatePagination.md | 1 + ...ryHaskellSADBAdvisoryPaginatePagination.md | 1 + ...visoryHillromAdvisoryPaginatePagination.md | 1 + ...AdvisoryHitachiEnergyPaginatePagination.md | 1 + ...aArrayAdvisoryHitachiPaginatePagination.md | 1 + ...rrayAdvisoryHoneywellPaginatePagination.md | 1 + ...AdvisoryHuaweiEulerOSPaginatePagination.md | 1 + ...rrayAdvisoryHuaweiIPSPaginatePagination.md | 1 + ...taArrayAdvisoryHuaweiPaginatePagination.md | 1 + ...dataArrayAdvisoryIAVAPaginatePagination.md | 1 + ...adataArrayAdvisoryIBMPaginatePagination.md | 1 + ...rayAdvisoryITWExploitPaginatePagination.md | 1 + ...taArrayAdvisoryIdemiaPaginatePagination.md | 1 + ...dataArrayAdvisoryIgelPaginatePagination.md | 1 + ...dvisoryIncibeAdvisoryPaginatePagination.md | 1 + ...ataArrayAdvisoryIntelPaginatePagination.md | 1 + ...AdvisoryIpIntelRecordPaginatePagination.md | 1 + ...yAdvisoryIsraeliAlertPaginatePagination.md | 1 + ...yIsraeliVulnerabilityPaginatePagination.md | 1 + ...ataArrayAdvisoryIstioPaginatePagination.md | 1 + ...taArrayAdvisoryIvantiPaginatePagination.md | 1 + ...rrayAdvisoryIvantiRSSPaginatePagination.md | 1 + ...ataArrayAdvisoryJFrogPaginatePagination.md | 1 + ...ayAdvisoryJNJAdvisoryPaginatePagination.md | 1 + ...visoryJVNAdvisoryItemPaginatePagination.md | 1 + ...adataArrayAdvisoryJVNPaginatePagination.md | 1 + ...aArrayAdvisoryJenkinsPaginatePagination.md | 1 + ...rrayAdvisoryJetBrainsPaginatePagination.md | 1 + ...visoryJohnsonControlsPaginatePagination.md | 1 + ...aArrayAdvisoryJuniperPaginatePagination.md | 1 + ...adataArrayAdvisoryK8SPaginatePagination.md | 1 + ...VCatalogVulnerabilityPaginatePagination.md | 1 + ...dvisoryKRCertAdvisoryPaginatePagination.md | 1 + ...perskyICSCERTAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryKoreLogicPaginatePagination.md | 1 + ...taArrayAdvisoryKunbusPaginatePagination.md | 1 + ...tadataArrayAdvisoryLGPaginatePagination.md | 1 + ...rrayAdvisoryLantronixPaginatePagination.md | 1 + ...taArrayAdvisoryLenovoPaginatePagination.md | 1 + ...visoryLexmarkAdvisoryPaginatePagination.md | 1 + ...ayAdvisoryLibreOfficePaginatePagination.md | 1 + ...ataArrayAdvisoryLinuxPaginatePagination.md | 1 + ...aArrayAdvisoryLolAdvsPaginatePagination.md | 1 + ...taArrayAdvisoryMACertPaginatePagination.md | 1 + ...taArrayAdvisoryMFilesPaginatePagination.md | 1 + ...isoryMaliciousPackagePaginatePagination.md | 1 + ...yManageEngineAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryMbedTLSPaginatePagination.md | 1 + ...taArrayAdvisoryMcAfeePaginatePagination.md | 1 + ...ArrayAdvisoryMediatekPaginatePagination.md | 1 + ...soryMedtronicAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryMendixPaginatePagination.md | 1 + ...dvisoryMetaAdvisoriesPaginatePagination.md | 1 + ...ArrayAdvisoryMetaDataPaginatePagination.md | 1 + ...soryMetasploitExploitPaginatePagination.md | 1 + ...AdvisoryMicrosoftCSAFPaginatePagination.md | 1 + ...AdvisoryMicrosoftCVRFPaginatePagination.md | 1 + ...rosoftDriverBlockListPaginatePagination.md | 1 + ...ayAdvisoryMicrosoftKbPaginatePagination.md | 1 + ...ArrayAdvisoryMikrotikPaginatePagination.md | 1 + ...aArrayAdvisoryMindrayPaginatePagination.md | 1 + ...rrayAdvisoryMispValuePaginatePagination.md | 1 + ...ataArrayAdvisoryMitelPaginatePagination.md | 1 + ...dvisoryMitreCVEListV5PaginatePagination.md | 1 + ...bishiElectricAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryMongoDBPaginatePagination.md | 1 + ...yAdvisoryMoxaAdvisoryPaginatePagination.md | 1 + ...visoryMozillaAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryNCSCCVEPaginatePagination.md | 1 + ...dataArrayAdvisoryNCSCPaginatePagination.md | 1 + ...adataArrayAdvisoryNECPaginatePagination.md | 1 + ...adataArrayAdvisoryNHSPaginatePagination.md | 1 + ...tadataArrayAdvisoryNIPaginatePagination.md | 1 + ...adataArrayAdvisoryNTPPaginatePagination.md | 1 + ...ayAdvisoryNVD20SourcePaginatePagination.md | 1 + ...isoryNVDCPEDictionaryPaginatePagination.md | 1 + ...rayAdvisoryNZAdvisoryPaginatePagination.md | 1 + ...ataArrayAdvisoryNaverPaginatePagination.md | 1 + ...taArrayAdvisoryNessusPaginatePagination.md | 1 + ...taArrayAdvisoryNetAppPaginatePagination.md | 1 + ...ArrayAdvisoryNetatalkPaginatePagination.md | 1 + ...aArrayAdvisoryNetgatePaginatePagination.md | 1 + ...aArrayAdvisoryNetgearPaginatePagination.md | 1 + ...ArrayAdvisoryNetskopePaginatePagination.md | 1 + ...aArrayAdvisoryNexposePaginatePagination.md | 1 + ...AdvisoryNginxAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryNodeJSPaginatePagination.md | 1 + ...yAdvisoryNodeSecurityPaginatePagination.md | 1 + ...ataArrayAdvisoryNokiaPaginatePagination.md | 1 + ...visoryNotePadPlusPlusPaginatePagination.md | 1 + ...taArrayAdvisoryNozomiPaginatePagination.md | 1 + ...taArrayAdvisoryNucleiPaginatePagination.md | 1 + ...adataArrayAdvisoryOSVPaginatePagination.md | 1 + ...dataArrayAdvisoryOTRSPaginatePagination.md | 1 + ...AdvisoryOctopusDeployPaginatePagination.md | 1 + ...dataArrayAdvisoryOktaPaginatePagination.md | 1 + ...ataArrayAdvisoryOmronPaginatePagination.md | 1 + ...dataArrayAdvisoryOneEPaginatePagination.md | 1 + ...aArrayAdvisoryOpenBSDPaginatePagination.md | 1 + ...ArrayAdvisoryOpenCVDBPaginatePagination.md | 1 + ...aArrayAdvisoryOpenJDKPaginatePagination.md | 1 + ...aArrayAdvisoryOpenSSHPaginatePagination.md | 1 + ...AdvisoryOpenSSLSecAdvPaginatePagination.md | 1 + ...rrayAdvisoryOpenStackPaginatePagination.md | 1 + ...ArrayAdvisoryOpengearPaginatePagination.md | 1 + ...AdvisoryOracleCPUCSAFPaginatePagination.md | 1 + ...rrayAdvisoryOracleCPUPaginatePagination.md | 1 + ...ArrayAdvisoryOwnCloudPaginatePagination.md | 1 + ...rayAdvisoryPHPMyAdminPaginatePagination.md | 1 + ...taArrayAdvisoryPKCertPaginatePagination.md | 1 + ...adataArrayAdvisoryPTCPaginatePagination.md | 1 + ...oryPacketstormExploitPaginatePagination.md | 1 + ...ArrayAdvisoryPalantirPaginatePagination.md | 1 + ...isoryPaloAltoAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryPanasonicPaginatePagination.md | 1 + ...ArrayAdvisoryPaperCutPaginatePagination.md | 1 + ...dataArrayAdvisoryPegaPaginatePagination.md | 1 + ...visoryPhilipsAdvisoryPaginatePagination.md | 1 + ...hoenixContactAdvisoryPaginatePagination.md | 1 + ...ayAdvisoryPostgresSQLPaginatePagination.md | 1 + ...ArrayAdvisoryPowerDNSPaginatePagination.md | 1 + ...ArrayAdvisoryProgressPaginatePagination.md | 1 + ...rayAdvisoryProofpointPaginatePagination.md | 1 + ...ayAdvisoryPureStoragePaginatePagination.md | 1 + ...yAdvisoryPyPAAdvisoryPaginatePagination.md | 1 + ...yAdvisoryQNAPAdvisoryPaginatePagination.md | 1 + ...dataArrayAdvisoryQQIDPaginatePagination.md | 1 + ...adataArrayAdvisoryQSBPaginatePagination.md | 1 + ...ArrayAdvisoryQualcommPaginatePagination.md | 1 + ...taArrayAdvisoryQualysPaginatePagination.md | 1 + ...rrayAdvisoryQualysQIDPaginatePagination.md | 1 + ...soryRansomwareExploitPaginatePagination.md | 1 + ...aArrayAdvisoryRedLionPaginatePagination.md | 1 + ...rrayAdvisoryRedhatCVEPaginatePagination.md | 1 + ...aArrayAdvisoryRenesasPaginatePagination.md | 1 + ...taArrayAdvisoryRevivePaginatePagination.md | 1 + ...aArrayAdvisoryRhelCVEPaginatePagination.md | 1 + ...ataArrayAdvisoryRochePaginatePagination.md | 1 + ...ArrayAdvisoryRockwellPaginatePagination.md | 1 + ...ayAdvisoryRockyErrataPaginatePagination.md | 1 + ...ataArrayAdvisoryRsyncPaginatePagination.md | 1 + ...taArrayAdvisoryRuckusPaginatePagination.md | 1 + ...visoryRustsecAdvisoryPaginatePagination.md | 1 + ...rayAdvisorySAAdvisoryPaginatePagination.md | 1 + ...adataArrayAdvisorySAPPaginatePagination.md | 1 + ...rayAdvisorySECConsultPaginatePagination.md | 1 + ...ayAdvisorySSDAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisorySafranPaginatePagination.md | 1 + ...yAdvisorySaintExploitPaginatePagination.md | 1 + ...rayAdvisorySalesForcePaginatePagination.md | 1 + ...ataArrayAdvisorySambaPaginatePagination.md | 1 + ...aArrayAdvisorySandiskPaginatePagination.md | 1 + ...ayAdvisorySansDshieldPaginatePagination.md | 1 + ...eiderElectricAdvisoryPaginatePagination.md | 1 + ...rayAdvisorySchutzwerkPaginatePagination.md | 1 + ...isorySecurityBulletinPaginatePagination.md | 1 + ...ayAdvisorySecurityLabPaginatePagination.md | 1 + ...AdvisorySeebugExploitPaginatePagination.md | 1 + ...adataArrayAdvisorySelPaginatePagination.md | 1 + ...ayAdvisorySentinelOnePaginatePagination.md | 1 + ...rayAdvisoryServiceNowPaginatePagination.md | 1 + ...ArrayAdvisorySevenZipPaginatePagination.md | 1 + ...xploitedVulnerabilityPaginatePagination.md | 1 + ...ArrayAdvisoryShielderPaginatePagination.md | 1 + ...dataArrayAdvisorySickPaginatePagination.md | 1 + ...visorySiemensAdvisoryPaginatePagination.md | 1 + ...dvisorySierraWirelessPaginatePagination.md | 1 + ...rrayAdvisorySigmaRulePaginatePagination.md | 1 + ...ArrayAdvisorySingCertPaginatePagination.md | 1 + ...ArrayAdvisorySitecorePaginatePagination.md | 1 + ...rrayAdvisorySlackwarePaginatePagination.md | 1 + ...orySolarWindsAdvisoryPaginatePagination.md | 1 + ...dataArrayAdvisorySolrPaginatePagination.md | 1 + ...ArrayAdvisorySonatypePaginatePagination.md | 1 + ...sorySonicWallAdvisoryPaginatePagination.md | 1 + ...absHealthcareAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisorySplunkPaginatePagination.md | 1 + ...taArrayAdvisorySpringPaginatePagination.md | 1 + ...ayAdvisoryStormshieldPaginatePagination.md | 1 + ...visoryStrykerAdvisoryPaginatePagination.md | 1 + ...dataArrayAdvisorySudoPaginatePagination.md | 1 + ...yAdvisorySuseSecurityPaginatePagination.md | 1 + ...logHealthcareAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisorySymfonyPaginatePagination.md | 1 + ...rrayAdvisorySynacktivPaginatePagination.md | 1 + ...rayAdvisorySyncroSoftPaginatePagination.md | 1 + ...ArrayAdvisorySynologyPaginatePagination.md | 1 + ...dataArrayAdvisorySyssPaginatePagination.md | 1 + ...tadataArrayAdvisoryTIPaginatePagination.md | 1 + ...taArrayAdvisoryTPLinkPaginatePagination.md | 1 + ...dvisoryTWCertAdvisoryPaginatePagination.md | 1 + ...rrayAdvisoryTailscalePaginatePagination.md | 1 + ...AdvisoryTalosAdvisoryPaginatePagination.md | 1 + ...rayAdvisoryTeamViewerPaginatePagination.md | 1 + ...nableResearchAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryTencentPaginatePagination.md | 1 + ...taArrayAdvisoryThalesPaginatePagination.md | 1 + ...dvisoryTheMissingLinkPaginatePagination.md | 1 + ...yAdvisoryThermoFisherPaginatePagination.md | 1 + ...orWithExternalObjectsPaginatePagination.md | 1 + ...ataArrayAdvisoryTibcoPaginatePagination.md | 1 + ...visoryTraneTechnologyPaginatePagination.md | 1 + ...rayAdvisoryTrendMicroPaginatePagination.md | 1 + ...rrayAdvisoryTrustwavePaginatePagination.md | 1 + ...adataArrayAdvisoryUSDPaginatePagination.md | 1 + ...yAdvisoryUSOMAdvisoryPaginatePagination.md | 1 + ...ArrayAdvisoryUbiquitiPaginatePagination.md | 1 + ...rrayAdvisoryUbuntuCVEPaginatePagination.md | 1 + ...ataArrayAdvisoryUnifyPaginatePagination.md | 1 + ...taArrayAdvisoryUnisocPaginatePagination.md | 1 + ...taArrayAdvisoryUpdatePaginatePagination.md | 1 + ...visoryVCCPEDictionaryPaginatePagination.md | 1 + ...isoryVCVulnerableCPEsPaginatePagination.md | 1 + ...ayAdvisoryVDEAdvisoryPaginatePagination.md | 1 + ...adataArrayAdvisoryVLCPaginatePagination.md | 1 + ...dvisoryVMWareAdvisoryPaginatePagination.md | 1 + ...dvisoryVYAIREAdvisoryPaginatePagination.md | 1 + ...aArrayAdvisoryVanDykePaginatePagination.md | 1 + ...soryVapidLabsAdvisoryPaginatePagination.md | 1 + ...ataArrayAdvisoryVeeamPaginatePagination.md | 1 + ...aArrayAdvisoryVeritasPaginatePagination.md | 1 + ...rrayAdvisoryVirtuozzoPaginatePagination.md | 1 + ...aArrayAdvisoryVoidSecPaginatePagination.md | 1 + ...oryVulnCheckCVEListV5PaginatePagination.md | 1 + ...visoryVulnCheckConfigPaginatePagination.md | 1 + ...yAdvisoryVulnCheckKEVPaginatePagination.md | 1 + ...rrayAdvisoryVulnCheckPaginatePagination.md | 1 + ...lnerableDebianPackagePaginatePagination.md | 1 + ...yAdvisoryVulnrichmentPaginatePagination.md | 1 + ...adataArrayAdvisoryWRTPaginatePagination.md | 1 + ...rayAdvisoryWatchGuardPaginatePagination.md | 1 + ...ArrayAdvisoryWhatsAppPaginatePagination.md | 1 + ...dataArrayAdvisoryWibuPaginatePagination.md | 1 + ...rrayAdvisoryWiresharkPaginatePagination.md | 1 + ...rayAdvisoryWithSecurePaginatePagination.md | 1 + ...aArrayAdvisoryWolfSSLPaginatePagination.md | 1 + ...ataArrayAdvisoryWolfiPaginatePagination.md | 1 + ...rrayAdvisoryWordfencePaginatePagination.md | 1 + ...adataArrayAdvisoryXenPaginatePagination.md | 1 + ...ataArrayAdvisoryXeroxPaginatePagination.md | 1 + ...taArrayAdvisoryXiaomiPaginatePagination.md | 1 + ...ataArrayAdvisoryXylemPaginatePagination.md | 1 + ...taArrayAdvisoryYamahaPaginatePagination.md | 1 + ...isoryYokogawaAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryYubicoPaginatePagination.md | 1 + ...ataArrayAdvisoryZebraPaginatePagination.md | 1 + ...visoryZeroDayAdvisoryPaginatePagination.md | 1 + ...ryZeroScienceAdvisoryPaginatePagination.md | 1 + ...taArrayAdvisoryZimbraPaginatePagination.md | 1 + ...dataArrayAdvisoryZoomPaginatePagination.md | 1 + ...aArrayAdvisoryZscalerPaginatePagination.md | 1 + ...dataArrayAdvisoryZusoPaginatePagination.md | 1 + ...ataArrayAdvisoryZyxelPaginatePagination.md | 1 + ...thMetadataArrayApiCWEPaginatePagination.md | 1 + ...ayApiCveItemsExtendedPaginatePagination.md | 1 + ...adataArrayApiCveItemsPaginatePagination.md | 1 + ...adataArrayApiEPSSDataPaginatePagination.md | 1 + ...aArrayApiExploitChainPaginatePagination.md | 1 + ...rayApiExploitV3ResultPaginatePagination.md | 1 + ...yApiExploitsChangelogPaginatePagination.md | 1 + ...ArrayApiInitialAccessPaginatePagination.md | 1 + ...ayApiMitreAttackToCVEPaginatePagination.md | 1 + ...ArrayApiNVD20CPEMatchPaginatePagination.md | 1 + ...ayApiNVD20CVEExtendedPaginatePagination.md | 1 + ...adataArrayApiNVD20CVEPaginatePagination.md | 1 + ...ataArrayApiOSSPackagePaginatePagination.md | 1 + ...etadataArrayApiUpdatePaginatePagination.md | 1 + ...rayApiVulnCheckCanaryPaginatePagination.md | 1 + ...ApiVulnerabilityAliasPaginatePagination.md | 1 + ...rrayPurlsPurlResponsePaginatePagination.md | 1 + ...rrayStringV3controllersResponseMetadata.md | 1 + ...DataV3controllersBackupResponseMetadata.md | 1 + ...seDataV3controllersPurlResponseMetadata.md | 1 + ...eDataV3controllersPurlsResponseMetadata.md | 1 + docs/SearchErrorResponse.md | 31 + docs/SearchV4AdvisoryMeta.md | 36 + docs/SearchV4AdvisoryReturnValue.md | 31 + ...AdvisoryCWENode.md => SearchV4FeedItem.md} | 20 +- docs/SearchV4ListFeedReturnValue.md | 30 + docs/V3controllersBackupResponseMetadata.md | 1 + docs/V3controllersPurlResponseData.md | 1 + docs/V3controllersPurlResponseMetadata.md | 3 +- docs/V3controllersPurlsResponseMetadata.md | 1 + docs/V3controllersResponseMetadata.md | 1 + openapi.json | 2 +- pyproject.toml | 2 +- python-generator-config.yaml | 2 +- setup.py | 8 +- test/aio/test_advisory_a10.py | 4 +- test/aio/test_advisory_abb_advisory.py | 4 +- test/aio/test_advisory_abbott.py | 4 +- test/aio/test_advisory_absolute.py | 4 +- test/aio/test_advisory_acknowledgement.py | 4 +- test/aio/test_advisory_acronis.py | 4 +- test/aio/test_advisory_adobe_advisory.py | 4 +- test/aio/test_advisory_adobe_affected.py | 4 +- test/aio/test_advisory_adobe_cve.py | 4 +- test/aio/test_advisory_adobe_solution.py | 4 +- test/aio/test_advisory_adp.py | 4 +- test/aio/test_advisory_adp_container.py | 4 +- test/aio/test_advisory_advantech.py | 4 +- test/aio/test_advisory_advisory.py | 4 +- test/aio/test_advisory_advisory_details.py | 10 +- test/aio/test_advisory_advisory_record.py | 4 +- test/aio/test_advisory_affected.py | 4 +- test/aio/test_advisory_affected_chrome.py | 4 +- .../test_advisory_affected_debian_package.py | 4 +- .../test_advisory_affected_debian_release.py | 4 +- ...est_advisory_affected_debian_repository.py | 4 +- test/aio/test_advisory_affected_file.py | 4 +- test/aio/test_advisory_affected_product.py | 4 +- test/aio/test_advisory_affected_rel.py | 4 +- .../test_advisory_affected_ubuntu_package.py | 4 +- test/aio/test_advisory_aix.py | 4 +- test/aio/test_advisory_aleph_research.py | 4 +- test/aio/test_advisory_alibaba.py | 4 +- test/aio/test_advisory_alma_date.py | 4 +- test/aio/test_advisory_alma_linux_update.py | 4 +- test/aio/test_advisory_alma_object_id.py | 4 +- test/aio/test_advisory_alma_package.py | 4 +- test/aio/test_advisory_alma_package_list.py | 4 +- test/aio/test_advisory_alma_reference.py | 4 +- test/aio/test_advisory_alpine_linux_sec_db.py | 4 +- ...st_advisory_alpine_linux_sec_db_package.py | 4 +- ...test_advisory_alpine_linux_security_fix.py | 4 +- .../test_advisory_amazon_affected_package.py | 4 +- test/aio/test_advisory_amazon_cve.py | 4 +- test/aio/test_advisory_amd.py | 4 +- test/aio/test_advisory_ami.py | 4 +- .../aio/test_advisory_anchore_nvd_override.py | 4 +- test/aio/test_advisory_android_advisory.py | 4 +- test/aio/test_advisory_android_affected.py | 4 +- test/aio/test_advisory_android_event.py | 4 +- test/aio/test_advisory_android_package.py | 4 +- test/aio/test_advisory_android_range.py | 4 +- test/aio/test_advisory_android_reference.py | 4 +- test/aio/test_advisory_apache_active_mq.py | 4 +- test/aio/test_advisory_apache_archiva.py | 4 +- test/aio/test_advisory_apache_arrow.py | 4 +- test/aio/test_advisory_apache_camel.py | 4 +- test/aio/test_advisory_apache_commons.py | 4 +- test/aio/test_advisory_apache_couch_db.py | 4 +- test/aio/test_advisory_apache_flink.py | 4 +- test/aio/test_advisory_apache_guacamole.py | 4 +- test/aio/test_advisory_apache_hadoop.py | 4 +- test/aio/test_advisory_apache_http.py | 4 +- test/aio/test_advisory_apache_jsp_wiki.py | 4 +- test/aio/test_advisory_apache_kafka.py | 4 +- .../test_advisory_apache_logging_services.py | 4 +- test/aio/test_advisory_apache_ni_fi.py | 4 +- test/aio/test_advisory_apache_of_biz.py | 4 +- .../aio/test_advisory_apache_open_meetings.py | 4 +- test/aio/test_advisory_apache_open_office.py | 4 +- test/aio/test_advisory_apache_pulsar.py | 4 +- test/aio/test_advisory_apache_shiro.py | 4 +- test/aio/test_advisory_apache_spark.py | 4 +- test/aio/test_advisory_apache_struts.py | 4 +- test/aio/test_advisory_apache_subversion.py | 4 +- test/aio/test_advisory_apache_superset.py | 4 +- test/aio/test_advisory_apache_tomcat.py | 4 +- test/aio/test_advisory_apache_zoo_keeper.py | 4 +- test/aio/test_advisory_api.py | 46 + test/aio/test_advisory_app_check.py | 4 +- test/aio/test_advisory_appgate.py | 4 +- test/aio/test_advisory_apple_advisory.py | 4 +- test/aio/test_advisory_apple_component.py | 4 +- test/aio/test_advisory_arch_issue.py | 4 +- test/aio/test_advisory_arista.py | 4 +- test/aio/test_advisory_aruba.py | 4 +- test/aio/test_advisory_asrg.py | 4 +- test/aio/test_advisory_asset_note.py | 4 +- test/aio/test_advisory_asterisk.py | 4 +- test/aio/test_advisory_astra.py | 4 +- test/aio/test_advisory_asus.py | 4 +- test/aio/test_advisory_atlassian_advisory.py | 4 +- test/aio/test_advisory_atlassian_products.py | 4 +- test/aio/test_advisory_atlassian_vuln.py | 4 +- test/aio/test_advisory_atredis.py | 4 +- test/aio/test_advisory_audiocodes.py | 4 +- test/aio/test_advisory_aus_cert.py | 4 +- test/aio/test_advisory_autodesk.py | 4 +- test/aio/test_advisory_avaya.py | 4 +- test/aio/test_advisory_aveva_advisory.py | 4 +- test/aio/test_advisory_avidml_advs.py | 4 +- test/aio/test_advisory_avigilon.py | 4 +- test/aio/test_advisory_award.py | 4 +- test/aio/test_advisory_aws.py | 4 +- test/aio/test_advisory_axis.py | 4 +- test/aio/test_advisory_azul.py | 4 +- test/aio/test_advisory_b_braun_advisory.py | 4 +- test/aio/test_advisory_bandr.py | 4 +- test/aio/test_advisory_baxter_advisory.py | 4 +- test/aio/test_advisory_bdu_advisory.py | 4 +- test/aio/test_advisory_bdu_cvss.py | 4 +- test/aio/test_advisory_bdu_cvss3.py | 4 +- test/aio/test_advisory_bdu_environment.py | 4 +- test/aio/test_advisory_bdu_soft.py | 4 +- test/aio/test_advisory_bdu_types.py | 4 +- test/aio/test_advisory_bdu_vector.py | 4 +- .../test_advisory_bdu_vulnerable_software.py | 4 +- test/aio/test_advisory_bduos.py | 4 +- test/aio/test_advisory_beckhoff_advisory.py | 4 +- test/aio/test_advisory_beckman_coulter.py | 4 +- ...test_advisory_becton_dickinson_advisory.py | 4 +- test/aio/test_advisory_belden_advisory.py | 4 +- test/aio/test_advisory_beyond_trust.py | 4 +- test/aio/test_advisory_binarly.py | 4 +- test/aio/test_advisory_bit_defender.py | 4 +- test/aio/test_advisory_black_berry.py | 4 +- test/aio/test_advisory_bls.py | 4 +- test/aio/test_advisory_bosch_advisory.py | 4 +- ...est_advisory_boston_scientific_advisory.py | 4 +- test/aio/test_advisory_botnet.py | 4 +- test/aio/test_advisory_bugzilla.py | 4 +- .../test_advisory_ca_cyber_centre_advisory.py | 4 +- test/aio/test_advisory_canvas_exploit.py | 4 +- test/aio/test_advisory_capec.py | 4 +- test/aio/test_advisory_carestream_advisory.py | 4 +- test/aio/test_advisory_carrier.py | 4 +- test/aio/test_advisory_cbl_mariner.py | 4 +- test/aio/test_advisory_centos_package.py | 4 +- test/aio/test_advisory_cert_be.py | 4 +- test/aio/test_advisory_cert_fr_advisory.py | 4 +- test/aio/test_advisory_cert_in.py | 4 +- .../test_advisory_cert_ir_security_alert.py | 4 +- test/aio/test_advisory_cert_se.py | 4 +- test/aio/test_advisory_cert_ua.py | 4 +- test/aio/test_advisory_certeu_advisory.py | 4 +- test/aio/test_advisory_cesa.py | 4 +- test/aio/test_advisory_chain_guard.py | 4 +- test/aio/test_advisory_chain_guard_package.py | 4 +- test/aio/test_advisory_chain_guard_sec_fix.py | 4 +- test/aio/test_advisory_check_point.py | 4 +- test/aio/test_advisory_chrome.py | 4 +- test/aio/test_advisory_ciena.py | 4 +- test/aio/test_advisory_cis_control.py | 4 +- test/aio/test_advisory_cisa_alert.py | 4 +- test/aio/test_advisory_cisa_csaf_adv.py | 79 +- test/aio/test_advisory_cisco_advisory.py | 4 +- test/aio/test_advisory_cisco_csaf.py | 4 +- .../test_advisory_cisco_known_good_value.py | 4 +- test/aio/test_advisory_citrix_advisory.py | 4 +- .../test_advisory_claroty_vulnerability.py | 4 +- test/aio/test_advisory_cloud_bees.py | 4 +- .../test_advisory_cloud_vuln_db_advisory.py | 4 +- test/aio/test_advisory_cnnvd_entry_json.py | 4 +- test/aio/test_advisory_cnvd_bulletin.py | 4 +- test/aio/test_advisory_cnvd_flaw.py | 4 +- test/aio/test_advisory_codesys_advisory.py | 4 +- test/aio/test_advisory_comm_vault.py | 4 +- .../test_advisory_comm_vault_cve_details.py | 4 +- ...st_advisory_comm_vault_impacted_product.py | 4 +- ...ory_comm_vault_impacted_product_details.py | 4 +- .../test_advisory_comm_vault_resolution.py | 4 +- ..._advisory_comm_vault_resolution_details.py | 4 +- test/aio/test_advisory_compass_security.py | 4 +- test/aio/test_advisory_container_os.py | 4 +- test/aio/test_advisory_core_impact_exploit.py | 4 +- test/aio/test_advisory_correction.py | 4 +- test/aio/test_advisory_cos_update.py | 4 +- test/aio/test_advisory_cpe_match.py | 4 +- test/aio/test_advisory_cpe_node.py | 4 +- test/aio/test_advisory_credit.py | 4 +- test/aio/test_advisory_crestron.py | 4 +- test/aio/test_advisory_crowd_sec.py | 4 +- test/aio/test_advisory_csaf.py | 8 +- test/aio/test_advisory_csaf_note.py | 4 +- test/aio/test_advisory_csaf_reference.py | 4 +- test/aio/test_advisory_csaf_relationship.py | 8 +- test/aio/test_advisory_csaf_score.py | 4 +- test/aio/test_advisory_csaf_vulnerability.py | 4 +- test/aio/test_advisory_curl.py | 4 +- test/aio/test_advisory_curl_affected.py | 4 +- test/aio/test_advisory_curl_credit.py | 4 +- test/aio/test_advisory_curl_cwe.py | 4 +- test/aio/test_advisory_curl_range.py | 4 +- test/aio/test_advisory_cve_detail.py | 4 +- test/aio/test_advisory_cve_details_link.py | 4 +- test/aio/test_advisory_cve_reference.py | 4 +- test/aio/test_advisory_cvrf.py | 70 +- test/aio/test_advisory_cvrf_reference.py | 53 - test/aio/test_advisory_cvss.py | 4 +- test/aio/test_advisory_cvsss_v23.py | 4 +- test/aio/test_advisory_cvssv2.py | 4 +- test/aio/test_advisory_cvssv3.py | 4 +- test/aio/test_advisory_cvssv40.py | 4 +- test/aio/test_advisory_cvssv40_threat.py | 4 +- test/aio/test_advisory_cwe.py | 4 +- .../aio/test_advisory_cwe_acceptance_level.py | 4 +- test/aio/test_advisory_cwe_data.py | 4 +- test/aio/test_advisory_cwes.py | 13 +- test/aio/test_advisory_cycle.py | 4 +- test/aio/test_advisory_d_link.py | 4 +- test/aio/test_advisory_dahua.py | 4 +- .../aio/test_advisory_dan_foss_cve_details.py | 4 +- test/aio/test_advisory_danfoss.py | 4 +- test/aio/test_advisory_dassault.py | 4 +- test/aio/test_advisory_date_time.py | 52 - test/aio/test_advisory_db_specific.py | 4 +- test/aio/test_advisory_debian_cve.py | 4 +- .../test_advisory_debian_security_advisory.py | 4 +- test/aio/test_advisory_dell.py | 4 +- test/aio/test_advisory_dell_cve.py | 4 +- test/aio/test_advisory_delta_advisory.py | 4 +- test/aio/test_advisory_dfn_cert.py | 4 +- test/aio/test_advisory_distro_package.py | 4 +- test/aio/test_advisory_distro_version.py | 4 +- test/aio/test_advisory_django.py | 4 +- test/aio/test_advisory_dnn.py | 4 +- test/aio/test_advisory_document_metadata.py | 4 +- test/aio/test_advisory_document_note.py | 54 - test/aio/test_advisory_document_publisher.py | 4 +- test/aio/test_advisory_document_tracking.py | 62 - test/aio/test_advisory_dot_cms.py | 4 +- test/aio/test_advisory_dragos_advisory.py | 4 +- test/aio/test_advisory_draytek.py | 4 +- test/aio/test_advisory_drupal.py | 4 +- test/aio/test_advisory_eaton_advisory.py | 4 +- test/aio/test_advisory_eco_system.py | 4 +- test/aio/test_advisory_elastic.py | 4 +- test/aio/test_advisory_elspec.py | 4 +- .../test_advisory_emerging_threats_snort.py | 4 +- test/aio/test_advisory_emerson_advisory.py | 4 +- test/aio/test_advisory_end_of_life.py | 14 +- test/aio/test_advisory_endress.py | 4 +- test/aio/test_advisory_enisa_id_product.py | 4 +- test/aio/test_advisory_enisa_id_vendor.py | 4 +- test/aio/test_advisory_eol_alibaba.py | 4 +- test/aio/test_advisory_eol_microsoft.py | 4 +- test/aio/test_advisory_eol_release_data.py | 4 +- test/aio/test_advisory_euvd.py | 4 +- test/aio/test_advisory_event.py | 4 +- test/aio/test_advisory_exodus_intel.py | 4 +- .../aio/test_advisory_exploit_db_exploitv2.py | 4 +- test/aio/test_advisory_external_references.py | 4 +- test/aio/test_advisory_f5.py | 4 +- test/aio/test_advisory_f_secure.py | 4 +- test/aio/test_advisory_fanuc.py | 4 +- test/aio/test_advisory_fastly.py | 4 +- test/aio/test_advisory_festo.py | 4 +- test/aio/test_advisory_file_cloud.py | 4 +- test/aio/test_advisory_file_zilla.py | 4 +- test/aio/test_advisory_fix_aff.py | 4 +- test/aio/test_advisory_flag.py | 4 +- test/aio/test_advisory_flatt_security.py | 4 +- test/aio/test_advisory_forge_rock.py | 4 +- test/aio/test_advisory_fortinet_advisory.py | 4 +- test/aio/test_advisory_fortinet_ips.py | 4 +- test/aio/test_advisory_foxit.py | 4 +- test/aio/test_advisory_foxit_affected.py | 4 +- test/aio/test_advisory_fresenius.py | 4 +- test/aio/test_advisory_gallagher.py | 4 +- test/aio/test_advisory_gcp.py | 4 +- test/aio/test_advisory_ge_gas.py | 4 +- .../test_advisory_ge_healthcare_advisory.py | 4 +- test/aio/test_advisory_gen.py | 4 +- test/aio/test_advisory_genetec.py | 4 +- .../test_advisory_gh_advisory_json_lean.py | 13 +- test/aio/test_advisory_gh_cvss.py | 4 +- test/aio/test_advisory_gh_identifier.py | 4 +- test/aio/test_advisory_gh_node.py | 4 +- test/aio/test_advisory_gh_package.py | 4 +- test/aio/test_advisory_gh_reference.py | 4 +- test/aio/test_advisory_gh_vulnerabilities.py | 4 +- test/aio/test_advisory_ghsa.py | 4 +- test/aio/test_advisory_ghsa_affected.py | 4 +- .../test_advisory_ghsa_database_specific.py | 4 +- .../test_advisory_ghsa_eco_system_specific.py | 4 +- test/aio/test_advisory_ghsa_event.py | 4 +- test/aio/test_advisory_ghsa_package.py | 4 +- test/aio/test_advisory_ghsa_range.py | 4 +- test/aio/test_advisory_ghsa_reference.py | 4 +- test/aio/test_advisory_ghsa_severity.py | 4 +- test/aio/test_advisory_gigabyte.py | 4 +- test/aio/test_advisory_git_hub_exploit.py | 4 +- test/aio/test_advisory_git_lab_exploit.py | 4 +- test/aio/test_advisory_gitee_exploit.py | 4 +- test/aio/test_advisory_gitlab_advisory.py | 4 +- test/aio/test_advisory_glibc.py | 4 +- test/aio/test_advisory_gmo_cyber_security.py | 4 +- test/aio/test_advisory_gnu_tls.py | 4 +- test/aio/test_advisory_go_credits.py | 4 +- test/aio/test_advisory_go_event.py | 4 +- test/aio/test_advisory_go_vuln_affected.py | 4 +- ...test_advisory_go_vuln_database_specific.py | 4 +- ...est_advisory_go_vuln_ecosystem_specific.py | 4 +- test/aio/test_advisory_go_vuln_import.py | 4 +- test/aio/test_advisory_go_vuln_json.py | 4 +- test/aio/test_advisory_go_vuln_package.py | 4 +- test/aio/test_advisory_go_vuln_ranges.py | 4 +- test/aio/test_advisory_go_vuln_reference.py | 4 +- test/aio/test_advisory_grafana.py | 4 +- .../aio/test_advisory_grey_noise_detection.py | 4 +- test/aio/test_advisory_grey_noise_tags.py | 4 +- test/aio/test_advisory_hacktivity.py | 4 +- test/aio/test_advisory_hardware_update.py | 4 +- test/aio/test_advisory_harmony_os.py | 4 +- test/aio/test_advisory_hashi_corp.py | 4 +- test/aio/test_advisory_haskell_affected.py | 4 +- .../test_advisory_haskell_sadb_advisory.py | 4 +- test/aio/test_advisory_haskell_version.py | 4 +- test/aio/test_advisory_hcl.py | 4 +- test/aio/test_advisory_hik_vision.py | 4 +- test/aio/test_advisory_hillrom_advisory.py | 4 +- test/aio/test_advisory_hitachi.py | 4 +- test/aio/test_advisory_hitachi_energy.py | 4 +- test/aio/test_advisory_hk_cert.py | 4 +- test/aio/test_advisory_hms.py | 4 +- test/aio/test_advisory_honeywell.py | 4 +- test/aio/test_advisory_hp.py | 4 +- test/aio/test_advisory_hpe.py | 4 +- test/aio/test_advisory_huawei.py | 4 +- test/aio/test_advisory_huawei_euler_os.py | 4 +- test/aio/test_advisory_huawei_ips.py | 4 +- test/aio/test_advisory_i_val.py | 4 +- test/aio/test_advisory_iava.py | 4 +- test/aio/test_advisory_ibm.py | 4 +- test/aio/test_advisory_idemia.py | 4 +- test/aio/test_advisory_igel.py | 4 +- test/aio/test_advisory_impact.py | 4 +- test/aio/test_advisory_incibe_advisory.py | 4 +- test/aio/test_advisory_intel.py | 4 +- test/aio/test_advisory_ip_intel_record.py | 4 +- test/aio/test_advisory_israeli_alert.py | 4 +- .../test_advisory_israeli_vulnerability.py | 4 +- test/aio/test_advisory_issued.py | 52 - test/aio/test_advisory_istio.py | 4 +- test/aio/test_advisory_itw.py | 4 +- test/aio/test_advisory_itw_exploit.py | 4 +- test/aio/test_advisory_ivanti.py | 4 +- test/aio/test_advisory_ivanti_rss.py | 4 +- test/aio/test_advisory_j_frog.py | 4 +- test/aio/test_advisory_jenkins.py | 4 +- test/aio/test_advisory_jet_brains.py | 4 +- test/aio/test_advisory_jnj_advisory.py | 4 +- test/aio/test_advisory_johnson_controls.py | 4 +- test/aio/test_advisory_juniper.py | 4 +- test/aio/test_advisory_jvn.py | 4 +- test/aio/test_advisory_jvn_advisory_item.py | 4 +- test/aio/test_advisory_jvn_reference.py | 4 +- test/aio/test_advisory_jvncpe.py | 4 +- test/aio/test_advisory_k8_s.py | 4 +- ...est_advisory_kaspersky_icscert_advisory.py | 4 +- test/aio/test_advisory_kb.py | 4 +- .../test_advisory_kb_threat_description.py | 4 +- ...test_advisory_kev_catalog_vulnerability.py | 4 +- test/aio/test_advisory_kore_logic.py | 4 +- test/aio/test_advisory_kr_cert_advisory.py | 4 +- test/aio/test_advisory_kunbus.py | 4 +- test/aio/test_advisory_lantronix.py | 4 +- test/aio/test_advisory_lenovo.py | 4 +- test/aio/test_advisory_lexmark_advisory.py | 4 +- test/aio/test_advisory_lg.py | 4 +- test/aio/test_advisory_libre_office.py | 4 +- test/aio/test_advisory_linux.py | 4 +- test/aio/test_advisory_log_source.py | 4 +- test/aio/test_advisory_lol_advs.py | 6 +- test/aio/test_advisory_m_affected.py | 4 +- test/aio/test_advisory_m_branch.py | 4 +- test/aio/test_advisory_m_cna.py | 4 +- test/aio/test_advisory_m_containers.py | 9 +- test/aio/test_advisory_m_cve_metadata.py | 4 +- test/aio/test_advisory_m_cvss_v20.py | 4 +- test/aio/test_advisory_m_cvss_v30.py | 4 +- test/aio/test_advisory_m_cvss_v31.py | 4 +- test/aio/test_advisory_m_cvss_v40.py | 4 +- test/aio/test_advisory_m_descriptions.py | 4 +- test/aio/test_advisory_m_document_tracking.py | 4 +- test/aio/test_advisory_m_files.py | 4 +- test/aio/test_advisory_m_full_product_name.py | 4 +- test/aio/test_advisory_m_identification.py | 4 +- test/aio/test_advisory_m_item.py | 4 +- test/aio/test_advisory_m_nodes.py | 4 +- test/aio/test_advisory_m_problem_types.py | 4 +- test/aio/test_advisory_m_product_status.py | 4 +- test/aio/test_advisory_m_product_tree.py | 4 +- test/aio/test_advisory_m_provider_metadata.py | 4 +- test/aio/test_advisory_m_reference.py | 4 +- test/aio/test_advisory_m_remediation.py | 4 +- test/aio/test_advisory_m_version.py | 4 +- test/aio/test_advisory_m_vulnerability.py | 4 +- test/aio/test_advisory_ma_cert.py | 4 +- test/aio/test_advisory_malicious_package.py | 8 +- test/aio/test_advisory_manage_engine.py | 4 +- .../test_advisory_manage_engine_advisory.py | 4 +- test/aio/test_advisory_mbed_tls.py | 4 +- test/aio/test_advisory_mc_afee.py | 4 +- test/aio/test_advisory_mc_afee_score.py | 4 +- test/aio/test_advisory_mcpe_applicability.py | 4 +- test/aio/test_advisory_mcpe_match.py | 4 +- test/aio/test_advisory_me_product.py | 4 +- test/aio/test_advisory_mediatek.py | 4 +- test/aio/test_advisory_medtronic_advisory.py | 4 +- test/aio/test_advisory_mendix.py | 4 +- test/aio/test_advisory_meta_advisories.py | 4 +- test/aio/test_advisory_meta_data.py | 10 +- test/aio/test_advisory_metasploit_exploit.py | 4 +- test/aio/test_advisory_metric.py | 4 +- test/aio/test_advisory_metric_scenario.py | 4 +- test/aio/test_advisory_metrics_other.py | 4 +- test/aio/test_advisory_microsoft_csaf.py | 79 +- test/aio/test_advisory_microsoft_cvrf.py | 4 +- ...st_advisory_microsoft_driver_block_list.py | 4 +- .../test_advisory_microsoft_file_metadata.py | 4 +- test/aio/test_advisory_microsoft_kb.py | 4 +- test/aio/test_advisory_mikrotik.py | 4 +- test/aio/test_advisory_mindray.py | 4 +- test/aio/test_advisory_misp_meta.py | 4 +- test/aio/test_advisory_misp_related_item.py | 4 +- test/aio/test_advisory_misp_value.py | 4 +- test/aio/test_advisory_misp_value_no_id.py | 4 +- test/aio/test_advisory_mitel.py | 4 +- .../test_advisory_mitre_attack_group_no_id.py | 4 +- test/aio/test_advisory_mitre_attack_ref.py | 4 +- ...st_advisory_mitre_attack_tech_with_refs.py | 4 +- .../test_advisory_mitre_attack_technique.py | 4 +- test/aio/test_advisory_mitre_cve_list_v5.py | 13 +- .../test_advisory_mitre_cve_list_v5_ref.py | 13 +- test/aio/test_advisory_mitre_group_cti.py | 4 +- ...t_advisory_mitsubishi_electric_advisory.py | 4 +- test/aio/test_advisory_mongo_db.py | 4 +- test/aio/test_advisory_moxa_advisory.py | 4 +- test/aio/test_advisory_mozilla_advisory.py | 4 +- test/aio/test_advisory_mozilla_component.py | 4 +- test/aio/test_advisory_ms_document_title.py | 4 +- test/aio/test_advisory_mscvrf.py | 4 +- test/aio/test_advisory_naver.py | 4 +- test/aio/test_advisory_ncsc.py | 79 +- test/aio/test_advisory_ncsccve.py | 79 +- test/aio/test_advisory_nec.py | 4 +- test/aio/test_advisory_nessus.py | 4 +- test/aio/test_advisory_net_app.py | 4 +- test/aio/test_advisory_netatalk.py | 4 +- test/aio/test_advisory_netgate.py | 4 +- test/aio/test_advisory_netgear.py | 4 +- test/aio/test_advisory_netskope.py | 4 +- test/aio/test_advisory_nexpose.py | 4 +- test/aio/test_advisory_nginx_advisory.py | 4 +- test/aio/test_advisory_nhs.py | 4 +- test/aio/test_advisory_ni.py | 4 +- test/aio/test_advisory_nist_control.py | 4 +- test/aio/test_advisory_node_author.py | 4 +- test/aio/test_advisory_node_js.py | 4 +- test/aio/test_advisory_node_security.py | 4 +- test/aio/test_advisory_nokia.py | 4 +- test/aio/test_advisory_note.py | 4 +- test/aio/test_advisory_note_pad_plus_plus.py | 4 +- test/aio/test_advisory_nozomi.py | 4 +- test/aio/test_advisory_ntp.py | 4 +- test/aio/test_advisory_nuclei.py | 4 +- test/aio/test_advisory_nvd20_configuration.py | 4 +- test/aio/test_advisory_nvd20_cvecpe_match.py | 4 +- test/aio/test_advisory_nvd20_node.py | 4 +- test/aio/test_advisory_nvd20_source.py | 4 +- test/aio/test_advisory_nvdcpe_dictionary.py | 4 +- test/aio/test_advisory_nvidia_revision.py | 4 +- test/aio/test_advisory_nz_advisory.py | 4 +- test/aio/test_advisory_o_curl.py | 4 +- test/aio/test_advisory_octopus_deploy.py | 4 +- test/aio/test_advisory_okta.py | 4 +- test/aio/test_advisory_omron.py | 4 +- test/aio/test_advisory_one_e.py | 4 +- test/aio/test_advisory_open_bsd.py | 4 +- test/aio/test_advisory_open_cvdb.py | 4 +- test/aio/test_advisory_open_jdk.py | 4 +- test/aio/test_advisory_open_jdkcve.py | 4 +- test/aio/test_advisory_open_ssh.py | 4 +- test/aio/test_advisory_open_ssl_sec_adv.py | 4 +- .../test_advisory_open_ssl_vulnerability.py | 4 +- test/aio/test_advisory_open_stack.py | 4 +- test/aio/test_advisory_opengear.py | 4 +- test/aio/test_advisory_oracle_cpu.py | 4 +- test/aio/test_advisory_oracle_cpucsaf.py | 79 +- test/aio/test_advisory_original_ghsa.py | 4 +- test/aio/test_advisory_osv.py | 8 +- test/aio/test_advisory_osv_obj.py | 8 +- test/aio/test_advisory_osv_package.py | 4 +- test/aio/test_advisory_osv_reference.py | 4 +- test/aio/test_advisory_otrs.py | 4 +- test/aio/test_advisory_oval_cve.py | 4 +- test/aio/test_advisory_oval_reference.py | 4 +- test/aio/test_advisory_override.py | 4 +- test/aio/test_advisory_override_annotation.py | 4 +- .../test_advisory_override_configuration.py | 4 +- test/aio/test_advisory_override_cve.py | 4 +- test/aio/test_advisory_own_cloud.py | 4 +- test/aio/test_advisory_package.py | 4 +- test/aio/test_advisory_package_stat.py | 4 +- test/aio/test_advisory_packetstorm_exploit.py | 4 +- test/aio/test_advisory_palantir.py | 4 +- test/aio/test_advisory_palo_alto_advisory.py | 4 +- test/aio/test_advisory_panasonic.py | 4 +- test/aio/test_advisory_paper_cut.py | 4 +- test/aio/test_advisory_patch.py | 4 +- test/aio/test_advisory_pega.py | 4 +- test/aio/test_advisory_pg_fix.py | 4 +- test/aio/test_advisory_philips_advisory.py | 4 +- .../test_advisory_phoenix_contact_advisory.py | 4 +- test/aio/test_advisory_phpmy_admin.py | 4 +- test/aio/test_advisory_pk_cert.py | 4 +- test/aio/test_advisory_postgres_sql.py | 4 +- test/aio/test_advisory_power_dns.py | 4 +- test/aio/test_advisory_prime_version.py | 4 +- test/aio/test_advisory_product.py | 8 +- test/aio/test_advisory_product_branch.py | 20 +- .../test_advisory_product_specific_detail.py | 4 +- test/aio/test_advisory_product_tree.py | 57 - test/aio/test_advisory_products_affected.py | 4 +- test/aio/test_advisory_progress.py | 4 +- test/aio/test_advisory_proofpoint.py | 4 +- test/aio/test_advisory_ptc.py | 4 +- test/aio/test_advisory_ptm_descriptions.py | 4 +- test/aio/test_advisory_publisher.py | 4 +- test/aio/test_advisory_pure_storage.py | 4 +- test/aio/test_advisory_py_pa_advisory.py | 4 +- test/aio/test_advisory_py_pa_affected.py | 4 +- test/aio/test_advisory_py_pa_event.py | 4 +- test/aio/test_advisory_py_pa_package.py | 4 +- test/aio/test_advisory_py_pa_range.py | 4 +- test/aio/test_advisory_py_pa_reference.py | 4 +- test/aio/test_advisory_qnap_advisory.py | 4 +- test/aio/test_advisory_qqid.py | 4 +- test/aio/test_advisory_qsb.py | 4 +- test/aio/test_advisory_qualcomm.py | 4 +- test/aio/test_advisory_qualys.py | 4 +- test/aio/test_advisory_qualys_qid.py | 4 +- test/aio/test_advisory_r_description.py | 4 +- test/aio/test_advisory_r_note.py | 4 +- test/aio/test_advisory_r_revision.py | 4 +- test/aio/test_advisory_r_score_set.py | 4 +- test/aio/test_advisory_r_threat.py | 4 +- test/aio/test_advisory_range.py | 4 +- test/aio/test_advisory_ransomware_exploit.py | 4 +- test/aio/test_advisory_record_type.py | 4 +- test/aio/test_advisory_red_lion.py | 4 +- test/aio/test_advisory_redhat_cve.py | 4 +- test/aio/test_advisory_reference.py | 4 +- test/aio/test_advisory_related_rule.py | 4 +- test/aio/test_advisory_relationship.py | 54 - test/aio/test_advisory_remediation_data.py | 4 +- test/aio/test_advisory_renesas.py | 4 +- test/aio/test_advisory_reported_exploit.py | 4 +- test/aio/test_advisory_restart_data.py | 4 +- test/aio/test_advisory_revision.py | 54 - test/aio/test_advisory_revision_history.py | 4 +- test/aio/test_advisory_revive.py | 4 +- test/aio/test_advisory_rhel_cve.py | 79 +- test/aio/test_advisory_roche.py | 4 +- test/aio/test_advisory_roche_cve.py | 4 +- test/aio/test_advisory_rockwell.py | 4 +- ...test_advisory_rockwell_affected_product.py | 4 +- test/aio/test_advisory_rocky_advisory.py | 4 +- test/aio/test_advisory_rocky_cve.py | 4 +- test/aio/test_advisory_rocky_errata.py | 4 +- test/aio/test_advisory_rocky_fix.py | 4 +- test/aio/test_advisory_rocky_package.py | 4 +- test/aio/test_advisory_rocky_version.py | 4 +- test/aio/test_advisory_rsync.py | 4 +- test/aio/test_advisory_ruckus.py | 4 +- test/aio/test_advisory_rustsec_advisory.py | 4 +- test/aio/test_advisory_rustsec_affected.py | 4 +- ..._advisory_rustsec_front_matter_advisory.py | 4 +- ..._advisory_rustsec_front_matter_versions.py | 4 +- test/aio/test_advisory_sa_advisory.py | 4 +- test/aio/test_advisory_safran.py | 4 +- test/aio/test_advisory_saint_exploit.py | 4 +- test/aio/test_advisory_sales_force.py | 4 +- test/aio/test_advisory_samba.py | 4 +- test/aio/test_advisory_sandisk.py | 4 +- test/aio/test_advisory_sans_dshield.py | 4 +- test/aio/test_advisory_sap.py | 4 +- test/aio/test_advisory_schneider_cve.py | 4 +- ...st_advisory_schneider_electric_advisory.py | 4 +- test/aio/test_advisory_schutzwerk.py | 4 +- test/aio/test_advisory_score_set.py | 53 - test/aio/test_advisory_sec_consult.py | 4 +- test/aio/test_advisory_sec_fix.py | 4 +- test/aio/test_advisory_security_bulletin.py | 4 +- test/aio/test_advisory_security_lab.py | 4 +- test/aio/test_advisory_seebug_exploit.py | 4 +- test/aio/test_advisory_sel.py | 4 +- test/aio/test_advisory_sentinel_one.py | 4 +- test/aio/test_advisory_service_now.py | 4 +- test/aio/test_advisory_seven_zip.py | 4 +- test/aio/test_advisory_severity.py | 4 +- ...y_shadow_server_exploited_vulnerability.py | 4 +- test/aio/test_advisory_shielder.py | 4 +- test/aio/test_advisory_sick.py | 4 +- .../test_advisory_siemens_acknowledgments.py | 4 +- test/aio/test_advisory_siemens_advisory.py | 4 +- test/aio/test_advisory_siemens_branch.py | 4 +- test/aio/test_advisory_siemens_cvssv3.py | 4 +- test/aio/test_advisory_siemens_cwe.py | 4 +- .../aio/test_advisory_siemens_distribution.py | 4 +- test/aio/test_advisory_siemens_document.py | 4 +- test/aio/test_advisory_siemens_engine.py | 4 +- test/aio/test_advisory_siemens_generator.py | 4 +- test/aio/test_advisory_siemens_notes.py | 4 +- test/aio/test_advisory_siemens_product.py | 4 +- ...y_siemens_product_identification_helper.py | 4 +- .../test_advisory_siemens_product_status.py | 4 +- .../aio/test_advisory_siemens_product_tree.py | 4 +- test/aio/test_advisory_siemens_publisher.py | 4 +- test/aio/test_advisory_siemens_references.py | 4 +- test/aio/test_advisory_siemens_remediation.py | 4 +- .../test_advisory_siemens_revision_history.py | 4 +- test/aio/test_advisory_siemens_score.py | 4 +- test/aio/test_advisory_siemens_sub_branch.py | 4 +- .../test_advisory_siemens_sub_sub_branch.py | 4 +- test/aio/test_advisory_siemens_tlp.py | 4 +- test/aio/test_advisory_siemens_tracking.py | 4 +- .../test_advisory_siemens_vulnerability.py | 4 +- test/aio/test_advisory_sierra_wireless.py | 4 +- test/aio/test_advisory_sigma_rule.py | 8 +- test/aio/test_advisory_sigma_rule_rule.py | 8 +- test/aio/test_advisory_sing_cert.py | 4 +- test/aio/test_advisory_sitecore.py | 4 +- test/aio/test_advisory_slackware.py | 4 +- test/aio/test_advisory_software_update.py | 4 +- .../aio/test_advisory_solar_winds_advisory.py | 4 +- test/aio/test_advisory_solr.py | 4 +- test/aio/test_advisory_sonatype.py | 4 +- test/aio/test_advisory_sonic_wall_advisory.py | 4 +- ..._advisory_spacelabs_healthcare_advisory.py | 4 +- test/aio/test_advisory_splunk.py | 4 +- test/aio/test_advisory_splunk_product.py | 4 +- test/aio/test_advisory_spring.py | 4 +- test/aio/test_advisory_ssa_source.py | 4 +- test/aio/test_advisory_ssd_advisory.py | 4 +- test/aio/test_advisory_stormshield.py | 4 +- test/aio/test_advisory_stryker_advisory.py | 4 +- test/aio/test_advisory_sudo.py | 4 +- test/aio/test_advisory_suse_security.py | 4 +- ...t_advisory_swisslog_healthcare_advisory.py | 4 +- test/aio/test_advisory_symfony.py | 4 +- test/aio/test_advisory_synacktiv.py | 4 +- test/aio/test_advisory_syncro_soft.py | 4 +- test/aio/test_advisory_synology.py | 4 +- test/aio/test_advisory_syss.py | 4 +- test/aio/test_advisory_tailscale.py | 4 +- test/aio/test_advisory_talos_advisory.py | 4 +- test/aio/test_advisory_team_viewer.py | 4 +- ...test_advisory_tenable_research_advisory.py | 4 +- test/aio/test_advisory_tencent.py | 4 +- test/aio/test_advisory_thales.py | 4 +- test/aio/test_advisory_the_missing_link.py | 4 +- test/aio/test_advisory_thermo_fisher.py | 4 +- test/aio/test_advisory_threat.py | 53 - ...sory_threat_actor_with_external_objects.py | 4 +- test/aio/test_advisory_threat_data.py | 4 +- test/aio/test_advisory_ti.py | 4 +- test/aio/test_advisory_tibco.py | 4 +- test/aio/test_advisory_timeline.py | 4 +- test/aio/test_advisory_tool.py | 4 +- test/aio/test_advisory_tool_ref.py | 4 +- test/aio/test_advisory_tp_link.py | 4 +- test/aio/test_advisory_tracking.py | 4 +- test/aio/test_advisory_tracking_id.py | 4 +- test/aio/test_advisory_trane_technology.py | 4 +- test/aio/test_advisory_trend_micro.py | 4 +- test/aio/test_advisory_triage_notes.py | 4 +- test/aio/test_advisory_trustwave.py | 4 +- test/aio/test_advisory_tw_cert_advisory.py | 4 +- test/aio/test_advisory_ubiquiti.py | 4 +- test/aio/test_advisory_ubuntu_cve.py | 4 +- ..._advisory_ubuntu_package_release_status.py | 4 +- test/aio/test_advisory_unify.py | 4 +- test/aio/test_advisory_unisoc.py | 4 +- test/aio/test_advisory_update.py | 10 +- test/aio/test_advisory_updated.py | 52 - test/aio/test_advisory_usd.py | 4 +- test/aio/test_advisory_usom_advisory.py | 4 +- test/aio/test_advisory_v3_acceptance_level.py | 4 +- test/aio/test_advisory_van_dyke.py | 4 +- test/aio/test_advisory_vapid_labs_advisory.py | 4 +- test/aio/test_advisory_vc_vulnerable_cpes.py | 4 +- test/aio/test_advisory_vccpe_dictionary.py | 4 +- test/aio/test_advisory_vde_advisory.py | 79 +- test/aio/test_advisory_veeam.py | 4 +- ...t_advisory_vendor_name_for_threat_actor.py | 4 +- test/aio/test_advisory_vendor_product.py | 4 +- test/aio/test_advisory_vendor_ref.py | 4 +- test/aio/test_advisory_veritas.py | 4 +- test/aio/test_advisory_virtuozzo.py | 4 +- test/aio/test_advisory_vlc.py | 4 +- test/aio/test_advisory_vm_ware_advisory.py | 4 +- test/aio/test_advisory_void_sec.py | 4 +- test/aio/test_advisory_vuln_check.py | 4 +- test/aio/test_advisory_vuln_check_config.py | 4 +- .../test_advisory_vuln_check_cve_list_v5.py | 13 +- test/aio/test_advisory_vuln_check_kev.py | 4 +- test/aio/test_advisory_vuln_check_package.py | 4 +- test/aio/test_advisory_vulnerability.py | 83 - ...test_advisory_vulnerable_debian_package.py | 4 +- test/aio/test_advisory_vulnerable_product.py | 4 +- test/aio/test_advisory_vulnrichment.py | 4 +- .../test_advisory_vulnrichment_containers.py | 4 +- .../aio/test_advisory_vulnrichment_content.py | 4 +- .../aio/test_advisory_vulnrichment_cve_ref.py | 4 +- test/aio/test_advisory_vulnrichment_metric.py | 4 +- test/aio/test_advisory_vulnrichment_option.py | 4 +- test/aio/test_advisory_vulnrichment_other.py | 4 +- test/aio/test_advisory_vyaire_advisory.py | 4 +- test/aio/test_advisory_watch_guard.py | 4 +- test/aio/test_advisory_whats_app.py | 4 +- test/aio/test_advisory_wibu.py | 4 +- test/aio/test_advisory_wireshark.py | 4 +- test/aio/test_advisory_with_secure.py | 4 +- test/aio/test_advisory_wolf_ssl.py | 4 +- test/aio/test_advisory_wolfi.py | 4 +- test/aio/test_advisory_wolfi_package.py | 4 +- test/aio/test_advisory_wolfi_sec_fix.py | 4 +- test/aio/test_advisory_wordfence.py | 4 +- test/aio/test_advisory_wrt.py | 4 +- test/aio/test_advisory_xdb.py | 4 +- test/aio/test_advisory_xen.py | 4 +- test/aio/test_advisory_xerox.py | 4 +- test/aio/test_advisory_xiaomi.py | 4 +- test/aio/test_advisory_xylem.py | 4 +- test/aio/test_advisory_yamaha.py | 4 +- test/aio/test_advisory_yokogawa_advisory.py | 4 +- test/aio/test_advisory_yubico.py | 4 +- test/aio/test_advisory_zdi.py | 4 +- test/aio/test_advisory_zdi_product.py | 4 +- test/aio/test_advisory_zdi_response.py | 4 +- test/aio/test_advisory_zdi_response_vendor.py | 4 +- test/aio/test_advisory_zdi_vendor.py | 4 +- test/aio/test_advisory_zebra.py | 4 +- test/aio/test_advisory_zero_day_advisory.py | 4 +- .../test_advisory_zero_science_advisory.py | 4 +- test/aio/test_advisory_zimbra.py | 4 +- test/aio/test_advisory_zoom.py | 4 +- test/aio/test_advisory_zscaler.py | 4 +- test/aio/test_advisory_zulu_version.py | 4 +- test/aio/test_advisory_zuso.py | 4 +- test/aio/test_advisory_zyxel.py | 4 +- test/aio/test_api_base_metric_v2.py | 4 +- test/aio/test_api_base_metric_v3.py | 4 +- test/aio/test_api_categorization_extended.py | 4 +- test/aio/test_api_client_fingerprints.py | 4 +- test/aio/test_api_configurations.py | 4 +- test/aio/test_api_cpe.py | 4 +- test/aio/test_api_cpe_match.py | 4 +- test/aio/test_api_cpe_name.py | 4 +- test/aio/test_api_cve.py | 4 +- test/aio/test_api_cve_data_meta.py | 4 +- test/aio/test_api_cve_data_meta_extended.py | 4 +- test/aio/test_api_cve_extended.py | 4 +- test/aio/test_api_cve_items.py | 42 +- test/aio/test_api_cve_items_extended.py | 4 +- test/aio/test_api_cvssv2.py | 4 +- test/aio/test_api_cvssv3.py | 4 +- test/aio/test_api_cwe.py | 4 +- test/aio/test_api_date_time.py | 52 - test/aio/test_api_description.py | 4 +- test/aio/test_api_description_data.py | 4 +- test/aio/test_api_epss.py | 4 +- test/aio/test_api_epss_data.py | 4 +- test/aio/test_api_exploit_chain.py | 4 +- test/aio/test_api_exploit_chain_cve.py | 4 +- test/aio/test_api_exploit_v3_result.py | 4 +- test/aio/test_api_exploits_change.py | 4 +- test/aio/test_api_exploits_changelog.py | 8 +- test/aio/test_api_exploits_trending.py | 4 +- test/aio/test_api_exploits_v3_count.py | 4 +- test/aio/test_api_exploits_v3_timeline.py | 4 +- test/aio/test_api_http_details.py | 4 +- test/aio/test_api_impact.py | 4 +- test/aio/test_api_impact_extended.py | 4 +- test/aio/test_api_initial_access.py | 4 +- test/aio/test_api_initial_access_artifact.py | 4 +- test/aio/test_api_mitre_attack_tech.py | 4 +- test/aio/test_api_mitre_attack_to_cve.py | 4 +- test/aio/test_api_mitre_d3fend_technique.py | 4 +- test/aio/test_api_mitre_detection_tech.py | 4 +- ...st_api_mitre_mitigation2_d3fend_mapping.py | 4 +- test/aio/test_api_mitre_mitigation_tech.py | 4 +- test/aio/test_api_nodes.py | 4 +- .../test_api_normalized_exploit_v3_entry.py | 4 +- .../test_api_normalized_report_v3_entry.py | 4 +- test/aio/test_api_nvd20_cpe_match.py | 4 +- test/aio/test_api_nvd20_cpe_name.py | 4 +- test/aio/test_api_nvd20_cve.py | 4 +- test/aio/test_api_nvd20_cve_extended.py | 4 +- test/aio/test_api_nvd20_cvss_data_v2.py | 4 +- test/aio/test_api_nvd20_cvss_data_v3.py | 4 +- test/aio/test_api_nvd20_cvss_metric_v2.py | 4 +- test/aio/test_api_nvd20_cvss_metric_v3.py | 4 +- test/aio/test_api_nvd20_cvss_metric_v40.py | 4 +- test/aio/test_api_nvd20_description.py | 4 +- test/aio/test_api_nvd20_metric.py | 4 +- test/aio/test_api_nvd20_metric_extended.py | 4 +- test/aio/test_api_nvd20_reference.py | 4 +- test/aio/test_api_nvd20_reference_extended.py | 4 +- ...i_nvd20_temporal_associated_base_metric.py | 4 +- test/aio/test_api_nvd20_temporal_cvssv2.py | 4 +- test/aio/test_api_nvd20_temporal_cvssv3.py | 4 +- ...api_nvd20_threat_associated_base_metric.py | 4 +- test/aio/test_api_nvd20_threat_cvssv40.py | 4 +- test/aio/test_api_nvd20_vendor_comment.py | 4 +- test/aio/test_api_nvd20_weakness.py | 4 +- .../test_api_nvd20_weakness_desc_extended.py | 4 +- test/aio/test_api_nvd20_weakness_extended.py | 4 +- test/aio/test_api_oss_package.py | 4 +- test/aio/test_api_oss_package_artifacts.py | 4 +- .../aio/test_api_oss_package_download_info.py | 4 +- test/aio/test_api_oss_package_hash_info.py | 4 +- ...est_api_oss_package_research_attributes.py | 4 +- .../aio/test_api_oss_package_vulnerability.py | 4 +- test/aio/test_api_package.py | 4 +- test/aio/test_api_problem_type.py | 4 +- test/aio/test_api_problem_type_data.py | 4 +- .../test_api_problem_type_data_extended.py | 4 +- test/aio/test_api_problem_type_description.py | 4 +- ...t_api_problem_type_description_extended.py | 4 +- test/aio/test_api_problem_type_extended.py | 4 +- test/aio/test_api_reference.py | 4 +- test/aio/test_api_reference_data.py | 4 +- test/aio/test_api_reference_data_extended.py | 4 +- test/aio/test_api_references.py | 4 +- test/aio/test_api_references_extended.py | 4 +- test/aio/test_api_related_attack_pattern.py | 4 +- test/aio/test_api_ssvc.py | 4 +- test/aio/test_api_temporal_cvssv2.py | 4 +- test/aio/test_api_temporal_cvssv3.py | 4 +- test/aio/test_api_temporal_metric_v2.py | 4 +- test/aio/test_api_temporal_metric_v3.py | 4 +- test/aio/test_api_update.py | 10 +- test/aio/test_api_vuln_check_canary.py | 4 +- test/aio/test_api_vulnerability_alias.py | 4 +- test/aio/test_endpoints_api.py | 4 +- test/aio/test_indices_api.py | 4 +- test/aio/test_models_entitlements.py | 4 +- test/aio/test_paginate_match.py | 4 +- test/aio/test_paginate_pagination.py | 4 +- test/aio/test_paginate_param.py | 4 +- test/aio/test_params_index_backup.py | 4 +- test/aio/test_params_index_backup_list.py | 4 +- test/aio/test_params_index_list.py | 4 +- test/aio/test_purl_batch_vuln_finding.py | 4 +- test/aio/test_purl_package_urljson.py | 4 +- test/aio/test_purl_qualifier_json.py | 4 +- test/aio/test_purls_purl_response.py | 4 +- test/aio/test_purls_vulnerability.py | 4 +- ...response_array_params_index_backup_list.py | 4 +- ...render_response_array_params_index_list.py | 4 +- ..._array_advisory_a10_paginate_pagination.py | 4 +- ...visory_abb_advisory_paginate_pagination.py | 4 +- ...ray_advisory_abbott_paginate_pagination.py | 4 +- ...y_advisory_absolute_paginate_pagination.py | 4 +- ...ay_advisory_acronis_paginate_pagination.py | 4 +- ...sory_adobe_advisory_paginate_pagination.py | 4 +- ..._advisory_advantech_paginate_pagination.py | 4 +- ...y_advisory_advisory_paginate_pagination.py | 4 +- ...ory_advisory_record_paginate_pagination.py | 4 +- ..._array_advisory_aix_paginate_pagination.py | 4 +- ...sory_aleph_research_paginate_pagination.py | 4 +- ...ay_advisory_alibaba_paginate_pagination.py | 4 +- ...y_alma_linux_update_paginate_pagination.py | 4 +- ...alpine_linux_sec_db_paginate_pagination.py | 4 +- ...advisory_amazon_cve_paginate_pagination.py | 4 +- ..._array_advisory_amd_paginate_pagination.py | 4 +- ..._array_advisory_ami_paginate_pagination.py | 4 +- ...nchore_nvd_override_paginate_pagination.py | 4 +- ...ry_android_advisory_paginate_pagination.py | 4 +- ...ry_apache_active_mq_paginate_pagination.py | 4 +- ...sory_apache_archiva_paginate_pagination.py | 4 +- ...visory_apache_arrow_paginate_pagination.py | 4 +- ...visory_apache_camel_paginate_pagination.py | 4 +- ...sory_apache_commons_paginate_pagination.py | 4 +- ...ory_apache_couch_db_paginate_pagination.py | 4 +- ...visory_apache_flink_paginate_pagination.py | 4 +- ...ry_apache_guacamole_paginate_pagination.py | 4 +- ...isory_apache_hadoop_paginate_pagination.py | 4 +- ...dvisory_apache_http_paginate_pagination.py | 4 +- ...ory_apache_jsp_wiki_paginate_pagination.py | 4 +- ...visory_apache_kafka_paginate_pagination.py | 4 +- ...he_logging_services_paginate_pagination.py | 4 +- ...visory_apache_ni_fi_paginate_pagination.py | 4 +- ...isory_apache_of_biz_paginate_pagination.py | 4 +- ...pache_open_meetings_paginate_pagination.py | 4 +- ..._apache_open_office_paginate_pagination.py | 4 +- ...isory_apache_pulsar_paginate_pagination.py | 4 +- ...visory_apache_shiro_paginate_pagination.py | 4 +- ...visory_apache_spark_paginate_pagination.py | 4 +- ...isory_apache_struts_paginate_pagination.py | 4 +- ...y_apache_subversion_paginate_pagination.py | 4 +- ...ory_apache_superset_paginate_pagination.py | 4 +- ...isory_apache_tomcat_paginate_pagination.py | 4 +- ...y_apache_zoo_keeper_paginate_pagination.py | 4 +- ..._advisory_app_check_paginate_pagination.py | 4 +- ...ay_advisory_appgate_paginate_pagination.py | 4 +- ...sory_apple_advisory_paginate_pagination.py | 4 +- ...advisory_arch_issue_paginate_pagination.py | 4 +- ...ray_advisory_arista_paginate_pagination.py | 4 +- ...rray_advisory_aruba_paginate_pagination.py | 4 +- ...array_advisory_asrg_paginate_pagination.py | 4 +- ...advisory_asset_note_paginate_pagination.py | 4 +- ...y_advisory_asterisk_paginate_pagination.py | 4 +- ...rray_advisory_astra_paginate_pagination.py | 4 +- ...array_advisory_asus_paginate_pagination.py | 4 +- ..._atlassian_advisory_paginate_pagination.py | 4 +- ...sory_atlassian_vuln_paginate_pagination.py | 4 +- ...ay_advisory_atredis_paginate_pagination.py | 4 +- ...advisory_audiocodes_paginate_pagination.py | 4 +- ...y_advisory_aus_cert_paginate_pagination.py | 4 +- ...y_advisory_autodesk_paginate_pagination.py | 4 +- ...rray_advisory_avaya_paginate_pagination.py | 4 +- ...sory_aveva_advisory_paginate_pagination.py | 4 +- ...dvisory_avidml_advs_paginate_pagination.py | 4 +- ...y_advisory_avigilon_paginate_pagination.py | 4 +- ..._array_advisory_aws_paginate_pagination.py | 4 +- ...array_advisory_axis_paginate_pagination.py | 4 +- ...array_advisory_azul_paginate_pagination.py | 4 +- ...ry_b_braun_advisory_paginate_pagination.py | 4 +- ...rray_advisory_bandr_paginate_pagination.py | 4 +- ...ory_baxter_advisory_paginate_pagination.py | 4 +- ...visory_bdu_advisory_paginate_pagination.py | 4 +- ...y_beckhoff_advisory_paginate_pagination.py | 4 +- ...ory_beckman_coulter_paginate_pagination.py | 4 +- ..._dickinson_advisory_paginate_pagination.py | 4 +- ...ory_belden_advisory_paginate_pagination.py | 4 +- ...visory_beyond_trust_paginate_pagination.py | 4 +- ...ay_advisory_binarly_paginate_pagination.py | 4 +- ...visory_bit_defender_paginate_pagination.py | 4 +- ...dvisory_black_berry_paginate_pagination.py | 4 +- ..._array_advisory_bls_paginate_pagination.py | 4 +- ...sory_bosch_advisory_paginate_pagination.py | 4 +- ...scientific_advisory_paginate_pagination.py | 4 +- ...ray_advisory_botnet_paginate_pagination.py | 4 +- ...ber_centre_advisory_paginate_pagination.py | 4 +- ...sory_canvas_exploit_paginate_pagination.py | 4 +- ...carestream_advisory_paginate_pagination.py | 4 +- ...ay_advisory_carrier_paginate_pagination.py | 4 +- ...dvisory_cbl_mariner_paginate_pagination.py | 4 +- ...ay_advisory_cert_be_paginate_pagination.py | 4 +- ...ry_cert_fr_advisory_paginate_pagination.py | 4 +- ...ay_advisory_cert_in_paginate_pagination.py | 4 +- ...t_ir_security_alert_paginate_pagination.py | 4 +- ...ay_advisory_cert_se_paginate_pagination.py | 4 +- ...ay_advisory_cert_ua_paginate_pagination.py | 4 +- ...ory_certeu_advisory_paginate_pagination.py | 4 +- ...array_advisory_cesa_paginate_pagination.py | 4 +- ...dvisory_chain_guard_paginate_pagination.py | 4 +- ...dvisory_check_point_paginate_pagination.py | 4 +- ...ray_advisory_chrome_paginate_pagination.py | 4 +- ...rray_advisory_ciena_paginate_pagination.py | 4 +- ...advisory_cisa_alert_paginate_pagination.py | 4 +- ...isory_cisa_csaf_adv_paginate_pagination.py | 82 +- ...sory_cisco_advisory_paginate_pagination.py | 4 +- ...advisory_cisco_csaf_paginate_pagination.py | 6 +- ...co_known_good_value_paginate_pagination.py | 4 +- ...ory_citrix_advisory_paginate_pagination.py | 4 +- ...aroty_vulnerability_paginate_pagination.py | 4 +- ...advisory_cloud_bees_paginate_pagination.py | 4 +- ...ud_vuln_db_advisory_paginate_pagination.py | 4 +- ...ry_cnnvd_entry_json_paginate_pagination.py | 4 +- ...isory_cnvd_bulletin_paginate_pagination.py | 4 +- ..._advisory_cnvd_flaw_paginate_pagination.py | 4 +- ...ry_codesys_advisory_paginate_pagination.py | 4 +- ...advisory_comm_vault_paginate_pagination.py | 4 +- ...ry_compass_security_paginate_pagination.py | 4 +- ...visory_container_os_paginate_pagination.py | 4 +- ...core_impact_exploit_paginate_pagination.py | 4 +- ...y_advisory_crestron_paginate_pagination.py | 4 +- ..._advisory_crowd_sec_paginate_pagination.py | 4 +- ...array_advisory_curl_paginate_pagination.py | 4 +- ...array_advisory_cvrf_paginate_pagination.py | 64 +- ...ray_advisory_d_link_paginate_pagination.py | 4 +- ...rray_advisory_dahua_paginate_pagination.py | 4 +- ...ay_advisory_danfoss_paginate_pagination.py | 4 +- ...y_advisory_dassault_paginate_pagination.py | 4 +- ...n_security_advisory_paginate_pagination.py | 4 +- ...array_advisory_dell_paginate_pagination.py | 4 +- ...sory_delta_advisory_paginate_pagination.py | 4 +- ...y_advisory_dfn_cert_paginate_pagination.py | 4 +- ...sory_distro_package_paginate_pagination.py | 4 +- ...ray_advisory_django_paginate_pagination.py | 4 +- ..._array_advisory_dnn_paginate_pagination.py | 4 +- ...ay_advisory_dot_cms_paginate_pagination.py | 4 +- ...ory_dragos_advisory_paginate_pagination.py | 4 +- ...ay_advisory_draytek_paginate_pagination.py | 4 +- ...ray_advisory_drupal_paginate_pagination.py | 4 +- ...sory_eaton_advisory_paginate_pagination.py | 4 +- ...ay_advisory_elastic_paginate_pagination.py | 4 +- ...ray_advisory_elspec_paginate_pagination.py | 4 +- ...rging_threats_snort_paginate_pagination.py | 4 +- ...ry_emerson_advisory_paginate_pagination.py | 4 +- ...dvisory_end_of_life_paginate_pagination.py | 14 +- ...ay_advisory_endress_paginate_pagination.py | 4 +- ...dvisory_eol_alibaba_paginate_pagination.py | 4 +- ...isory_eol_microsoft_paginate_pagination.py | 4 +- ...ry_eol_release_data_paginate_pagination.py | 4 +- ...array_advisory_euvd_paginate_pagination.py | 4 +- ...visory_exodus_intel_paginate_pagination.py | 4 +- ...xploit_db_exploitv2_paginate_pagination.py | 4 +- ...a_array_advisory_f5_paginate_pagination.py | 4 +- ...y_advisory_f_secure_paginate_pagination.py | 4 +- ...rray_advisory_fanuc_paginate_pagination.py | 4 +- ...ray_advisory_fastly_paginate_pagination.py | 4 +- ...rray_advisory_festo_paginate_pagination.py | 4 +- ...advisory_file_cloud_paginate_pagination.py | 4 +- ...advisory_file_zilla_paginate_pagination.py | 4 +- ...sory_flatt_security_paginate_pagination.py | 4 +- ...advisory_forge_rock_paginate_pagination.py | 4 +- ...y_fortinet_advisory_paginate_pagination.py | 4 +- ...visory_fortinet_ips_paginate_pagination.py | 4 +- ...rray_advisory_foxit_paginate_pagination.py | 4 +- ..._advisory_fresenius_paginate_pagination.py | 4 +- ..._advisory_gallagher_paginate_pagination.py | 4 +- ..._array_advisory_gcp_paginate_pagination.py | 4 +- ...ray_advisory_ge_gas_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ..._array_advisory_gen_paginate_pagination.py | 4 +- ...ay_advisory_genetec_paginate_pagination.py | 4 +- ..._advisory_json_lean_paginate_pagination.py | 13 +- ...array_advisory_ghsa_paginate_pagination.py | 4 +- ...y_advisory_gigabyte_paginate_pagination.py | 4 +- ...ory_git_hub_exploit_paginate_pagination.py | 4 +- ...ory_git_lab_exploit_paginate_pagination.py | 4 +- ...isory_gitee_exploit_paginate_pagination.py | 4 +- ...ory_gitlab_advisory_paginate_pagination.py | 4 +- ...rray_advisory_glibc_paginate_pagination.py | 4 +- ..._gmo_cyber_security_paginate_pagination.py | 4 +- ...ay_advisory_gnu_tls_paginate_pagination.py | 4 +- ...visory_go_vuln_json_paginate_pagination.py | 4 +- ...ay_advisory_grafana_paginate_pagination.py | 4 +- ...rey_noise_detection_paginate_pagination.py | 4 +- ...advisory_hacktivity_paginate_pagination.py | 4 +- ...advisory_harmony_os_paginate_pagination.py | 4 +- ...advisory_hashi_corp_paginate_pagination.py | 4 +- ...skell_sadb_advisory_paginate_pagination.py | 4 +- ..._array_advisory_hcl_paginate_pagination.py | 4 +- ...advisory_hik_vision_paginate_pagination.py | 4 +- ...ry_hillrom_advisory_paginate_pagination.py | 4 +- ...sory_hitachi_energy_paginate_pagination.py | 4 +- ...ay_advisory_hitachi_paginate_pagination.py | 4 +- ...ay_advisory_hk_cert_paginate_pagination.py | 4 +- ..._array_advisory_hms_paginate_pagination.py | 4 +- ..._advisory_honeywell_paginate_pagination.py | 4 +- ...a_array_advisory_hp_paginate_pagination.py | 4 +- ..._array_advisory_hpe_paginate_pagination.py | 4 +- ...ory_huawei_euler_os_paginate_pagination.py | 4 +- ...advisory_huawei_ips_paginate_pagination.py | 4 +- ...ray_advisory_huawei_paginate_pagination.py | 4 +- ...array_advisory_iava_paginate_pagination.py | 4 +- ..._array_advisory_ibm_paginate_pagination.py | 4 +- ...ray_advisory_idemia_paginate_pagination.py | 4 +- ...array_advisory_igel_paginate_pagination.py | 4 +- ...ory_incibe_advisory_paginate_pagination.py | 4 +- ...rray_advisory_intel_paginate_pagination.py | 4 +- ...ory_ip_intel_record_paginate_pagination.py | 4 +- ...isory_israeli_alert_paginate_pagination.py | 4 +- ...raeli_vulnerability_paginate_pagination.py | 4 +- ...rray_advisory_istio_paginate_pagination.py | 4 +- ...dvisory_itw_exploit_paginate_pagination.py | 4 +- ...ray_advisory_ivanti_paginate_pagination.py | 4 +- ...advisory_ivanti_rss_paginate_pagination.py | 4 +- ...ray_advisory_j_frog_paginate_pagination.py | 4 +- ...ay_advisory_jenkins_paginate_pagination.py | 4 +- ...advisory_jet_brains_paginate_pagination.py | 4 +- ...visory_jnj_advisory_paginate_pagination.py | 4 +- ...ry_johnson_controls_paginate_pagination.py | 4 +- ...ay_advisory_juniper_paginate_pagination.py | 4 +- ...y_jvn_advisory_item_paginate_pagination.py | 4 +- ..._array_advisory_jvn_paginate_pagination.py | 4 +- ...array_advisory_k8_s_paginate_pagination.py | 4 +- ...ky_icscert_advisory_paginate_pagination.py | 4 +- ...talog_vulnerability_paginate_pagination.py | 4 +- ...advisory_kore_logic_paginate_pagination.py | 4 +- ...ry_kr_cert_advisory_paginate_pagination.py | 4 +- ...ray_advisory_kunbus_paginate_pagination.py | 4 +- ..._advisory_lantronix_paginate_pagination.py | 4 +- ...ray_advisory_lenovo_paginate_pagination.py | 4 +- ...ry_lexmark_advisory_paginate_pagination.py | 4 +- ...a_array_advisory_lg_paginate_pagination.py | 4 +- ...visory_libre_office_paginate_pagination.py | 4 +- ...rray_advisory_linux_paginate_pagination.py | 4 +- ...y_advisory_lol_advs_paginate_pagination.py | 6 +- ...ay_advisory_m_files_paginate_pagination.py | 4 +- ...ay_advisory_ma_cert_paginate_pagination.py | 4 +- ...y_malicious_package_paginate_pagination.py | 8 +- ...age_engine_advisory_paginate_pagination.py | 4 +- ...y_advisory_mbed_tls_paginate_pagination.py | 4 +- ...ay_advisory_mc_afee_paginate_pagination.py | 4 +- ...y_advisory_mediatek_paginate_pagination.py | 4 +- ..._medtronic_advisory_paginate_pagination.py | 4 +- ...ray_advisory_mendix_paginate_pagination.py | 4 +- ...ory_meta_advisories_paginate_pagination.py | 4 +- ..._advisory_meta_data_paginate_pagination.py | 10 +- ..._metasploit_exploit_paginate_pagination.py | 4 +- ...sory_microsoft_csaf_paginate_pagination.py | 82 +- ...sory_microsoft_cvrf_paginate_pagination.py | 4 +- ...t_driver_block_list_paginate_pagination.py | 12 +- ...visory_microsoft_kb_paginate_pagination.py | 4 +- ...y_advisory_mikrotik_paginate_pagination.py | 4 +- ...ay_advisory_mindray_paginate_pagination.py | 4 +- ...advisory_misp_value_paginate_pagination.py | 4 +- ...rray_advisory_mitel_paginate_pagination.py | 4 +- ...y_mitre_cve_list_v5_paginate_pagination.py | 13 +- ...i_electric_advisory_paginate_pagination.py | 4 +- ...y_advisory_mongo_db_paginate_pagination.py | 4 +- ...isory_moxa_advisory_paginate_pagination.py | 4 +- ...ry_mozilla_advisory_paginate_pagination.py | 4 +- ...rray_advisory_naver_paginate_pagination.py | 4 +- ...array_advisory_ncsc_paginate_pagination.py | 82 +- ...ay_advisory_ncsccve_paginate_pagination.py | 82 +- ..._array_advisory_nec_paginate_pagination.py | 4 +- ...ray_advisory_nessus_paginate_pagination.py | 4 +- ...ay_advisory_net_app_paginate_pagination.py | 4 +- ...y_advisory_netatalk_paginate_pagination.py | 4 +- ...ay_advisory_netgate_paginate_pagination.py | 4 +- ...ay_advisory_netgear_paginate_pagination.py | 4 +- ...y_advisory_netskope_paginate_pagination.py | 4 +- ...ay_advisory_nexpose_paginate_pagination.py | 4 +- ...sory_nginx_advisory_paginate_pagination.py | 4 +- ..._array_advisory_nhs_paginate_pagination.py | 4 +- ...a_array_advisory_ni_paginate_pagination.py | 4 +- ...ay_advisory_node_js_paginate_pagination.py | 4 +- ...isory_node_security_paginate_pagination.py | 4 +- ...rray_advisory_nokia_paginate_pagination.py | 4 +- ..._note_pad_plus_plus_paginate_pagination.py | 4 +- ...ray_advisory_nozomi_paginate_pagination.py | 4 +- ..._array_advisory_ntp_paginate_pagination.py | 4 +- ...ray_advisory_nuclei_paginate_pagination.py | 4 +- ...visory_nvd20_source_paginate_pagination.py | 4 +- ...y_nvdcpe_dictionary_paginate_pagination.py | 4 +- ...dvisory_nz_advisory_paginate_pagination.py | 4 +- ...sory_octopus_deploy_paginate_pagination.py | 4 +- ...array_advisory_okta_paginate_pagination.py | 4 +- ...rray_advisory_omron_paginate_pagination.py | 4 +- ...rray_advisory_one_e_paginate_pagination.py | 4 +- ...y_advisory_open_bsd_paginate_pagination.py | 4 +- ..._advisory_open_cvdb_paginate_pagination.py | 4 +- ...y_advisory_open_jdk_paginate_pagination.py | 4 +- ...y_advisory_open_ssh_paginate_pagination.py | 4 +- ...ry_open_ssl_sec_adv_paginate_pagination.py | 4 +- ...advisory_open_stack_paginate_pagination.py | 4 +- ...y_advisory_opengear_paginate_pagination.py | 4 +- ...advisory_oracle_cpu_paginate_pagination.py | 4 +- ...sory_oracle_cpucsaf_paginate_pagination.py | 82 +- ..._array_advisory_osv_paginate_pagination.py | 8 +- ...array_advisory_otrs_paginate_pagination.py | 4 +- ..._advisory_own_cloud_paginate_pagination.py | 4 +- ...packetstorm_exploit_paginate_pagination.py | 4 +- ...y_advisory_palantir_paginate_pagination.py | 4 +- ..._palo_alto_advisory_paginate_pagination.py | 4 +- ..._advisory_panasonic_paginate_pagination.py | 4 +- ..._advisory_paper_cut_paginate_pagination.py | 4 +- ...array_advisory_pega_paginate_pagination.py | 4 +- ...ry_philips_advisory_paginate_pagination.py | 4 +- ...ix_contact_advisory_paginate_pagination.py | 4 +- ...dvisory_phpmy_admin_paginate_pagination.py | 4 +- ...ay_advisory_pk_cert_paginate_pagination.py | 4 +- ...visory_postgres_sql_paginate_pagination.py | 4 +- ..._advisory_power_dns_paginate_pagination.py | 4 +- ...y_advisory_progress_paginate_pagination.py | 4 +- ...advisory_proofpoint_paginate_pagination.py | 4 +- ..._array_advisory_ptc_paginate_pagination.py | 4 +- ...visory_pure_storage_paginate_pagination.py | 4 +- ...sory_py_pa_advisory_paginate_pagination.py | 4 +- ...isory_qnap_advisory_paginate_pagination.py | 4 +- ...array_advisory_qqid_paginate_pagination.py | 4 +- ..._array_advisory_qsb_paginate_pagination.py | 4 +- ...y_advisory_qualcomm_paginate_pagination.py | 4 +- ...ray_advisory_qualys_paginate_pagination.py | 4 +- ...advisory_qualys_qid_paginate_pagination.py | 4 +- ..._ransomware_exploit_paginate_pagination.py | 4 +- ...y_advisory_red_lion_paginate_pagination.py | 4 +- ...advisory_redhat_cve_paginate_pagination.py | 4 +- ...ay_advisory_renesas_paginate_pagination.py | 4 +- ...ray_advisory_revive_paginate_pagination.py | 4 +- ...y_advisory_rhel_cve_paginate_pagination.py | 82 +- ...rray_advisory_roche_paginate_pagination.py | 4 +- ...y_advisory_rockwell_paginate_pagination.py | 4 +- ...visory_rocky_errata_paginate_pagination.py | 4 +- ...rray_advisory_rsync_paginate_pagination.py | 4 +- ...ray_advisory_ruckus_paginate_pagination.py | 4 +- ...ry_rustsec_advisory_paginate_pagination.py | 4 +- ...dvisory_sa_advisory_paginate_pagination.py | 4 +- ...ray_advisory_safran_paginate_pagination.py | 4 +- ...isory_saint_exploit_paginate_pagination.py | 4 +- ...dvisory_sales_force_paginate_pagination.py | 4 +- ...rray_advisory_samba_paginate_pagination.py | 4 +- ...ay_advisory_sandisk_paginate_pagination.py | 4 +- ...visory_sans_dshield_paginate_pagination.py | 4 +- ..._array_advisory_sap_paginate_pagination.py | 4 +- ...r_electric_advisory_paginate_pagination.py | 4 +- ...advisory_schutzwerk_paginate_pagination.py | 4 +- ...dvisory_sec_consult_paginate_pagination.py | 4 +- ...y_security_bulletin_paginate_pagination.py | 4 +- ...visory_security_lab_paginate_pagination.py | 4 +- ...sory_seebug_exploit_paginate_pagination.py | 4 +- ..._array_advisory_sel_paginate_pagination.py | 4 +- ...visory_sentinel_one_paginate_pagination.py | 4 +- ...dvisory_service_now_paginate_pagination.py | 4 +- ..._advisory_seven_zip_paginate_pagination.py | 4 +- ...oited_vulnerability_paginate_pagination.py | 4 +- ...y_advisory_shielder_paginate_pagination.py | 4 +- ...array_advisory_sick_paginate_pagination.py | 4 +- ...ry_siemens_advisory_paginate_pagination.py | 4 +- ...ory_sierra_wireless_paginate_pagination.py | 4 +- ...advisory_sigma_rule_paginate_pagination.py | 8 +- ..._advisory_sing_cert_paginate_pagination.py | 4 +- ...y_advisory_sitecore_paginate_pagination.py | 4 +- ..._advisory_slackware_paginate_pagination.py | 4 +- ...olar_winds_advisory_paginate_pagination.py | 4 +- ...array_advisory_solr_paginate_pagination.py | 4 +- ...y_advisory_sonatype_paginate_pagination.py | 4 +- ...sonic_wall_advisory_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ...ray_advisory_splunk_paginate_pagination.py | 4 +- ...ray_advisory_spring_paginate_pagination.py | 4 +- ...visory_ssd_advisory_paginate_pagination.py | 4 +- ...dvisory_stormshield_paginate_pagination.py | 4 +- ...ry_stryker_advisory_paginate_pagination.py | 4 +- ...array_advisory_sudo_paginate_pagination.py | 4 +- ...isory_suse_security_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ...ay_advisory_symfony_paginate_pagination.py | 4 +- ..._advisory_synacktiv_paginate_pagination.py | 4 +- ...dvisory_syncro_soft_paginate_pagination.py | 4 +- ...y_advisory_synology_paginate_pagination.py | 4 +- ...array_advisory_syss_paginate_pagination.py | 4 +- ..._advisory_tailscale_paginate_pagination.py | 4 +- ...sory_talos_advisory_paginate_pagination.py | 4 +- ...dvisory_team_viewer_paginate_pagination.py | 4 +- ...e_research_advisory_paginate_pagination.py | 4 +- ...ay_advisory_tencent_paginate_pagination.py | 4 +- ...ray_advisory_thales_paginate_pagination.py | 4 +- ...ry_the_missing_link_paginate_pagination.py | 4 +- ...isory_thermo_fisher_paginate_pagination.py | 4 +- ...th_external_objects_paginate_pagination.py | 4 +- ...a_array_advisory_ti_paginate_pagination.py | 4 +- ...rray_advisory_tibco_paginate_pagination.py | 4 +- ...ay_advisory_tp_link_paginate_pagination.py | 4 +- ...ry_trane_technology_paginate_pagination.py | 4 +- ...dvisory_trend_micro_paginate_pagination.py | 4 +- ..._advisory_trustwave_paginate_pagination.py | 4 +- ...ry_tw_cert_advisory_paginate_pagination.py | 4 +- ...y_advisory_ubiquiti_paginate_pagination.py | 4 +- ...advisory_ubuntu_cve_paginate_pagination.py | 4 +- ...rray_advisory_unify_paginate_pagination.py | 4 +- ...ray_advisory_unisoc_paginate_pagination.py | 4 +- ...ray_advisory_update_paginate_pagination.py | 10 +- ..._array_advisory_usd_paginate_pagination.py | 4 +- ...isory_usom_advisory_paginate_pagination.py | 4 +- ...y_advisory_van_dyke_paginate_pagination.py | 4 +- ...vapid_labs_advisory_paginate_pagination.py | 4 +- ..._vc_vulnerable_cpes_paginate_pagination.py | 4 +- ...ry_vccpe_dictionary_paginate_pagination.py | 4 +- ...visory_vde_advisory_paginate_pagination.py | 82 +- ...rray_advisory_veeam_paginate_pagination.py | 4 +- ...ay_advisory_veritas_paginate_pagination.py | 4 +- ..._advisory_virtuozzo_paginate_pagination.py | 4 +- ..._array_advisory_vlc_paginate_pagination.py | 4 +- ...ry_vm_ware_advisory_paginate_pagination.py | 4 +- ...y_advisory_void_sec_paginate_pagination.py | 4 +- ...y_vuln_check_config_paginate_pagination.py | 4 +- ...n_check_cve_list_v5_paginate_pagination.py | 13 +- ...sory_vuln_check_kev_paginate_pagination.py | 4 +- ...advisory_vuln_check_paginate_pagination.py | 4 +- ...able_debian_package_paginate_pagination.py | 4 +- ...visory_vulnrichment_paginate_pagination.py | 4 +- ...ory_vyaire_advisory_paginate_pagination.py | 4 +- ...dvisory_watch_guard_paginate_pagination.py | 4 +- ..._advisory_whats_app_paginate_pagination.py | 4 +- ...array_advisory_wibu_paginate_pagination.py | 4 +- ..._advisory_wireshark_paginate_pagination.py | 4 +- ...dvisory_with_secure_paginate_pagination.py | 4 +- ...y_advisory_wolf_ssl_paginate_pagination.py | 4 +- ...rray_advisory_wolfi_paginate_pagination.py | 4 +- ..._advisory_wordfence_paginate_pagination.py | 4 +- ..._array_advisory_wrt_paginate_pagination.py | 4 +- ..._array_advisory_xen_paginate_pagination.py | 4 +- ...rray_advisory_xerox_paginate_pagination.py | 4 +- ...ray_advisory_xiaomi_paginate_pagination.py | 4 +- ...rray_advisory_xylem_paginate_pagination.py | 4 +- ...ray_advisory_yamaha_paginate_pagination.py | 4 +- ...y_yokogawa_advisory_paginate_pagination.py | 4 +- ...ray_advisory_yubico_paginate_pagination.py | 4 +- ...rray_advisory_zebra_paginate_pagination.py | 4 +- ...y_zero_day_advisory_paginate_pagination.py | 4 +- ...ro_science_advisory_paginate_pagination.py | 4 +- ...ray_advisory_zimbra_paginate_pagination.py | 4 +- ...array_advisory_zoom_paginate_pagination.py | 4 +- ...ay_advisory_zscaler_paginate_pagination.py | 4 +- ...array_advisory_zuso_paginate_pagination.py | 4 +- ...rray_advisory_zyxel_paginate_pagination.py | 4 +- ..._cve_items_extended_paginate_pagination.py | 4 +- ...array_api_cve_items_paginate_pagination.py | 42 +- ...adata_array_api_cwe_paginate_pagination.py | 4 +- ...array_api_epss_data_paginate_pagination.py | 4 +- ...y_api_exploit_chain_paginate_pagination.py | 4 +- ...i_exploit_v3_result_paginate_pagination.py | 9 +- ..._exploits_changelog_paginate_pagination.py | 8 +- ..._api_initial_access_paginate_pagination.py | 4 +- ...mitre_attack_to_cve_paginate_pagination.py | 4 +- ...api_nvd20_cpe_match_paginate_pagination.py | 4 +- ..._nvd20_cve_extended_paginate_pagination.py | 4 +- ...array_api_nvd20_cve_paginate_pagination.py | 4 +- ...ray_api_oss_package_paginate_pagination.py | 4 +- ...ta_array_api_update_paginate_pagination.py | 10 +- ...i_vuln_check_canary_paginate_pagination.py | 4 +- ...vulnerability_alias_paginate_pagination.py | 4 +- ...purls_purl_response_paginate_pagination.py | 4 +- ..._string_v3controllers_response_metadata.py | 4 +- ..._v3controllers_backup_response_metadata.py | 4 +- ...ta_v3controllers_purl_response_metadata.py | 16 +- ...a_v3controllers_purls_response_metadata.py | 16 +- .../test_search_error_response.py} | 32 +- test/aio/test_search_v4_advisory_meta.py | 58 + .../test_search_v4_advisory_return_value.py | 233 + .../test_search_v4_feed_item.py} | 29 +- .../test_search_v4_list_feed_return_value.py | 57 + ..._v3controllers_backup_response_metadata.py | 4 +- .../test_v3controllers_purl_response_data.py | 4 +- ...st_v3controllers_purl_response_metadata.py | 4 +- ...t_v3controllers_purls_response_metadata.py | 4 +- .../test_v3controllers_response_metadata.py | 4 +- test/blocking/test_advisory_a10.py | 4 +- test/blocking/test_advisory_abb_advisory.py | 4 +- test/blocking/test_advisory_abbott.py | 4 +- test/blocking/test_advisory_absolute.py | 4 +- .../blocking/test_advisory_acknowledgement.py | 4 +- test/blocking/test_advisory_acronis.py | 4 +- test/blocking/test_advisory_adobe_advisory.py | 4 +- test/blocking/test_advisory_adobe_affected.py | 4 +- test/blocking/test_advisory_adobe_cve.py | 4 +- test/blocking/test_advisory_adobe_solution.py | 4 +- test/blocking/test_advisory_adp.py | 4 +- test/blocking/test_advisory_adp_container.py | 4 +- test/blocking/test_advisory_advantech.py | 4 +- test/blocking/test_advisory_advisory.py | 4 +- .../test_advisory_advisory_details.py | 10 +- .../blocking/test_advisory_advisory_record.py | 4 +- test/blocking/test_advisory_affected.py | 4 +- .../blocking/test_advisory_affected_chrome.py | 4 +- .../test_advisory_affected_debian_package.py | 4 +- .../test_advisory_affected_debian_release.py | 4 +- ...est_advisory_affected_debian_repository.py | 4 +- test/blocking/test_advisory_affected_file.py | 4 +- .../test_advisory_affected_product.py | 4 +- test/blocking/test_advisory_affected_rel.py | 4 +- .../test_advisory_affected_ubuntu_package.py | 4 +- test/blocking/test_advisory_aix.py | 4 +- test/blocking/test_advisory_aleph_research.py | 4 +- test/blocking/test_advisory_alibaba.py | 4 +- test/blocking/test_advisory_alma_date.py | 4 +- .../test_advisory_alma_linux_update.py | 4 +- test/blocking/test_advisory_alma_object_id.py | 4 +- test/blocking/test_advisory_alma_package.py | 4 +- .../test_advisory_alma_package_list.py | 4 +- test/blocking/test_advisory_alma_reference.py | 4 +- .../test_advisory_alpine_linux_sec_db.py | 4 +- ...st_advisory_alpine_linux_sec_db_package.py | 4 +- ...test_advisory_alpine_linux_security_fix.py | 4 +- .../test_advisory_amazon_affected_package.py | 4 +- test/blocking/test_advisory_amazon_cve.py | 4 +- test/blocking/test_advisory_amd.py | 4 +- test/blocking/test_advisory_ami.py | 4 +- .../test_advisory_anchore_nvd_override.py | 4 +- .../test_advisory_android_advisory.py | 4 +- .../test_advisory_android_affected.py | 4 +- test/blocking/test_advisory_android_event.py | 4 +- .../blocking/test_advisory_android_package.py | 4 +- test/blocking/test_advisory_android_range.py | 4 +- .../test_advisory_android_reference.py | 4 +- .../test_advisory_apache_active_mq.py | 4 +- test/blocking/test_advisory_apache_archiva.py | 4 +- test/blocking/test_advisory_apache_arrow.py | 4 +- test/blocking/test_advisory_apache_camel.py | 4 +- test/blocking/test_advisory_apache_commons.py | 4 +- .../blocking/test_advisory_apache_couch_db.py | 4 +- test/blocking/test_advisory_apache_flink.py | 4 +- .../test_advisory_apache_guacamole.py | 4 +- test/blocking/test_advisory_apache_hadoop.py | 4 +- test/blocking/test_advisory_apache_http.py | 4 +- .../blocking/test_advisory_apache_jsp_wiki.py | 4 +- test/blocking/test_advisory_apache_kafka.py | 4 +- .../test_advisory_apache_logging_services.py | 4 +- test/blocking/test_advisory_apache_ni_fi.py | 4 +- test/blocking/test_advisory_apache_of_biz.py | 4 +- .../test_advisory_apache_open_meetings.py | 4 +- .../test_advisory_apache_open_office.py | 4 +- test/blocking/test_advisory_apache_pulsar.py | 4 +- test/blocking/test_advisory_apache_shiro.py | 4 +- test/blocking/test_advisory_apache_spark.py | 4 +- test/blocking/test_advisory_apache_struts.py | 4 +- .../test_advisory_apache_subversion.py | 4 +- .../blocking/test_advisory_apache_superset.py | 4 +- test/blocking/test_advisory_apache_tomcat.py | 4 +- .../test_advisory_apache_zoo_keeper.py | 4 +- test/blocking/test_advisory_api.py | 46 + test/blocking/test_advisory_app_check.py | 4 +- test/blocking/test_advisory_appgate.py | 4 +- test/blocking/test_advisory_apple_advisory.py | 4 +- .../blocking/test_advisory_apple_component.py | 4 +- test/blocking/test_advisory_arch_issue.py | 4 +- test/blocking/test_advisory_arista.py | 4 +- test/blocking/test_advisory_aruba.py | 4 +- test/blocking/test_advisory_asrg.py | 4 +- test/blocking/test_advisory_asset_note.py | 4 +- test/blocking/test_advisory_asterisk.py | 4 +- test/blocking/test_advisory_astra.py | 4 +- test/blocking/test_advisory_asus.py | 4 +- .../test_advisory_atlassian_advisory.py | 4 +- .../test_advisory_atlassian_products.py | 4 +- test/blocking/test_advisory_atlassian_vuln.py | 4 +- test/blocking/test_advisory_atredis.py | 4 +- test/blocking/test_advisory_audiocodes.py | 4 +- test/blocking/test_advisory_aus_cert.py | 4 +- test/blocking/test_advisory_autodesk.py | 4 +- test/blocking/test_advisory_avaya.py | 4 +- test/blocking/test_advisory_aveva_advisory.py | 4 +- test/blocking/test_advisory_avidml_advs.py | 4 +- test/blocking/test_advisory_avigilon.py | 4 +- test/blocking/test_advisory_award.py | 4 +- test/blocking/test_advisory_aws.py | 4 +- test/blocking/test_advisory_axis.py | 4 +- test/blocking/test_advisory_azul.py | 4 +- .../test_advisory_b_braun_advisory.py | 4 +- test/blocking/test_advisory_bandr.py | 4 +- .../blocking/test_advisory_baxter_advisory.py | 4 +- test/blocking/test_advisory_bdu_advisory.py | 4 +- test/blocking/test_advisory_bdu_cvss.py | 4 +- test/blocking/test_advisory_bdu_cvss3.py | 4 +- .../blocking/test_advisory_bdu_environment.py | 4 +- test/blocking/test_advisory_bdu_soft.py | 4 +- test/blocking/test_advisory_bdu_types.py | 4 +- test/blocking/test_advisory_bdu_vector.py | 4 +- .../test_advisory_bdu_vulnerable_software.py | 4 +- test/blocking/test_advisory_bduos.py | 4 +- .../test_advisory_beckhoff_advisory.py | 4 +- .../blocking/test_advisory_beckman_coulter.py | 4 +- ...test_advisory_becton_dickinson_advisory.py | 4 +- .../blocking/test_advisory_belden_advisory.py | 4 +- test/blocking/test_advisory_beyond_trust.py | 4 +- test/blocking/test_advisory_binarly.py | 4 +- test/blocking/test_advisory_bit_defender.py | 4 +- test/blocking/test_advisory_black_berry.py | 4 +- test/blocking/test_advisory_bls.py | 4 +- test/blocking/test_advisory_bosch_advisory.py | 4 +- ...est_advisory_boston_scientific_advisory.py | 4 +- test/blocking/test_advisory_botnet.py | 4 +- test/blocking/test_advisory_bugzilla.py | 4 +- .../test_advisory_ca_cyber_centre_advisory.py | 4 +- test/blocking/test_advisory_canvas_exploit.py | 4 +- test/blocking/test_advisory_capec.py | 4 +- .../test_advisory_carestream_advisory.py | 4 +- test/blocking/test_advisory_carrier.py | 4 +- test/blocking/test_advisory_cbl_mariner.py | 4 +- test/blocking/test_advisory_centos_package.py | 4 +- test/blocking/test_advisory_cert_be.py | 4 +- .../test_advisory_cert_fr_advisory.py | 4 +- test/blocking/test_advisory_cert_in.py | 4 +- .../test_advisory_cert_ir_security_alert.py | 4 +- test/blocking/test_advisory_cert_se.py | 4 +- test/blocking/test_advisory_cert_ua.py | 4 +- .../blocking/test_advisory_certeu_advisory.py | 4 +- test/blocking/test_advisory_cesa.py | 4 +- test/blocking/test_advisory_chain_guard.py | 4 +- .../test_advisory_chain_guard_package.py | 4 +- .../test_advisory_chain_guard_sec_fix.py | 4 +- test/blocking/test_advisory_check_point.py | 4 +- test/blocking/test_advisory_chrome.py | 4 +- test/blocking/test_advisory_ciena.py | 4 +- test/blocking/test_advisory_cis_control.py | 4 +- test/blocking/test_advisory_cisa_alert.py | 4 +- test/blocking/test_advisory_cisa_csaf_adv.py | 79 +- test/blocking/test_advisory_cisco_advisory.py | 4 +- test/blocking/test_advisory_cisco_csaf.py | 4 +- .../test_advisory_cisco_known_good_value.py | 4 +- .../blocking/test_advisory_citrix_advisory.py | 4 +- .../test_advisory_claroty_vulnerability.py | 4 +- test/blocking/test_advisory_cloud_bees.py | 4 +- .../test_advisory_cloud_vuln_db_advisory.py | 4 +- .../test_advisory_cnnvd_entry_json.py | 4 +- test/blocking/test_advisory_cnvd_bulletin.py | 4 +- test/blocking/test_advisory_cnvd_flaw.py | 4 +- .../test_advisory_codesys_advisory.py | 4 +- test/blocking/test_advisory_comm_vault.py | 4 +- .../test_advisory_comm_vault_cve_details.py | 4 +- ...st_advisory_comm_vault_impacted_product.py | 4 +- ...ory_comm_vault_impacted_product_details.py | 4 +- .../test_advisory_comm_vault_resolution.py | 4 +- ..._advisory_comm_vault_resolution_details.py | 4 +- .../test_advisory_compass_security.py | 4 +- test/blocking/test_advisory_container_os.py | 4 +- .../test_advisory_core_impact_exploit.py | 4 +- test/blocking/test_advisory_correction.py | 4 +- test/blocking/test_advisory_cos_update.py | 4 +- test/blocking/test_advisory_cpe_match.py | 4 +- test/blocking/test_advisory_cpe_node.py | 4 +- test/blocking/test_advisory_credit.py | 4 +- test/blocking/test_advisory_crestron.py | 4 +- test/blocking/test_advisory_crowd_sec.py | 4 +- test/blocking/test_advisory_csaf.py | 8 +- test/blocking/test_advisory_csaf_note.py | 4 +- test/blocking/test_advisory_csaf_reference.py | 4 +- .../test_advisory_csaf_relationship.py | 8 +- test/blocking/test_advisory_csaf_score.py | 4 +- .../test_advisory_csaf_vulnerability.py | 4 +- test/blocking/test_advisory_curl.py | 4 +- test/blocking/test_advisory_curl_affected.py | 4 +- test/blocking/test_advisory_curl_credit.py | 4 +- test/blocking/test_advisory_curl_cwe.py | 4 +- test/blocking/test_advisory_curl_range.py | 4 +- test/blocking/test_advisory_cve_detail.py | 4 +- .../test_advisory_cve_details_link.py | 4 +- test/blocking/test_advisory_cve_reference.py | 4 +- test/blocking/test_advisory_cvrf.py | 70 +- test/blocking/test_advisory_cvrf_reference.py | 53 - test/blocking/test_advisory_cvss.py | 4 +- test/blocking/test_advisory_cvsss_v23.py | 4 +- test/blocking/test_advisory_cvssv2.py | 4 +- test/blocking/test_advisory_cvssv3.py | 4 +- test/blocking/test_advisory_cvssv40.py | 4 +- test/blocking/test_advisory_cvssv40_threat.py | 4 +- test/blocking/test_advisory_cwe.py | 4 +- .../test_advisory_cwe_acceptance_level.py | 4 +- test/blocking/test_advisory_cwe_data.py | 4 +- test/blocking/test_advisory_cwes.py | 13 +- test/blocking/test_advisory_cycle.py | 4 +- test/blocking/test_advisory_d_link.py | 4 +- test/blocking/test_advisory_dahua.py | 4 +- .../test_advisory_dan_foss_cve_details.py | 4 +- test/blocking/test_advisory_danfoss.py | 4 +- test/blocking/test_advisory_dassault.py | 4 +- test/blocking/test_advisory_date_time.py | 52 - test/blocking/test_advisory_db_specific.py | 4 +- test/blocking/test_advisory_debian_cve.py | 4 +- .../test_advisory_debian_security_advisory.py | 4 +- test/blocking/test_advisory_dell.py | 4 +- test/blocking/test_advisory_dell_cve.py | 4 +- test/blocking/test_advisory_delta_advisory.py | 4 +- test/blocking/test_advisory_dfn_cert.py | 4 +- test/blocking/test_advisory_distro_package.py | 4 +- test/blocking/test_advisory_distro_version.py | 4 +- test/blocking/test_advisory_django.py | 4 +- test/blocking/test_advisory_dnn.py | 4 +- .../test_advisory_document_metadata.py | 4 +- test/blocking/test_advisory_document_note.py | 54 - .../test_advisory_document_publisher.py | 4 +- .../test_advisory_document_tracking.py | 62 - test/blocking/test_advisory_dot_cms.py | 4 +- .../blocking/test_advisory_dragos_advisory.py | 4 +- test/blocking/test_advisory_draytek.py | 4 +- test/blocking/test_advisory_drupal.py | 4 +- test/blocking/test_advisory_eaton_advisory.py | 4 +- test/blocking/test_advisory_eco_system.py | 4 +- test/blocking/test_advisory_elastic.py | 4 +- test/blocking/test_advisory_elspec.py | 4 +- .../test_advisory_emerging_threats_snort.py | 4 +- .../test_advisory_emerson_advisory.py | 4 +- test/blocking/test_advisory_end_of_life.py | 14 +- test/blocking/test_advisory_endress.py | 4 +- .../test_advisory_enisa_id_product.py | 4 +- .../blocking/test_advisory_enisa_id_vendor.py | 4 +- test/blocking/test_advisory_eol_alibaba.py | 4 +- test/blocking/test_advisory_eol_microsoft.py | 4 +- .../test_advisory_eol_release_data.py | 4 +- test/blocking/test_advisory_euvd.py | 4 +- test/blocking/test_advisory_event.py | 4 +- test/blocking/test_advisory_exodus_intel.py | 4 +- .../test_advisory_exploit_db_exploitv2.py | 4 +- .../test_advisory_external_references.py | 4 +- test/blocking/test_advisory_f5.py | 4 +- test/blocking/test_advisory_f_secure.py | 4 +- test/blocking/test_advisory_fanuc.py | 4 +- test/blocking/test_advisory_fastly.py | 4 +- test/blocking/test_advisory_festo.py | 4 +- test/blocking/test_advisory_file_cloud.py | 4 +- test/blocking/test_advisory_file_zilla.py | 4 +- test/blocking/test_advisory_fix_aff.py | 4 +- test/blocking/test_advisory_flag.py | 4 +- test/blocking/test_advisory_flatt_security.py | 4 +- test/blocking/test_advisory_forge_rock.py | 4 +- .../test_advisory_fortinet_advisory.py | 4 +- test/blocking/test_advisory_fortinet_ips.py | 4 +- test/blocking/test_advisory_foxit.py | 4 +- test/blocking/test_advisory_foxit_affected.py | 4 +- test/blocking/test_advisory_fresenius.py | 4 +- test/blocking/test_advisory_gallagher.py | 4 +- test/blocking/test_advisory_gcp.py | 4 +- test/blocking/test_advisory_ge_gas.py | 4 +- .../test_advisory_ge_healthcare_advisory.py | 4 +- test/blocking/test_advisory_gen.py | 4 +- test/blocking/test_advisory_genetec.py | 4 +- .../test_advisory_gh_advisory_json_lean.py | 13 +- test/blocking/test_advisory_gh_cvss.py | 4 +- test/blocking/test_advisory_gh_identifier.py | 4 +- test/blocking/test_advisory_gh_node.py | 4 +- test/blocking/test_advisory_gh_package.py | 4 +- test/blocking/test_advisory_gh_reference.py | 4 +- .../test_advisory_gh_vulnerabilities.py | 4 +- test/blocking/test_advisory_ghsa.py | 4 +- test/blocking/test_advisory_ghsa_affected.py | 4 +- .../test_advisory_ghsa_database_specific.py | 4 +- .../test_advisory_ghsa_eco_system_specific.py | 4 +- test/blocking/test_advisory_ghsa_event.py | 4 +- test/blocking/test_advisory_ghsa_package.py | 4 +- test/blocking/test_advisory_ghsa_range.py | 4 +- test/blocking/test_advisory_ghsa_reference.py | 4 +- test/blocking/test_advisory_ghsa_severity.py | 4 +- test/blocking/test_advisory_gigabyte.py | 4 +- .../blocking/test_advisory_git_hub_exploit.py | 4 +- .../blocking/test_advisory_git_lab_exploit.py | 4 +- test/blocking/test_advisory_gitee_exploit.py | 4 +- .../blocking/test_advisory_gitlab_advisory.py | 4 +- test/blocking/test_advisory_glibc.py | 4 +- .../test_advisory_gmo_cyber_security.py | 4 +- test/blocking/test_advisory_gnu_tls.py | 4 +- test/blocking/test_advisory_go_credits.py | 4 +- test/blocking/test_advisory_go_event.py | 4 +- .../test_advisory_go_vuln_affected.py | 4 +- ...test_advisory_go_vuln_database_specific.py | 4 +- ...est_advisory_go_vuln_ecosystem_specific.py | 4 +- test/blocking/test_advisory_go_vuln_import.py | 4 +- test/blocking/test_advisory_go_vuln_json.py | 4 +- .../blocking/test_advisory_go_vuln_package.py | 4 +- test/blocking/test_advisory_go_vuln_ranges.py | 4 +- .../test_advisory_go_vuln_reference.py | 4 +- test/blocking/test_advisory_grafana.py | 4 +- .../test_advisory_grey_noise_detection.py | 4 +- .../blocking/test_advisory_grey_noise_tags.py | 4 +- test/blocking/test_advisory_hacktivity.py | 4 +- .../blocking/test_advisory_hardware_update.py | 4 +- test/blocking/test_advisory_harmony_os.py | 4 +- test/blocking/test_advisory_hashi_corp.py | 4 +- .../test_advisory_haskell_affected.py | 4 +- .../test_advisory_haskell_sadb_advisory.py | 4 +- .../blocking/test_advisory_haskell_version.py | 4 +- test/blocking/test_advisory_hcl.py | 4 +- test/blocking/test_advisory_hik_vision.py | 4 +- .../test_advisory_hillrom_advisory.py | 4 +- test/blocking/test_advisory_hitachi.py | 4 +- test/blocking/test_advisory_hitachi_energy.py | 4 +- test/blocking/test_advisory_hk_cert.py | 4 +- test/blocking/test_advisory_hms.py | 4 +- test/blocking/test_advisory_honeywell.py | 4 +- test/blocking/test_advisory_hp.py | 4 +- test/blocking/test_advisory_hpe.py | 4 +- test/blocking/test_advisory_huawei.py | 4 +- .../blocking/test_advisory_huawei_euler_os.py | 4 +- test/blocking/test_advisory_huawei_ips.py | 4 +- test/blocking/test_advisory_i_val.py | 4 +- test/blocking/test_advisory_iava.py | 4 +- test/blocking/test_advisory_ibm.py | 4 +- test/blocking/test_advisory_idemia.py | 4 +- test/blocking/test_advisory_igel.py | 4 +- test/blocking/test_advisory_impact.py | 4 +- .../blocking/test_advisory_incibe_advisory.py | 4 +- test/blocking/test_advisory_intel.py | 4 +- .../blocking/test_advisory_ip_intel_record.py | 4 +- test/blocking/test_advisory_israeli_alert.py | 4 +- .../test_advisory_israeli_vulnerability.py | 4 +- test/blocking/test_advisory_issued.py | 52 - test/blocking/test_advisory_istio.py | 4 +- test/blocking/test_advisory_itw.py | 4 +- test/blocking/test_advisory_itw_exploit.py | 4 +- test/blocking/test_advisory_ivanti.py | 4 +- test/blocking/test_advisory_ivanti_rss.py | 4 +- test/blocking/test_advisory_j_frog.py | 4 +- test/blocking/test_advisory_jenkins.py | 4 +- test/blocking/test_advisory_jet_brains.py | 4 +- test/blocking/test_advisory_jnj_advisory.py | 4 +- .../test_advisory_johnson_controls.py | 4 +- test/blocking/test_advisory_juniper.py | 4 +- test/blocking/test_advisory_jvn.py | 4 +- .../test_advisory_jvn_advisory_item.py | 4 +- test/blocking/test_advisory_jvn_reference.py | 4 +- test/blocking/test_advisory_jvncpe.py | 4 +- test/blocking/test_advisory_k8_s.py | 4 +- ...est_advisory_kaspersky_icscert_advisory.py | 4 +- test/blocking/test_advisory_kb.py | 4 +- .../test_advisory_kb_threat_description.py | 4 +- ...test_advisory_kev_catalog_vulnerability.py | 4 +- test/blocking/test_advisory_kore_logic.py | 4 +- .../test_advisory_kr_cert_advisory.py | 4 +- test/blocking/test_advisory_kunbus.py | 4 +- test/blocking/test_advisory_lantronix.py | 4 +- test/blocking/test_advisory_lenovo.py | 4 +- .../test_advisory_lexmark_advisory.py | 4 +- test/blocking/test_advisory_lg.py | 4 +- test/blocking/test_advisory_libre_office.py | 4 +- test/blocking/test_advisory_linux.py | 4 +- test/blocking/test_advisory_log_source.py | 4 +- test/blocking/test_advisory_lol_advs.py | 6 +- test/blocking/test_advisory_m_affected.py | 4 +- test/blocking/test_advisory_m_branch.py | 4 +- test/blocking/test_advisory_m_cna.py | 4 +- test/blocking/test_advisory_m_containers.py | 9 +- test/blocking/test_advisory_m_cve_metadata.py | 4 +- test/blocking/test_advisory_m_cvss_v20.py | 4 +- test/blocking/test_advisory_m_cvss_v30.py | 4 +- test/blocking/test_advisory_m_cvss_v31.py | 4 +- test/blocking/test_advisory_m_cvss_v40.py | 4 +- test/blocking/test_advisory_m_descriptions.py | 4 +- .../test_advisory_m_document_tracking.py | 4 +- test/blocking/test_advisory_m_files.py | 4 +- .../test_advisory_m_full_product_name.py | 4 +- .../test_advisory_m_identification.py | 4 +- test/blocking/test_advisory_m_item.py | 4 +- test/blocking/test_advisory_m_nodes.py | 4 +- .../blocking/test_advisory_m_problem_types.py | 4 +- .../test_advisory_m_product_status.py | 4 +- test/blocking/test_advisory_m_product_tree.py | 4 +- .../test_advisory_m_provider_metadata.py | 4 +- test/blocking/test_advisory_m_reference.py | 4 +- test/blocking/test_advisory_m_remediation.py | 4 +- test/blocking/test_advisory_m_version.py | 4 +- .../blocking/test_advisory_m_vulnerability.py | 4 +- test/blocking/test_advisory_ma_cert.py | 4 +- .../test_advisory_malicious_package.py | 8 +- test/blocking/test_advisory_manage_engine.py | 4 +- .../test_advisory_manage_engine_advisory.py | 4 +- test/blocking/test_advisory_mbed_tls.py | 4 +- test/blocking/test_advisory_mc_afee.py | 4 +- test/blocking/test_advisory_mc_afee_score.py | 4 +- .../test_advisory_mcpe_applicability.py | 4 +- test/blocking/test_advisory_mcpe_match.py | 4 +- test/blocking/test_advisory_me_product.py | 4 +- test/blocking/test_advisory_mediatek.py | 4 +- .../test_advisory_medtronic_advisory.py | 4 +- test/blocking/test_advisory_mendix.py | 4 +- .../blocking/test_advisory_meta_advisories.py | 4 +- test/blocking/test_advisory_meta_data.py | 10 +- .../test_advisory_metasploit_exploit.py | 4 +- test/blocking/test_advisory_metric.py | 4 +- .../blocking/test_advisory_metric_scenario.py | 4 +- test/blocking/test_advisory_metrics_other.py | 4 +- test/blocking/test_advisory_microsoft_csaf.py | 79 +- test/blocking/test_advisory_microsoft_cvrf.py | 4 +- ...st_advisory_microsoft_driver_block_list.py | 4 +- .../test_advisory_microsoft_file_metadata.py | 4 +- test/blocking/test_advisory_microsoft_kb.py | 4 +- test/blocking/test_advisory_mikrotik.py | 4 +- test/blocking/test_advisory_mindray.py | 4 +- test/blocking/test_advisory_misp_meta.py | 4 +- .../test_advisory_misp_related_item.py | 4 +- test/blocking/test_advisory_misp_value.py | 4 +- .../test_advisory_misp_value_no_id.py | 4 +- test/blocking/test_advisory_mitel.py | 4 +- .../test_advisory_mitre_attack_group_no_id.py | 4 +- .../test_advisory_mitre_attack_ref.py | 4 +- ...st_advisory_mitre_attack_tech_with_refs.py | 4 +- .../test_advisory_mitre_attack_technique.py | 4 +- .../test_advisory_mitre_cve_list_v5.py | 13 +- .../test_advisory_mitre_cve_list_v5_ref.py | 13 +- .../blocking/test_advisory_mitre_group_cti.py | 4 +- ...t_advisory_mitsubishi_electric_advisory.py | 4 +- test/blocking/test_advisory_mongo_db.py | 4 +- test/blocking/test_advisory_moxa_advisory.py | 4 +- .../test_advisory_mozilla_advisory.py | 4 +- .../test_advisory_mozilla_component.py | 4 +- .../test_advisory_ms_document_title.py | 4 +- test/blocking/test_advisory_mscvrf.py | 4 +- test/blocking/test_advisory_naver.py | 4 +- test/blocking/test_advisory_ncsc.py | 79 +- test/blocking/test_advisory_ncsccve.py | 79 +- test/blocking/test_advisory_nec.py | 4 +- test/blocking/test_advisory_nessus.py | 4 +- test/blocking/test_advisory_net_app.py | 4 +- test/blocking/test_advisory_netatalk.py | 4 +- test/blocking/test_advisory_netgate.py | 4 +- test/blocking/test_advisory_netgear.py | 4 +- test/blocking/test_advisory_netskope.py | 4 +- test/blocking/test_advisory_nexpose.py | 4 +- test/blocking/test_advisory_nginx_advisory.py | 4 +- test/blocking/test_advisory_nhs.py | 4 +- test/blocking/test_advisory_ni.py | 4 +- test/blocking/test_advisory_nist_control.py | 4 +- test/blocking/test_advisory_node_author.py | 4 +- test/blocking/test_advisory_node_js.py | 4 +- test/blocking/test_advisory_node_security.py | 4 +- test/blocking/test_advisory_nokia.py | 4 +- test/blocking/test_advisory_note.py | 4 +- .../test_advisory_note_pad_plus_plus.py | 4 +- test/blocking/test_advisory_nozomi.py | 4 +- test/blocking/test_advisory_ntp.py | 4 +- test/blocking/test_advisory_nuclei.py | 4 +- .../test_advisory_nvd20_configuration.py | 4 +- .../test_advisory_nvd20_cvecpe_match.py | 4 +- test/blocking/test_advisory_nvd20_node.py | 4 +- test/blocking/test_advisory_nvd20_source.py | 4 +- .../test_advisory_nvdcpe_dictionary.py | 4 +- .../blocking/test_advisory_nvidia_revision.py | 4 +- test/blocking/test_advisory_nz_advisory.py | 4 +- test/blocking/test_advisory_o_curl.py | 4 +- test/blocking/test_advisory_octopus_deploy.py | 4 +- test/blocking/test_advisory_okta.py | 4 +- test/blocking/test_advisory_omron.py | 4 +- test/blocking/test_advisory_one_e.py | 4 +- test/blocking/test_advisory_open_bsd.py | 4 +- test/blocking/test_advisory_open_cvdb.py | 4 +- test/blocking/test_advisory_open_jdk.py | 4 +- test/blocking/test_advisory_open_jdkcve.py | 4 +- test/blocking/test_advisory_open_ssh.py | 4 +- .../test_advisory_open_ssl_sec_adv.py | 4 +- .../test_advisory_open_ssl_vulnerability.py | 4 +- test/blocking/test_advisory_open_stack.py | 4 +- test/blocking/test_advisory_opengear.py | 4 +- test/blocking/test_advisory_oracle_cpu.py | 4 +- test/blocking/test_advisory_oracle_cpucsaf.py | 79 +- test/blocking/test_advisory_original_ghsa.py | 4 +- test/blocking/test_advisory_osv.py | 8 +- test/blocking/test_advisory_osv_obj.py | 8 +- test/blocking/test_advisory_osv_package.py | 4 +- test/blocking/test_advisory_osv_reference.py | 4 +- test/blocking/test_advisory_otrs.py | 4 +- test/blocking/test_advisory_oval_cve.py | 4 +- test/blocking/test_advisory_oval_reference.py | 4 +- test/blocking/test_advisory_override.py | 4 +- .../test_advisory_override_annotation.py | 4 +- .../test_advisory_override_configuration.py | 4 +- test/blocking/test_advisory_override_cve.py | 4 +- test/blocking/test_advisory_own_cloud.py | 4 +- test/blocking/test_advisory_package.py | 4 +- test/blocking/test_advisory_package_stat.py | 4 +- .../test_advisory_packetstorm_exploit.py | 4 +- test/blocking/test_advisory_palantir.py | 4 +- .../test_advisory_palo_alto_advisory.py | 4 +- test/blocking/test_advisory_panasonic.py | 4 +- test/blocking/test_advisory_paper_cut.py | 4 +- test/blocking/test_advisory_patch.py | 4 +- test/blocking/test_advisory_pega.py | 4 +- test/blocking/test_advisory_pg_fix.py | 4 +- .../test_advisory_philips_advisory.py | 4 +- .../test_advisory_phoenix_contact_advisory.py | 4 +- test/blocking/test_advisory_phpmy_admin.py | 4 +- test/blocking/test_advisory_pk_cert.py | 4 +- test/blocking/test_advisory_postgres_sql.py | 4 +- test/blocking/test_advisory_power_dns.py | 4 +- test/blocking/test_advisory_prime_version.py | 4 +- test/blocking/test_advisory_product.py | 8 +- test/blocking/test_advisory_product_branch.py | 20 +- .../test_advisory_product_specific_detail.py | 4 +- test/blocking/test_advisory_product_tree.py | 57 - .../test_advisory_products_affected.py | 4 +- test/blocking/test_advisory_progress.py | 4 +- test/blocking/test_advisory_proofpoint.py | 4 +- test/blocking/test_advisory_ptc.py | 4 +- .../test_advisory_ptm_descriptions.py | 4 +- test/blocking/test_advisory_publisher.py | 4 +- test/blocking/test_advisory_pure_storage.py | 4 +- test/blocking/test_advisory_py_pa_advisory.py | 4 +- test/blocking/test_advisory_py_pa_affected.py | 4 +- test/blocking/test_advisory_py_pa_event.py | 4 +- test/blocking/test_advisory_py_pa_package.py | 4 +- test/blocking/test_advisory_py_pa_range.py | 4 +- .../blocking/test_advisory_py_pa_reference.py | 4 +- test/blocking/test_advisory_qnap_advisory.py | 4 +- test/blocking/test_advisory_qqid.py | 4 +- test/blocking/test_advisory_qsb.py | 4 +- test/blocking/test_advisory_qualcomm.py | 4 +- test/blocking/test_advisory_qualys.py | 4 +- test/blocking/test_advisory_qualys_qid.py | 4 +- test/blocking/test_advisory_r_description.py | 4 +- test/blocking/test_advisory_r_note.py | 4 +- test/blocking/test_advisory_r_revision.py | 4 +- test/blocking/test_advisory_r_score_set.py | 4 +- test/blocking/test_advisory_r_threat.py | 4 +- test/blocking/test_advisory_range.py | 4 +- .../test_advisory_ransomware_exploit.py | 4 +- test/blocking/test_advisory_record_type.py | 4 +- test/blocking/test_advisory_red_lion.py | 4 +- test/blocking/test_advisory_redhat_cve.py | 4 +- test/blocking/test_advisory_reference.py | 4 +- test/blocking/test_advisory_related_rule.py | 4 +- test/blocking/test_advisory_relationship.py | 54 - .../test_advisory_remediation_data.py | 4 +- test/blocking/test_advisory_renesas.py | 4 +- .../test_advisory_reported_exploit.py | 4 +- test/blocking/test_advisory_restart_data.py | 4 +- test/blocking/test_advisory_revision.py | 54 - .../test_advisory_revision_history.py | 4 +- test/blocking/test_advisory_revive.py | 4 +- test/blocking/test_advisory_rhel_cve.py | 79 +- test/blocking/test_advisory_roche.py | 4 +- test/blocking/test_advisory_roche_cve.py | 4 +- test/blocking/test_advisory_rockwell.py | 4 +- ...test_advisory_rockwell_affected_product.py | 4 +- test/blocking/test_advisory_rocky_advisory.py | 4 +- test/blocking/test_advisory_rocky_cve.py | 4 +- test/blocking/test_advisory_rocky_errata.py | 4 +- test/blocking/test_advisory_rocky_fix.py | 4 +- test/blocking/test_advisory_rocky_package.py | 4 +- test/blocking/test_advisory_rocky_version.py | 4 +- test/blocking/test_advisory_rsync.py | 4 +- test/blocking/test_advisory_ruckus.py | 4 +- .../test_advisory_rustsec_advisory.py | 4 +- .../test_advisory_rustsec_affected.py | 4 +- ..._advisory_rustsec_front_matter_advisory.py | 4 +- ..._advisory_rustsec_front_matter_versions.py | 4 +- test/blocking/test_advisory_sa_advisory.py | 4 +- test/blocking/test_advisory_safran.py | 4 +- test/blocking/test_advisory_saint_exploit.py | 4 +- test/blocking/test_advisory_sales_force.py | 4 +- test/blocking/test_advisory_samba.py | 4 +- test/blocking/test_advisory_sandisk.py | 4 +- test/blocking/test_advisory_sans_dshield.py | 4 +- test/blocking/test_advisory_sap.py | 4 +- test/blocking/test_advisory_schneider_cve.py | 4 +- ...st_advisory_schneider_electric_advisory.py | 4 +- test/blocking/test_advisory_schutzwerk.py | 4 +- test/blocking/test_advisory_score_set.py | 53 - test/blocking/test_advisory_sec_consult.py | 4 +- test/blocking/test_advisory_sec_fix.py | 4 +- .../test_advisory_security_bulletin.py | 4 +- test/blocking/test_advisory_security_lab.py | 4 +- test/blocking/test_advisory_seebug_exploit.py | 4 +- test/blocking/test_advisory_sel.py | 4 +- test/blocking/test_advisory_sentinel_one.py | 4 +- test/blocking/test_advisory_service_now.py | 4 +- test/blocking/test_advisory_seven_zip.py | 4 +- test/blocking/test_advisory_severity.py | 4 +- ...y_shadow_server_exploited_vulnerability.py | 4 +- test/blocking/test_advisory_shielder.py | 4 +- test/blocking/test_advisory_sick.py | 4 +- .../test_advisory_siemens_acknowledgments.py | 4 +- .../test_advisory_siemens_advisory.py | 4 +- test/blocking/test_advisory_siemens_branch.py | 4 +- test/blocking/test_advisory_siemens_cvssv3.py | 4 +- test/blocking/test_advisory_siemens_cwe.py | 4 +- .../test_advisory_siemens_distribution.py | 4 +- .../test_advisory_siemens_document.py | 4 +- test/blocking/test_advisory_siemens_engine.py | 4 +- .../test_advisory_siemens_generator.py | 4 +- test/blocking/test_advisory_siemens_notes.py | 4 +- .../blocking/test_advisory_siemens_product.py | 4 +- ...y_siemens_product_identification_helper.py | 4 +- .../test_advisory_siemens_product_status.py | 4 +- .../test_advisory_siemens_product_tree.py | 4 +- .../test_advisory_siemens_publisher.py | 4 +- .../test_advisory_siemens_references.py | 4 +- .../test_advisory_siemens_remediation.py | 4 +- .../test_advisory_siemens_revision_history.py | 4 +- test/blocking/test_advisory_siemens_score.py | 4 +- .../test_advisory_siemens_sub_branch.py | 4 +- .../test_advisory_siemens_sub_sub_branch.py | 4 +- test/blocking/test_advisory_siemens_tlp.py | 4 +- .../test_advisory_siemens_tracking.py | 4 +- .../test_advisory_siemens_vulnerability.py | 4 +- .../blocking/test_advisory_sierra_wireless.py | 4 +- test/blocking/test_advisory_sigma_rule.py | 8 +- .../blocking/test_advisory_sigma_rule_rule.py | 8 +- test/blocking/test_advisory_sing_cert.py | 4 +- test/blocking/test_advisory_sitecore.py | 4 +- test/blocking/test_advisory_slackware.py | 4 +- .../blocking/test_advisory_software_update.py | 4 +- .../test_advisory_solar_winds_advisory.py | 4 +- test/blocking/test_advisory_solr.py | 4 +- test/blocking/test_advisory_sonatype.py | 4 +- .../test_advisory_sonic_wall_advisory.py | 4 +- ..._advisory_spacelabs_healthcare_advisory.py | 4 +- test/blocking/test_advisory_splunk.py | 4 +- test/blocking/test_advisory_splunk_product.py | 4 +- test/blocking/test_advisory_spring.py | 4 +- test/blocking/test_advisory_ssa_source.py | 4 +- test/blocking/test_advisory_ssd_advisory.py | 4 +- test/blocking/test_advisory_stormshield.py | 4 +- .../test_advisory_stryker_advisory.py | 4 +- test/blocking/test_advisory_sudo.py | 4 +- test/blocking/test_advisory_suse_security.py | 4 +- ...t_advisory_swisslog_healthcare_advisory.py | 4 +- test/blocking/test_advisory_symfony.py | 4 +- test/blocking/test_advisory_synacktiv.py | 4 +- test/blocking/test_advisory_syncro_soft.py | 4 +- test/blocking/test_advisory_synology.py | 4 +- test/blocking/test_advisory_syss.py | 4 +- test/blocking/test_advisory_tailscale.py | 4 +- test/blocking/test_advisory_talos_advisory.py | 4 +- test/blocking/test_advisory_team_viewer.py | 4 +- ...test_advisory_tenable_research_advisory.py | 4 +- test/blocking/test_advisory_tencent.py | 4 +- test/blocking/test_advisory_thales.py | 4 +- .../test_advisory_the_missing_link.py | 4 +- test/blocking/test_advisory_thermo_fisher.py | 4 +- test/blocking/test_advisory_threat.py | 53 - ...sory_threat_actor_with_external_objects.py | 4 +- test/blocking/test_advisory_threat_data.py | 4 +- test/blocking/test_advisory_ti.py | 4 +- test/blocking/test_advisory_tibco.py | 4 +- test/blocking/test_advisory_timeline.py | 4 +- test/blocking/test_advisory_tool.py | 4 +- test/blocking/test_advisory_tool_ref.py | 4 +- test/blocking/test_advisory_tp_link.py | 4 +- test/blocking/test_advisory_tracking.py | 4 +- test/blocking/test_advisory_tracking_id.py | 4 +- .../test_advisory_trane_technology.py | 4 +- test/blocking/test_advisory_trend_micro.py | 4 +- test/blocking/test_advisory_triage_notes.py | 4 +- test/blocking/test_advisory_trustwave.py | 4 +- .../test_advisory_tw_cert_advisory.py | 4 +- test/blocking/test_advisory_ubiquiti.py | 4 +- test/blocking/test_advisory_ubuntu_cve.py | 4 +- ..._advisory_ubuntu_package_release_status.py | 4 +- test/blocking/test_advisory_unify.py | 4 +- test/blocking/test_advisory_unisoc.py | 4 +- test/blocking/test_advisory_update.py | 10 +- test/blocking/test_advisory_updated.py | 52 - test/blocking/test_advisory_usd.py | 4 +- test/blocking/test_advisory_usom_advisory.py | 4 +- .../test_advisory_v3_acceptance_level.py | 4 +- test/blocking/test_advisory_van_dyke.py | 4 +- .../test_advisory_vapid_labs_advisory.py | 4 +- .../test_advisory_vc_vulnerable_cpes.py | 4 +- .../test_advisory_vccpe_dictionary.py | 4 +- test/blocking/test_advisory_vde_advisory.py | 79 +- test/blocking/test_advisory_veeam.py | 4 +- ...t_advisory_vendor_name_for_threat_actor.py | 4 +- test/blocking/test_advisory_vendor_product.py | 4 +- test/blocking/test_advisory_vendor_ref.py | 4 +- test/blocking/test_advisory_veritas.py | 4 +- test/blocking/test_advisory_virtuozzo.py | 4 +- test/blocking/test_advisory_vlc.py | 4 +- .../test_advisory_vm_ware_advisory.py | 4 +- test/blocking/test_advisory_void_sec.py | 4 +- test/blocking/test_advisory_vuln_check.py | 4 +- .../test_advisory_vuln_check_config.py | 4 +- .../test_advisory_vuln_check_cve_list_v5.py | 13 +- test/blocking/test_advisory_vuln_check_kev.py | 4 +- .../test_advisory_vuln_check_package.py | 4 +- test/blocking/test_advisory_vulnerability.py | 83 - ...test_advisory_vulnerable_debian_package.py | 4 +- .../test_advisory_vulnerable_product.py | 4 +- test/blocking/test_advisory_vulnrichment.py | 4 +- .../test_advisory_vulnrichment_containers.py | 4 +- .../test_advisory_vulnrichment_content.py | 4 +- .../test_advisory_vulnrichment_cve_ref.py | 4 +- .../test_advisory_vulnrichment_metric.py | 4 +- .../test_advisory_vulnrichment_option.py | 4 +- .../test_advisory_vulnrichment_other.py | 4 +- .../blocking/test_advisory_vyaire_advisory.py | 4 +- test/blocking/test_advisory_watch_guard.py | 4 +- test/blocking/test_advisory_whats_app.py | 4 +- test/blocking/test_advisory_wibu.py | 4 +- test/blocking/test_advisory_wireshark.py | 4 +- test/blocking/test_advisory_with_secure.py | 4 +- test/blocking/test_advisory_wolf_ssl.py | 4 +- test/blocking/test_advisory_wolfi.py | 4 +- test/blocking/test_advisory_wolfi_package.py | 4 +- test/blocking/test_advisory_wolfi_sec_fix.py | 4 +- test/blocking/test_advisory_wordfence.py | 4 +- test/blocking/test_advisory_wrt.py | 4 +- test/blocking/test_advisory_xdb.py | 4 +- test/blocking/test_advisory_xen.py | 4 +- test/blocking/test_advisory_xerox.py | 4 +- test/blocking/test_advisory_xiaomi.py | 4 +- test/blocking/test_advisory_xylem.py | 4 +- test/blocking/test_advisory_yamaha.py | 4 +- .../test_advisory_yokogawa_advisory.py | 4 +- test/blocking/test_advisory_yubico.py | 4 +- test/blocking/test_advisory_zdi.py | 4 +- test/blocking/test_advisory_zdi_product.py | 4 +- test/blocking/test_advisory_zdi_response.py | 4 +- .../test_advisory_zdi_response_vendor.py | 4 +- test/blocking/test_advisory_zdi_vendor.py | 4 +- test/blocking/test_advisory_zebra.py | 4 +- .../test_advisory_zero_day_advisory.py | 4 +- .../test_advisory_zero_science_advisory.py | 4 +- test/blocking/test_advisory_zimbra.py | 4 +- test/blocking/test_advisory_zoom.py | 4 +- test/blocking/test_advisory_zscaler.py | 4 +- test/blocking/test_advisory_zulu_version.py | 4 +- test/blocking/test_advisory_zuso.py | 4 +- test/blocking/test_advisory_zyxel.py | 4 +- test/blocking/test_api_base_metric_v2.py | 4 +- test/blocking/test_api_base_metric_v3.py | 4 +- .../test_api_categorization_extended.py | 4 +- test/blocking/test_api_client_fingerprints.py | 4 +- test/blocking/test_api_configurations.py | 4 +- test/blocking/test_api_cpe.py | 4 +- test/blocking/test_api_cpe_match.py | 4 +- test/blocking/test_api_cpe_name.py | 4 +- test/blocking/test_api_cve.py | 4 +- test/blocking/test_api_cve_data_meta.py | 4 +- .../test_api_cve_data_meta_extended.py | 4 +- test/blocking/test_api_cve_extended.py | 4 +- test/blocking/test_api_cve_items.py | 42 +- test/blocking/test_api_cve_items_extended.py | 4 +- test/blocking/test_api_cvssv2.py | 4 +- test/blocking/test_api_cvssv3.py | 4 +- test/blocking/test_api_cwe.py | 4 +- test/blocking/test_api_date_time.py | 52 - test/blocking/test_api_description.py | 4 +- test/blocking/test_api_description_data.py | 4 +- test/blocking/test_api_epss.py | 4 +- test/blocking/test_api_epss_data.py | 4 +- test/blocking/test_api_exploit_chain.py | 4 +- test/blocking/test_api_exploit_chain_cve.py | 4 +- test/blocking/test_api_exploit_v3_result.py | 4 +- test/blocking/test_api_exploits_change.py | 4 +- test/blocking/test_api_exploits_changelog.py | 8 +- test/blocking/test_api_exploits_trending.py | 4 +- test/blocking/test_api_exploits_v3_count.py | 4 +- .../blocking/test_api_exploits_v3_timeline.py | 4 +- test/blocking/test_api_http_details.py | 4 +- test/blocking/test_api_impact.py | 4 +- test/blocking/test_api_impact_extended.py | 4 +- test/blocking/test_api_initial_access.py | 4 +- .../test_api_initial_access_artifact.py | 4 +- test/blocking/test_api_mitre_attack_tech.py | 4 +- test/blocking/test_api_mitre_attack_to_cve.py | 4 +- .../test_api_mitre_d3fend_technique.py | 4 +- .../blocking/test_api_mitre_detection_tech.py | 4 +- ...st_api_mitre_mitigation2_d3fend_mapping.py | 4 +- .../test_api_mitre_mitigation_tech.py | 4 +- test/blocking/test_api_nodes.py | 4 +- .../test_api_normalized_exploit_v3_entry.py | 4 +- .../test_api_normalized_report_v3_entry.py | 4 +- test/blocking/test_api_nvd20_cpe_match.py | 4 +- test/blocking/test_api_nvd20_cpe_name.py | 4 +- test/blocking/test_api_nvd20_cve.py | 4 +- test/blocking/test_api_nvd20_cve_extended.py | 4 +- test/blocking/test_api_nvd20_cvss_data_v2.py | 4 +- test/blocking/test_api_nvd20_cvss_data_v3.py | 4 +- .../blocking/test_api_nvd20_cvss_metric_v2.py | 4 +- .../blocking/test_api_nvd20_cvss_metric_v3.py | 4 +- .../test_api_nvd20_cvss_metric_v40.py | 4 +- test/blocking/test_api_nvd20_description.py | 4 +- test/blocking/test_api_nvd20_metric.py | 4 +- .../test_api_nvd20_metric_extended.py | 4 +- test/blocking/test_api_nvd20_reference.py | 4 +- .../test_api_nvd20_reference_extended.py | 4 +- ...i_nvd20_temporal_associated_base_metric.py | 4 +- .../test_api_nvd20_temporal_cvssv2.py | 4 +- .../test_api_nvd20_temporal_cvssv3.py | 4 +- ...api_nvd20_threat_associated_base_metric.py | 4 +- .../blocking/test_api_nvd20_threat_cvssv40.py | 4 +- .../blocking/test_api_nvd20_vendor_comment.py | 4 +- test/blocking/test_api_nvd20_weakness.py | 4 +- .../test_api_nvd20_weakness_desc_extended.py | 4 +- .../test_api_nvd20_weakness_extended.py | 4 +- test/blocking/test_api_oss_package.py | 4 +- .../test_api_oss_package_artifacts.py | 4 +- .../test_api_oss_package_download_info.py | 4 +- .../test_api_oss_package_hash_info.py | 4 +- ...est_api_oss_package_research_attributes.py | 4 +- .../test_api_oss_package_vulnerability.py | 4 +- test/blocking/test_api_package.py | 4 +- test/blocking/test_api_problem_type.py | 4 +- test/blocking/test_api_problem_type_data.py | 4 +- .../test_api_problem_type_data_extended.py | 4 +- .../test_api_problem_type_description.py | 4 +- ...t_api_problem_type_description_extended.py | 4 +- .../test_api_problem_type_extended.py | 4 +- test/blocking/test_api_reference.py | 4 +- test/blocking/test_api_reference_data.py | 4 +- .../test_api_reference_data_extended.py | 4 +- test/blocking/test_api_references.py | 4 +- test/blocking/test_api_references_extended.py | 4 +- .../test_api_related_attack_pattern.py | 4 +- test/blocking/test_api_ssvc.py | 4 +- test/blocking/test_api_temporal_cvssv2.py | 4 +- test/blocking/test_api_temporal_cvssv3.py | 4 +- test/blocking/test_api_temporal_metric_v2.py | 4 +- test/blocking/test_api_temporal_metric_v3.py | 4 +- test/blocking/test_api_update.py | 10 +- test/blocking/test_api_vuln_check_canary.py | 4 +- test/blocking/test_api_vulnerability_alias.py | 4 +- test/blocking/test_endpoints_api.py | 4 +- test/blocking/test_indices_api.py | 4 +- test/blocking/test_models_entitlements.py | 4 +- test/blocking/test_paginate_match.py | 4 +- test/blocking/test_paginate_pagination.py | 4 +- test/blocking/test_paginate_param.py | 4 +- test/blocking/test_params_index_backup.py | 4 +- .../blocking/test_params_index_backup_list.py | 4 +- test/blocking/test_params_index_list.py | 4 +- test/blocking/test_purl_batch_vuln_finding.py | 4 +- test/blocking/test_purl_package_urljson.py | 4 +- test/blocking/test_purl_qualifier_json.py | 4 +- test/blocking/test_purls_purl_response.py | 4 +- test/blocking/test_purls_vulnerability.py | 4 +- ...response_array_params_index_backup_list.py | 4 +- ...render_response_array_params_index_list.py | 4 +- ..._array_advisory_a10_paginate_pagination.py | 4 +- ...visory_abb_advisory_paginate_pagination.py | 4 +- ...ray_advisory_abbott_paginate_pagination.py | 4 +- ...y_advisory_absolute_paginate_pagination.py | 4 +- ...ay_advisory_acronis_paginate_pagination.py | 4 +- ...sory_adobe_advisory_paginate_pagination.py | 4 +- ..._advisory_advantech_paginate_pagination.py | 4 +- ...y_advisory_advisory_paginate_pagination.py | 4 +- ...ory_advisory_record_paginate_pagination.py | 4 +- ..._array_advisory_aix_paginate_pagination.py | 4 +- ...sory_aleph_research_paginate_pagination.py | 4 +- ...ay_advisory_alibaba_paginate_pagination.py | 4 +- ...y_alma_linux_update_paginate_pagination.py | 4 +- ...alpine_linux_sec_db_paginate_pagination.py | 4 +- ...advisory_amazon_cve_paginate_pagination.py | 4 +- ..._array_advisory_amd_paginate_pagination.py | 4 +- ..._array_advisory_ami_paginate_pagination.py | 4 +- ...nchore_nvd_override_paginate_pagination.py | 4 +- ...ry_android_advisory_paginate_pagination.py | 4 +- ...ry_apache_active_mq_paginate_pagination.py | 4 +- ...sory_apache_archiva_paginate_pagination.py | 4 +- ...visory_apache_arrow_paginate_pagination.py | 4 +- ...visory_apache_camel_paginate_pagination.py | 4 +- ...sory_apache_commons_paginate_pagination.py | 4 +- ...ory_apache_couch_db_paginate_pagination.py | 4 +- ...visory_apache_flink_paginate_pagination.py | 4 +- ...ry_apache_guacamole_paginate_pagination.py | 4 +- ...isory_apache_hadoop_paginate_pagination.py | 4 +- ...dvisory_apache_http_paginate_pagination.py | 4 +- ...ory_apache_jsp_wiki_paginate_pagination.py | 4 +- ...visory_apache_kafka_paginate_pagination.py | 4 +- ...he_logging_services_paginate_pagination.py | 4 +- ...visory_apache_ni_fi_paginate_pagination.py | 4 +- ...isory_apache_of_biz_paginate_pagination.py | 4 +- ...pache_open_meetings_paginate_pagination.py | 4 +- ..._apache_open_office_paginate_pagination.py | 4 +- ...isory_apache_pulsar_paginate_pagination.py | 4 +- ...visory_apache_shiro_paginate_pagination.py | 4 +- ...visory_apache_spark_paginate_pagination.py | 4 +- ...isory_apache_struts_paginate_pagination.py | 4 +- ...y_apache_subversion_paginate_pagination.py | 4 +- ...ory_apache_superset_paginate_pagination.py | 4 +- ...isory_apache_tomcat_paginate_pagination.py | 4 +- ...y_apache_zoo_keeper_paginate_pagination.py | 4 +- ..._advisory_app_check_paginate_pagination.py | 4 +- ...ay_advisory_appgate_paginate_pagination.py | 4 +- ...sory_apple_advisory_paginate_pagination.py | 4 +- ...advisory_arch_issue_paginate_pagination.py | 4 +- ...ray_advisory_arista_paginate_pagination.py | 4 +- ...rray_advisory_aruba_paginate_pagination.py | 4 +- ...array_advisory_asrg_paginate_pagination.py | 4 +- ...advisory_asset_note_paginate_pagination.py | 4 +- ...y_advisory_asterisk_paginate_pagination.py | 4 +- ...rray_advisory_astra_paginate_pagination.py | 4 +- ...array_advisory_asus_paginate_pagination.py | 4 +- ..._atlassian_advisory_paginate_pagination.py | 4 +- ...sory_atlassian_vuln_paginate_pagination.py | 4 +- ...ay_advisory_atredis_paginate_pagination.py | 4 +- ...advisory_audiocodes_paginate_pagination.py | 4 +- ...y_advisory_aus_cert_paginate_pagination.py | 4 +- ...y_advisory_autodesk_paginate_pagination.py | 4 +- ...rray_advisory_avaya_paginate_pagination.py | 4 +- ...sory_aveva_advisory_paginate_pagination.py | 4 +- ...dvisory_avidml_advs_paginate_pagination.py | 4 +- ...y_advisory_avigilon_paginate_pagination.py | 4 +- ..._array_advisory_aws_paginate_pagination.py | 4 +- ...array_advisory_axis_paginate_pagination.py | 4 +- ...array_advisory_azul_paginate_pagination.py | 4 +- ...ry_b_braun_advisory_paginate_pagination.py | 4 +- ...rray_advisory_bandr_paginate_pagination.py | 4 +- ...ory_baxter_advisory_paginate_pagination.py | 4 +- ...visory_bdu_advisory_paginate_pagination.py | 4 +- ...y_beckhoff_advisory_paginate_pagination.py | 4 +- ...ory_beckman_coulter_paginate_pagination.py | 4 +- ..._dickinson_advisory_paginate_pagination.py | 4 +- ...ory_belden_advisory_paginate_pagination.py | 4 +- ...visory_beyond_trust_paginate_pagination.py | 4 +- ...ay_advisory_binarly_paginate_pagination.py | 4 +- ...visory_bit_defender_paginate_pagination.py | 4 +- ...dvisory_black_berry_paginate_pagination.py | 4 +- ..._array_advisory_bls_paginate_pagination.py | 4 +- ...sory_bosch_advisory_paginate_pagination.py | 4 +- ...scientific_advisory_paginate_pagination.py | 4 +- ...ray_advisory_botnet_paginate_pagination.py | 4 +- ...ber_centre_advisory_paginate_pagination.py | 4 +- ...sory_canvas_exploit_paginate_pagination.py | 4 +- ...carestream_advisory_paginate_pagination.py | 4 +- ...ay_advisory_carrier_paginate_pagination.py | 4 +- ...dvisory_cbl_mariner_paginate_pagination.py | 4 +- ...ay_advisory_cert_be_paginate_pagination.py | 4 +- ...ry_cert_fr_advisory_paginate_pagination.py | 4 +- ...ay_advisory_cert_in_paginate_pagination.py | 4 +- ...t_ir_security_alert_paginate_pagination.py | 4 +- ...ay_advisory_cert_se_paginate_pagination.py | 4 +- ...ay_advisory_cert_ua_paginate_pagination.py | 4 +- ...ory_certeu_advisory_paginate_pagination.py | 4 +- ...array_advisory_cesa_paginate_pagination.py | 4 +- ...dvisory_chain_guard_paginate_pagination.py | 4 +- ...dvisory_check_point_paginate_pagination.py | 4 +- ...ray_advisory_chrome_paginate_pagination.py | 4 +- ...rray_advisory_ciena_paginate_pagination.py | 4 +- ...advisory_cisa_alert_paginate_pagination.py | 4 +- ...isory_cisa_csaf_adv_paginate_pagination.py | 82 +- ...sory_cisco_advisory_paginate_pagination.py | 4 +- ...advisory_cisco_csaf_paginate_pagination.py | 6 +- ...co_known_good_value_paginate_pagination.py | 4 +- ...ory_citrix_advisory_paginate_pagination.py | 4 +- ...aroty_vulnerability_paginate_pagination.py | 4 +- ...advisory_cloud_bees_paginate_pagination.py | 4 +- ...ud_vuln_db_advisory_paginate_pagination.py | 4 +- ...ry_cnnvd_entry_json_paginate_pagination.py | 4 +- ...isory_cnvd_bulletin_paginate_pagination.py | 4 +- ..._advisory_cnvd_flaw_paginate_pagination.py | 4 +- ...ry_codesys_advisory_paginate_pagination.py | 4 +- ...advisory_comm_vault_paginate_pagination.py | 4 +- ...ry_compass_security_paginate_pagination.py | 4 +- ...visory_container_os_paginate_pagination.py | 4 +- ...core_impact_exploit_paginate_pagination.py | 4 +- ...y_advisory_crestron_paginate_pagination.py | 4 +- ..._advisory_crowd_sec_paginate_pagination.py | 4 +- ...array_advisory_curl_paginate_pagination.py | 4 +- ...array_advisory_cvrf_paginate_pagination.py | 64 +- ...ray_advisory_d_link_paginate_pagination.py | 4 +- ...rray_advisory_dahua_paginate_pagination.py | 4 +- ...ay_advisory_danfoss_paginate_pagination.py | 4 +- ...y_advisory_dassault_paginate_pagination.py | 4 +- ...n_security_advisory_paginate_pagination.py | 4 +- ...array_advisory_dell_paginate_pagination.py | 4 +- ...sory_delta_advisory_paginate_pagination.py | 4 +- ...y_advisory_dfn_cert_paginate_pagination.py | 4 +- ...sory_distro_package_paginate_pagination.py | 4 +- ...ray_advisory_django_paginate_pagination.py | 4 +- ..._array_advisory_dnn_paginate_pagination.py | 4 +- ...ay_advisory_dot_cms_paginate_pagination.py | 4 +- ...ory_dragos_advisory_paginate_pagination.py | 4 +- ...ay_advisory_draytek_paginate_pagination.py | 4 +- ...ray_advisory_drupal_paginate_pagination.py | 4 +- ...sory_eaton_advisory_paginate_pagination.py | 4 +- ...ay_advisory_elastic_paginate_pagination.py | 4 +- ...ray_advisory_elspec_paginate_pagination.py | 4 +- ...rging_threats_snort_paginate_pagination.py | 4 +- ...ry_emerson_advisory_paginate_pagination.py | 4 +- ...dvisory_end_of_life_paginate_pagination.py | 14 +- ...ay_advisory_endress_paginate_pagination.py | 4 +- ...dvisory_eol_alibaba_paginate_pagination.py | 4 +- ...isory_eol_microsoft_paginate_pagination.py | 4 +- ...ry_eol_release_data_paginate_pagination.py | 4 +- ...array_advisory_euvd_paginate_pagination.py | 4 +- ...visory_exodus_intel_paginate_pagination.py | 4 +- ...xploit_db_exploitv2_paginate_pagination.py | 4 +- ...a_array_advisory_f5_paginate_pagination.py | 4 +- ...y_advisory_f_secure_paginate_pagination.py | 4 +- ...rray_advisory_fanuc_paginate_pagination.py | 4 +- ...ray_advisory_fastly_paginate_pagination.py | 4 +- ...rray_advisory_festo_paginate_pagination.py | 4 +- ...advisory_file_cloud_paginate_pagination.py | 4 +- ...advisory_file_zilla_paginate_pagination.py | 4 +- ...sory_flatt_security_paginate_pagination.py | 4 +- ...advisory_forge_rock_paginate_pagination.py | 4 +- ...y_fortinet_advisory_paginate_pagination.py | 4 +- ...visory_fortinet_ips_paginate_pagination.py | 4 +- ...rray_advisory_foxit_paginate_pagination.py | 4 +- ..._advisory_fresenius_paginate_pagination.py | 4 +- ..._advisory_gallagher_paginate_pagination.py | 4 +- ..._array_advisory_gcp_paginate_pagination.py | 4 +- ...ray_advisory_ge_gas_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ..._array_advisory_gen_paginate_pagination.py | 4 +- ...ay_advisory_genetec_paginate_pagination.py | 4 +- ..._advisory_json_lean_paginate_pagination.py | 13 +- ...array_advisory_ghsa_paginate_pagination.py | 4 +- ...y_advisory_gigabyte_paginate_pagination.py | 4 +- ...ory_git_hub_exploit_paginate_pagination.py | 4 +- ...ory_git_lab_exploit_paginate_pagination.py | 4 +- ...isory_gitee_exploit_paginate_pagination.py | 4 +- ...ory_gitlab_advisory_paginate_pagination.py | 4 +- ...rray_advisory_glibc_paginate_pagination.py | 4 +- ..._gmo_cyber_security_paginate_pagination.py | 4 +- ...ay_advisory_gnu_tls_paginate_pagination.py | 4 +- ...visory_go_vuln_json_paginate_pagination.py | 4 +- ...ay_advisory_grafana_paginate_pagination.py | 4 +- ...rey_noise_detection_paginate_pagination.py | 4 +- ...advisory_hacktivity_paginate_pagination.py | 4 +- ...advisory_harmony_os_paginate_pagination.py | 4 +- ...advisory_hashi_corp_paginate_pagination.py | 4 +- ...skell_sadb_advisory_paginate_pagination.py | 4 +- ..._array_advisory_hcl_paginate_pagination.py | 4 +- ...advisory_hik_vision_paginate_pagination.py | 4 +- ...ry_hillrom_advisory_paginate_pagination.py | 4 +- ...sory_hitachi_energy_paginate_pagination.py | 4 +- ...ay_advisory_hitachi_paginate_pagination.py | 4 +- ...ay_advisory_hk_cert_paginate_pagination.py | 4 +- ..._array_advisory_hms_paginate_pagination.py | 4 +- ..._advisory_honeywell_paginate_pagination.py | 4 +- ...a_array_advisory_hp_paginate_pagination.py | 4 +- ..._array_advisory_hpe_paginate_pagination.py | 4 +- ...ory_huawei_euler_os_paginate_pagination.py | 4 +- ...advisory_huawei_ips_paginate_pagination.py | 4 +- ...ray_advisory_huawei_paginate_pagination.py | 4 +- ...array_advisory_iava_paginate_pagination.py | 4 +- ..._array_advisory_ibm_paginate_pagination.py | 4 +- ...ray_advisory_idemia_paginate_pagination.py | 4 +- ...array_advisory_igel_paginate_pagination.py | 4 +- ...ory_incibe_advisory_paginate_pagination.py | 4 +- ...rray_advisory_intel_paginate_pagination.py | 4 +- ...ory_ip_intel_record_paginate_pagination.py | 4 +- ...isory_israeli_alert_paginate_pagination.py | 4 +- ...raeli_vulnerability_paginate_pagination.py | 4 +- ...rray_advisory_istio_paginate_pagination.py | 4 +- ...dvisory_itw_exploit_paginate_pagination.py | 4 +- ...ray_advisory_ivanti_paginate_pagination.py | 4 +- ...advisory_ivanti_rss_paginate_pagination.py | 4 +- ...ray_advisory_j_frog_paginate_pagination.py | 4 +- ...ay_advisory_jenkins_paginate_pagination.py | 4 +- ...advisory_jet_brains_paginate_pagination.py | 4 +- ...visory_jnj_advisory_paginate_pagination.py | 4 +- ...ry_johnson_controls_paginate_pagination.py | 4 +- ...ay_advisory_juniper_paginate_pagination.py | 4 +- ...y_jvn_advisory_item_paginate_pagination.py | 4 +- ..._array_advisory_jvn_paginate_pagination.py | 4 +- ...array_advisory_k8_s_paginate_pagination.py | 4 +- ...ky_icscert_advisory_paginate_pagination.py | 4 +- ...talog_vulnerability_paginate_pagination.py | 4 +- ...advisory_kore_logic_paginate_pagination.py | 4 +- ...ry_kr_cert_advisory_paginate_pagination.py | 4 +- ...ray_advisory_kunbus_paginate_pagination.py | 4 +- ..._advisory_lantronix_paginate_pagination.py | 4 +- ...ray_advisory_lenovo_paginate_pagination.py | 4 +- ...ry_lexmark_advisory_paginate_pagination.py | 4 +- ...a_array_advisory_lg_paginate_pagination.py | 4 +- ...visory_libre_office_paginate_pagination.py | 4 +- ...rray_advisory_linux_paginate_pagination.py | 4 +- ...y_advisory_lol_advs_paginate_pagination.py | 6 +- ...ay_advisory_m_files_paginate_pagination.py | 4 +- ...ay_advisory_ma_cert_paginate_pagination.py | 4 +- ...y_malicious_package_paginate_pagination.py | 8 +- ...age_engine_advisory_paginate_pagination.py | 4 +- ...y_advisory_mbed_tls_paginate_pagination.py | 4 +- ...ay_advisory_mc_afee_paginate_pagination.py | 4 +- ...y_advisory_mediatek_paginate_pagination.py | 4 +- ..._medtronic_advisory_paginate_pagination.py | 4 +- ...ray_advisory_mendix_paginate_pagination.py | 4 +- ...ory_meta_advisories_paginate_pagination.py | 4 +- ..._advisory_meta_data_paginate_pagination.py | 10 +- ..._metasploit_exploit_paginate_pagination.py | 4 +- ...sory_microsoft_csaf_paginate_pagination.py | 82 +- ...sory_microsoft_cvrf_paginate_pagination.py | 4 +- ...t_driver_block_list_paginate_pagination.py | 12 +- ...visory_microsoft_kb_paginate_pagination.py | 4 +- ...y_advisory_mikrotik_paginate_pagination.py | 4 +- ...ay_advisory_mindray_paginate_pagination.py | 4 +- ...advisory_misp_value_paginate_pagination.py | 4 +- ...rray_advisory_mitel_paginate_pagination.py | 4 +- ...y_mitre_cve_list_v5_paginate_pagination.py | 13 +- ...i_electric_advisory_paginate_pagination.py | 4 +- ...y_advisory_mongo_db_paginate_pagination.py | 4 +- ...isory_moxa_advisory_paginate_pagination.py | 4 +- ...ry_mozilla_advisory_paginate_pagination.py | 4 +- ...rray_advisory_naver_paginate_pagination.py | 4 +- ...array_advisory_ncsc_paginate_pagination.py | 82 +- ...ay_advisory_ncsccve_paginate_pagination.py | 82 +- ..._array_advisory_nec_paginate_pagination.py | 4 +- ...ray_advisory_nessus_paginate_pagination.py | 4 +- ...ay_advisory_net_app_paginate_pagination.py | 4 +- ...y_advisory_netatalk_paginate_pagination.py | 4 +- ...ay_advisory_netgate_paginate_pagination.py | 4 +- ...ay_advisory_netgear_paginate_pagination.py | 4 +- ...y_advisory_netskope_paginate_pagination.py | 4 +- ...ay_advisory_nexpose_paginate_pagination.py | 4 +- ...sory_nginx_advisory_paginate_pagination.py | 4 +- ..._array_advisory_nhs_paginate_pagination.py | 4 +- ...a_array_advisory_ni_paginate_pagination.py | 4 +- ...ay_advisory_node_js_paginate_pagination.py | 4 +- ...isory_node_security_paginate_pagination.py | 4 +- ...rray_advisory_nokia_paginate_pagination.py | 4 +- ..._note_pad_plus_plus_paginate_pagination.py | 4 +- ...ray_advisory_nozomi_paginate_pagination.py | 4 +- ..._array_advisory_ntp_paginate_pagination.py | 4 +- ...ray_advisory_nuclei_paginate_pagination.py | 4 +- ...visory_nvd20_source_paginate_pagination.py | 4 +- ...y_nvdcpe_dictionary_paginate_pagination.py | 4 +- ...dvisory_nz_advisory_paginate_pagination.py | 4 +- ...sory_octopus_deploy_paginate_pagination.py | 4 +- ...array_advisory_okta_paginate_pagination.py | 4 +- ...rray_advisory_omron_paginate_pagination.py | 4 +- ...rray_advisory_one_e_paginate_pagination.py | 4 +- ...y_advisory_open_bsd_paginate_pagination.py | 4 +- ..._advisory_open_cvdb_paginate_pagination.py | 4 +- ...y_advisory_open_jdk_paginate_pagination.py | 4 +- ...y_advisory_open_ssh_paginate_pagination.py | 4 +- ...ry_open_ssl_sec_adv_paginate_pagination.py | 4 +- ...advisory_open_stack_paginate_pagination.py | 4 +- ...y_advisory_opengear_paginate_pagination.py | 4 +- ...advisory_oracle_cpu_paginate_pagination.py | 4 +- ...sory_oracle_cpucsaf_paginate_pagination.py | 82 +- ..._array_advisory_osv_paginate_pagination.py | 8 +- ...array_advisory_otrs_paginate_pagination.py | 4 +- ..._advisory_own_cloud_paginate_pagination.py | 4 +- ...packetstorm_exploit_paginate_pagination.py | 4 +- ...y_advisory_palantir_paginate_pagination.py | 4 +- ..._palo_alto_advisory_paginate_pagination.py | 4 +- ..._advisory_panasonic_paginate_pagination.py | 4 +- ..._advisory_paper_cut_paginate_pagination.py | 4 +- ...array_advisory_pega_paginate_pagination.py | 4 +- ...ry_philips_advisory_paginate_pagination.py | 4 +- ...ix_contact_advisory_paginate_pagination.py | 4 +- ...dvisory_phpmy_admin_paginate_pagination.py | 4 +- ...ay_advisory_pk_cert_paginate_pagination.py | 4 +- ...visory_postgres_sql_paginate_pagination.py | 4 +- ..._advisory_power_dns_paginate_pagination.py | 4 +- ...y_advisory_progress_paginate_pagination.py | 4 +- ...advisory_proofpoint_paginate_pagination.py | 4 +- ..._array_advisory_ptc_paginate_pagination.py | 4 +- ...visory_pure_storage_paginate_pagination.py | 4 +- ...sory_py_pa_advisory_paginate_pagination.py | 4 +- ...isory_qnap_advisory_paginate_pagination.py | 4 +- ...array_advisory_qqid_paginate_pagination.py | 4 +- ..._array_advisory_qsb_paginate_pagination.py | 4 +- ...y_advisory_qualcomm_paginate_pagination.py | 4 +- ...ray_advisory_qualys_paginate_pagination.py | 4 +- ...advisory_qualys_qid_paginate_pagination.py | 4 +- ..._ransomware_exploit_paginate_pagination.py | 4 +- ...y_advisory_red_lion_paginate_pagination.py | 4 +- ...advisory_redhat_cve_paginate_pagination.py | 4 +- ...ay_advisory_renesas_paginate_pagination.py | 4 +- ...ray_advisory_revive_paginate_pagination.py | 4 +- ...y_advisory_rhel_cve_paginate_pagination.py | 82 +- ...rray_advisory_roche_paginate_pagination.py | 4 +- ...y_advisory_rockwell_paginate_pagination.py | 4 +- ...visory_rocky_errata_paginate_pagination.py | 4 +- ...rray_advisory_rsync_paginate_pagination.py | 4 +- ...ray_advisory_ruckus_paginate_pagination.py | 4 +- ...ry_rustsec_advisory_paginate_pagination.py | 4 +- ...dvisory_sa_advisory_paginate_pagination.py | 4 +- ...ray_advisory_safran_paginate_pagination.py | 4 +- ...isory_saint_exploit_paginate_pagination.py | 4 +- ...dvisory_sales_force_paginate_pagination.py | 4 +- ...rray_advisory_samba_paginate_pagination.py | 4 +- ...ay_advisory_sandisk_paginate_pagination.py | 4 +- ...visory_sans_dshield_paginate_pagination.py | 4 +- ..._array_advisory_sap_paginate_pagination.py | 4 +- ...r_electric_advisory_paginate_pagination.py | 4 +- ...advisory_schutzwerk_paginate_pagination.py | 4 +- ...dvisory_sec_consult_paginate_pagination.py | 4 +- ...y_security_bulletin_paginate_pagination.py | 4 +- ...visory_security_lab_paginate_pagination.py | 4 +- ...sory_seebug_exploit_paginate_pagination.py | 4 +- ..._array_advisory_sel_paginate_pagination.py | 4 +- ...visory_sentinel_one_paginate_pagination.py | 4 +- ...dvisory_service_now_paginate_pagination.py | 4 +- ..._advisory_seven_zip_paginate_pagination.py | 4 +- ...oited_vulnerability_paginate_pagination.py | 4 +- ...y_advisory_shielder_paginate_pagination.py | 4 +- ...array_advisory_sick_paginate_pagination.py | 4 +- ...ry_siemens_advisory_paginate_pagination.py | 4 +- ...ory_sierra_wireless_paginate_pagination.py | 4 +- ...advisory_sigma_rule_paginate_pagination.py | 8 +- ..._advisory_sing_cert_paginate_pagination.py | 4 +- ...y_advisory_sitecore_paginate_pagination.py | 4 +- ..._advisory_slackware_paginate_pagination.py | 4 +- ...olar_winds_advisory_paginate_pagination.py | 4 +- ...array_advisory_solr_paginate_pagination.py | 4 +- ...y_advisory_sonatype_paginate_pagination.py | 4 +- ...sonic_wall_advisory_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ...ray_advisory_splunk_paginate_pagination.py | 4 +- ...ray_advisory_spring_paginate_pagination.py | 4 +- ...visory_ssd_advisory_paginate_pagination.py | 4 +- ...dvisory_stormshield_paginate_pagination.py | 4 +- ...ry_stryker_advisory_paginate_pagination.py | 4 +- ...array_advisory_sudo_paginate_pagination.py | 4 +- ...isory_suse_security_paginate_pagination.py | 4 +- ...healthcare_advisory_paginate_pagination.py | 4 +- ...ay_advisory_symfony_paginate_pagination.py | 4 +- ..._advisory_synacktiv_paginate_pagination.py | 4 +- ...dvisory_syncro_soft_paginate_pagination.py | 4 +- ...y_advisory_synology_paginate_pagination.py | 4 +- ...array_advisory_syss_paginate_pagination.py | 4 +- ..._advisory_tailscale_paginate_pagination.py | 4 +- ...sory_talos_advisory_paginate_pagination.py | 4 +- ...dvisory_team_viewer_paginate_pagination.py | 4 +- ...e_research_advisory_paginate_pagination.py | 4 +- ...ay_advisory_tencent_paginate_pagination.py | 4 +- ...ray_advisory_thales_paginate_pagination.py | 4 +- ...ry_the_missing_link_paginate_pagination.py | 4 +- ...isory_thermo_fisher_paginate_pagination.py | 4 +- ...th_external_objects_paginate_pagination.py | 4 +- ...a_array_advisory_ti_paginate_pagination.py | 4 +- ...rray_advisory_tibco_paginate_pagination.py | 4 +- ...ay_advisory_tp_link_paginate_pagination.py | 4 +- ...ry_trane_technology_paginate_pagination.py | 4 +- ...dvisory_trend_micro_paginate_pagination.py | 4 +- ..._advisory_trustwave_paginate_pagination.py | 4 +- ...ry_tw_cert_advisory_paginate_pagination.py | 4 +- ...y_advisory_ubiquiti_paginate_pagination.py | 4 +- ...advisory_ubuntu_cve_paginate_pagination.py | 4 +- ...rray_advisory_unify_paginate_pagination.py | 4 +- ...ray_advisory_unisoc_paginate_pagination.py | 4 +- ...ray_advisory_update_paginate_pagination.py | 10 +- ..._array_advisory_usd_paginate_pagination.py | 4 +- ...isory_usom_advisory_paginate_pagination.py | 4 +- ...y_advisory_van_dyke_paginate_pagination.py | 4 +- ...vapid_labs_advisory_paginate_pagination.py | 4 +- ..._vc_vulnerable_cpes_paginate_pagination.py | 4 +- ...ry_vccpe_dictionary_paginate_pagination.py | 4 +- ...visory_vde_advisory_paginate_pagination.py | 82 +- ...rray_advisory_veeam_paginate_pagination.py | 4 +- ...ay_advisory_veritas_paginate_pagination.py | 4 +- ..._advisory_virtuozzo_paginate_pagination.py | 4 +- ..._array_advisory_vlc_paginate_pagination.py | 4 +- ...ry_vm_ware_advisory_paginate_pagination.py | 4 +- ...y_advisory_void_sec_paginate_pagination.py | 4 +- ...y_vuln_check_config_paginate_pagination.py | 4 +- ...n_check_cve_list_v5_paginate_pagination.py | 13 +- ...sory_vuln_check_kev_paginate_pagination.py | 4 +- ...advisory_vuln_check_paginate_pagination.py | 4 +- ...able_debian_package_paginate_pagination.py | 4 +- ...visory_vulnrichment_paginate_pagination.py | 4 +- ...ory_vyaire_advisory_paginate_pagination.py | 4 +- ...dvisory_watch_guard_paginate_pagination.py | 4 +- ..._advisory_whats_app_paginate_pagination.py | 4 +- ...array_advisory_wibu_paginate_pagination.py | 4 +- ..._advisory_wireshark_paginate_pagination.py | 4 +- ...dvisory_with_secure_paginate_pagination.py | 4 +- ...y_advisory_wolf_ssl_paginate_pagination.py | 4 +- ...rray_advisory_wolfi_paginate_pagination.py | 4 +- ..._advisory_wordfence_paginate_pagination.py | 4 +- ..._array_advisory_wrt_paginate_pagination.py | 4 +- ..._array_advisory_xen_paginate_pagination.py | 4 +- ...rray_advisory_xerox_paginate_pagination.py | 4 +- ...ray_advisory_xiaomi_paginate_pagination.py | 4 +- ...rray_advisory_xylem_paginate_pagination.py | 4 +- ...ray_advisory_yamaha_paginate_pagination.py | 4 +- ...y_yokogawa_advisory_paginate_pagination.py | 4 +- ...ray_advisory_yubico_paginate_pagination.py | 4 +- ...rray_advisory_zebra_paginate_pagination.py | 4 +- ...y_zero_day_advisory_paginate_pagination.py | 4 +- ...ro_science_advisory_paginate_pagination.py | 4 +- ...ray_advisory_zimbra_paginate_pagination.py | 4 +- ...array_advisory_zoom_paginate_pagination.py | 4 +- ...ay_advisory_zscaler_paginate_pagination.py | 4 +- ...array_advisory_zuso_paginate_pagination.py | 4 +- ...rray_advisory_zyxel_paginate_pagination.py | 4 +- ..._cve_items_extended_paginate_pagination.py | 4 +- ...array_api_cve_items_paginate_pagination.py | 42 +- ...adata_array_api_cwe_paginate_pagination.py | 4 +- ...array_api_epss_data_paginate_pagination.py | 4 +- ...y_api_exploit_chain_paginate_pagination.py | 4 +- ...i_exploit_v3_result_paginate_pagination.py | 9 +- ..._exploits_changelog_paginate_pagination.py | 8 +- ..._api_initial_access_paginate_pagination.py | 4 +- ...mitre_attack_to_cve_paginate_pagination.py | 4 +- ...api_nvd20_cpe_match_paginate_pagination.py | 4 +- ..._nvd20_cve_extended_paginate_pagination.py | 4 +- ...array_api_nvd20_cve_paginate_pagination.py | 4 +- ...ray_api_oss_package_paginate_pagination.py | 4 +- ...ta_array_api_update_paginate_pagination.py | 10 +- ...i_vuln_check_canary_paginate_pagination.py | 4 +- ...vulnerability_alias_paginate_pagination.py | 4 +- ...purls_purl_response_paginate_pagination.py | 4 +- ..._string_v3controllers_response_metadata.py | 4 +- ..._v3controllers_backup_response_metadata.py | 4 +- ...ta_v3controllers_purl_response_metadata.py | 16 +- ...a_v3controllers_purls_response_metadata.py | 16 +- .../test_search_error_response.py} | 32 +- test/blocking/test_search_v4_advisory_meta.py | 58 + .../test_search_v4_advisory_return_value.py | 233 + .../test_search_v4_feed_item.py} | 29 +- .../test_search_v4_list_feed_return_value.py | 57 + ..._v3controllers_backup_response_metadata.py | 4 +- .../test_v3controllers_purl_response_data.py | 4 +- ...st_v3controllers_purl_response_metadata.py | 4 +- ...t_v3controllers_purls_response_metadata.py | 4 +- .../test_v3controllers_response_metadata.py | 4 +- vulncheck_sdk/__init__.py | 48 +- vulncheck_sdk/aio/__init__.py | 48 +- vulncheck_sdk/aio/api/__init__.py | 1 + vulncheck_sdk/aio/api/advisory_api.py | 869 + vulncheck_sdk/aio/api/endpoints_api.py | 170 +- vulncheck_sdk/aio/api/indices_api.py | 28315 ++++++---------- vulncheck_sdk/aio/api_client.py | 6 +- vulncheck_sdk/aio/configuration.py | 16 +- vulncheck_sdk/aio/exceptions.py | 4 +- vulncheck_sdk/aio/models/__init__.py | 24 +- vulncheck_sdk/aio/models/advisory_a10.py | 6 +- .../aio/models/advisory_abb_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_abbott.py | 6 +- vulncheck_sdk/aio/models/advisory_absolute.py | 6 +- .../aio/models/advisory_acknowledgement.py | 6 +- vulncheck_sdk/aio/models/advisory_acronis.py | 6 +- .../aio/models/advisory_adobe_advisory.py | 6 +- .../aio/models/advisory_adobe_affected.py | 6 +- .../aio/models/advisory_adobe_cve.py | 6 +- .../aio/models/advisory_adobe_solution.py | 6 +- vulncheck_sdk/aio/models/advisory_adp.py | 6 +- .../aio/models/advisory_adp_container.py | 8 +- .../aio/models/advisory_advantech.py | 6 +- vulncheck_sdk/aio/models/advisory_advisory.py | 6 +- .../aio/models/advisory_advisory_details.py | 24 +- .../aio/models/advisory_advisory_record.py | 6 +- vulncheck_sdk/aio/models/advisory_affected.py | 22 +- .../aio/models/advisory_affected_chrome.py | 6 +- .../advisory_affected_debian_package.py | 6 +- .../advisory_affected_debian_release.py | 6 +- .../advisory_affected_debian_repository.py | 6 +- .../aio/models/advisory_affected_file.py | 6 +- .../aio/models/advisory_affected_product.py | 6 +- .../aio/models/advisory_affected_rel.py | 6 +- .../advisory_affected_ubuntu_package.py | 6 +- vulncheck_sdk/aio/models/advisory_aix.py | 6 +- .../aio/models/advisory_aleph_research.py | 6 +- vulncheck_sdk/aio/models/advisory_alibaba.py | 6 +- .../aio/models/advisory_alma_date.py | 8 +- .../aio/models/advisory_alma_linux_update.py | 6 +- .../aio/models/advisory_alma_object_id.py | 6 +- .../aio/models/advisory_alma_package.py | 6 +- .../aio/models/advisory_alma_package_list.py | 6 +- .../aio/models/advisory_alma_reference.py | 6 +- .../models/advisory_alpine_linux_sec_db.py | 6 +- .../advisory_alpine_linux_sec_db_package.py | 6 +- .../advisory_alpine_linux_security_fix.py | 6 +- .../advisory_amazon_affected_package.py | 6 +- .../aio/models/advisory_amazon_cve.py | 6 +- vulncheck_sdk/aio/models/advisory_amd.py | 6 +- vulncheck_sdk/aio/models/advisory_ami.py | 6 +- .../models/advisory_anchore_nvd_override.py | 6 +- .../aio/models/advisory_android_advisory.py | 6 +- .../aio/models/advisory_android_affected.py | 6 +- .../aio/models/advisory_android_event.py | 6 +- .../aio/models/advisory_android_package.py | 6 +- .../aio/models/advisory_android_range.py | 6 +- .../aio/models/advisory_android_reference.py | 6 +- .../aio/models/advisory_apache_active_mq.py | 6 +- .../aio/models/advisory_apache_archiva.py | 6 +- .../aio/models/advisory_apache_arrow.py | 6 +- .../aio/models/advisory_apache_camel.py | 6 +- .../aio/models/advisory_apache_commons.py | 6 +- .../aio/models/advisory_apache_couch_db.py | 6 +- .../aio/models/advisory_apache_flink.py | 6 +- .../aio/models/advisory_apache_guacamole.py | 6 +- .../aio/models/advisory_apache_hadoop.py | 6 +- .../aio/models/advisory_apache_http.py | 6 +- .../aio/models/advisory_apache_jsp_wiki.py | 6 +- .../aio/models/advisory_apache_kafka.py | 6 +- .../advisory_apache_logging_services.py | 6 +- .../aio/models/advisory_apache_ni_fi.py | 6 +- .../aio/models/advisory_apache_of_biz.py | 6 +- .../models/advisory_apache_open_meetings.py | 6 +- .../aio/models/advisory_apache_open_office.py | 6 +- .../aio/models/advisory_apache_pulsar.py | 6 +- .../aio/models/advisory_apache_shiro.py | 6 +- .../aio/models/advisory_apache_spark.py | 6 +- .../aio/models/advisory_apache_struts.py | 6 +- .../aio/models/advisory_apache_subversion.py | 6 +- .../aio/models/advisory_apache_superset.py | 6 +- .../aio/models/advisory_apache_tomcat.py | 6 +- .../aio/models/advisory_apache_zoo_keeper.py | 6 +- .../aio/models/advisory_app_check.py | 6 +- vulncheck_sdk/aio/models/advisory_appgate.py | 6 +- .../aio/models/advisory_apple_advisory.py | 6 +- .../aio/models/advisory_apple_component.py | 6 +- .../aio/models/advisory_arch_issue.py | 6 +- vulncheck_sdk/aio/models/advisory_arista.py | 6 +- vulncheck_sdk/aio/models/advisory_aruba.py | 6 +- vulncheck_sdk/aio/models/advisory_asrg.py | 6 +- .../aio/models/advisory_asset_note.py | 6 +- vulncheck_sdk/aio/models/advisory_asterisk.py | 6 +- vulncheck_sdk/aio/models/advisory_astra.py | 6 +- vulncheck_sdk/aio/models/advisory_asus.py | 6 +- .../aio/models/advisory_atlassian_advisory.py | 6 +- .../aio/models/advisory_atlassian_products.py | 6 +- .../aio/models/advisory_atlassian_vuln.py | 6 +- vulncheck_sdk/aio/models/advisory_atredis.py | 6 +- .../aio/models/advisory_audiocodes.py | 6 +- vulncheck_sdk/aio/models/advisory_aus_cert.py | 6 +- vulncheck_sdk/aio/models/advisory_autodesk.py | 6 +- vulncheck_sdk/aio/models/advisory_avaya.py | 6 +- .../aio/models/advisory_aveva_advisory.py | 6 +- .../aio/models/advisory_avidml_advs.py | 6 +- vulncheck_sdk/aio/models/advisory_avigilon.py | 6 +- vulncheck_sdk/aio/models/advisory_award.py | 6 +- vulncheck_sdk/aio/models/advisory_aws.py | 6 +- vulncheck_sdk/aio/models/advisory_axis.py | 6 +- vulncheck_sdk/aio/models/advisory_azul.py | 6 +- .../aio/models/advisory_b_braun_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_bandr.py | 6 +- .../aio/models/advisory_baxter_advisory.py | 6 +- .../aio/models/advisory_bdu_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_bdu_cvss.py | 6 +- .../aio/models/advisory_bdu_cvss3.py | 6 +- .../aio/models/advisory_bdu_environment.py | 6 +- vulncheck_sdk/aio/models/advisory_bdu_soft.py | 6 +- .../aio/models/advisory_bdu_types.py | 6 +- .../aio/models/advisory_bdu_vector.py | 6 +- .../advisory_bdu_vulnerable_software.py | 6 +- vulncheck_sdk/aio/models/advisory_bduos.py | 6 +- .../aio/models/advisory_beckhoff_advisory.py | 6 +- .../aio/models/advisory_beckman_coulter.py | 6 +- .../advisory_becton_dickinson_advisory.py | 6 +- .../aio/models/advisory_belden_advisory.py | 6 +- .../aio/models/advisory_beyond_trust.py | 6 +- vulncheck_sdk/aio/models/advisory_binarly.py | 6 +- .../aio/models/advisory_bit_defender.py | 6 +- .../aio/models/advisory_black_berry.py | 6 +- vulncheck_sdk/aio/models/advisory_bls.py | 6 +- .../aio/models/advisory_bosch_advisory.py | 6 +- .../advisory_boston_scientific_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_botnet.py | 6 +- vulncheck_sdk/aio/models/advisory_bugzilla.py | 6 +- .../advisory_ca_cyber_centre_advisory.py | 6 +- .../aio/models/advisory_canvas_exploit.py | 6 +- vulncheck_sdk/aio/models/advisory_capec.py | 6 +- .../models/advisory_carestream_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_carrier.py | 6 +- .../aio/models/advisory_cbl_mariner.py | 6 +- .../aio/models/advisory_centos_package.py | 6 +- vulncheck_sdk/aio/models/advisory_cert_be.py | 6 +- .../aio/models/advisory_cert_fr_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_cert_in.py | 6 +- .../models/advisory_cert_ir_security_alert.py | 6 +- vulncheck_sdk/aio/models/advisory_cert_se.py | 6 +- vulncheck_sdk/aio/models/advisory_cert_ua.py | 6 +- .../aio/models/advisory_certeu_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_cesa.py | 6 +- .../aio/models/advisory_chain_guard.py | 6 +- .../models/advisory_chain_guard_package.py | 6 +- .../models/advisory_chain_guard_sec_fix.py | 6 +- .../aio/models/advisory_check_point.py | 6 +- vulncheck_sdk/aio/models/advisory_chrome.py | 6 +- vulncheck_sdk/aio/models/advisory_ciena.py | 6 +- .../aio/models/advisory_cis_control.py | 6 +- .../aio/models/advisory_cisa_alert.py | 6 +- .../aio/models/advisory_cisa_csaf_adv.py | 6 +- .../aio/models/advisory_cisco_advisory.py | 6 +- .../aio/models/advisory_cisco_csaf.py | 13 +- .../models/advisory_cisco_known_good_value.py | 6 +- .../aio/models/advisory_citrix_advisory.py | 6 +- .../models/advisory_claroty_vulnerability.py | 6 +- .../aio/models/advisory_cloud_bees.py | 6 +- .../models/advisory_cloud_vuln_db_advisory.py | 6 +- .../aio/models/advisory_cnnvd_entry_json.py | 6 +- .../aio/models/advisory_cnvd_bulletin.py | 8 +- .../aio/models/advisory_cnvd_flaw.py | 6 +- .../aio/models/advisory_codesys_advisory.py | 6 +- .../aio/models/advisory_comm_vault.py | 6 +- .../models/advisory_comm_vault_cve_details.py | 6 +- .../advisory_comm_vault_impacted_product.py | 6 +- ...ory_comm_vault_impacted_product_details.py | 6 +- .../models/advisory_comm_vault_resolution.py | 6 +- .../advisory_comm_vault_resolution_details.py | 6 +- .../aio/models/advisory_compass_security.py | 6 +- .../aio/models/advisory_container_os.py | 6 +- .../models/advisory_core_impact_exploit.py | 6 +- .../aio/models/advisory_correction.py | 6 +- .../aio/models/advisory_cos_update.py | 6 +- .../aio/models/advisory_cpe_match.py | 6 +- vulncheck_sdk/aio/models/advisory_cpe_node.py | 6 +- vulncheck_sdk/aio/models/advisory_credit.py | 6 +- vulncheck_sdk/aio/models/advisory_crestron.py | 6 +- .../aio/models/advisory_crowd_sec.py | 6 +- vulncheck_sdk/aio/models/advisory_csaf.py | 10 +- .../aio/models/advisory_csaf_note.py | 6 +- .../aio/models/advisory_csaf_reference.py | 6 +- .../aio/models/advisory_csaf_relationship.py | 6 +- .../aio/models/advisory_csaf_score.py | 6 +- .../aio/models/advisory_csaf_vulnerability.py | 6 +- vulncheck_sdk/aio/models/advisory_curl.py | 6 +- .../aio/models/advisory_curl_affected.py | 6 +- .../aio/models/advisory_curl_credit.py | 6 +- vulncheck_sdk/aio/models/advisory_curl_cwe.py | 6 +- .../aio/models/advisory_curl_range.py | 6 +- .../aio/models/advisory_cve_detail.py | 6 +- .../aio/models/advisory_cve_details_link.py | 6 +- .../aio/models/advisory_cve_reference.py | 6 +- vulncheck_sdk/aio/models/advisory_cvrf.py | 56 +- .../aio/models/advisory_cvrf_reference.py | 90 - vulncheck_sdk/aio/models/advisory_cvss.py | 6 +- .../aio/models/advisory_cvsss_v23.py | 6 +- vulncheck_sdk/aio/models/advisory_cvssv2.py | 6 +- vulncheck_sdk/aio/models/advisory_cvssv3.py | 6 +- vulncheck_sdk/aio/models/advisory_cvssv40.py | 6 +- .../aio/models/advisory_cvssv40_threat.py | 6 +- vulncheck_sdk/aio/models/advisory_cwe.py | 6 +- .../models/advisory_cwe_acceptance_level.py | 6 +- vulncheck_sdk/aio/models/advisory_cwe_data.py | 6 +- vulncheck_sdk/aio/models/advisory_cwes.py | 24 +- vulncheck_sdk/aio/models/advisory_cycle.py | 41 +- vulncheck_sdk/aio/models/advisory_d_link.py | 6 +- vulncheck_sdk/aio/models/advisory_dahua.py | 6 +- .../models/advisory_dan_foss_cve_details.py | 6 +- vulncheck_sdk/aio/models/advisory_danfoss.py | 6 +- vulncheck_sdk/aio/models/advisory_dassault.py | 6 +- .../aio/models/advisory_db_specific.py | 6 +- .../aio/models/advisory_debian_cve.py | 6 +- .../advisory_debian_security_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_dell.py | 6 +- vulncheck_sdk/aio/models/advisory_dell_cve.py | 6 +- .../aio/models/advisory_delta_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_dfn_cert.py | 6 +- .../aio/models/advisory_distro_package.py | 6 +- .../aio/models/advisory_distro_version.py | 6 +- vulncheck_sdk/aio/models/advisory_django.py | 6 +- vulncheck_sdk/aio/models/advisory_dnn.py | 6 +- .../aio/models/advisory_document_metadata.py | 8 +- .../aio/models/advisory_document_publisher.py | 6 +- .../aio/models/advisory_document_tracking.py | 106 - vulncheck_sdk/aio/models/advisory_dot_cms.py | 6 +- .../aio/models/advisory_dragos_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_draytek.py | 6 +- vulncheck_sdk/aio/models/advisory_drupal.py | 6 +- .../aio/models/advisory_eaton_advisory.py | 6 +- .../aio/models/advisory_eco_system.py | 6 +- vulncheck_sdk/aio/models/advisory_elastic.py | 6 +- vulncheck_sdk/aio/models/advisory_elspec.py | 6 +- .../models/advisory_emerging_threats_snort.py | 6 +- .../aio/models/advisory_emerson_advisory.py | 6 +- .../aio/models/advisory_end_of_life.py | 6 +- vulncheck_sdk/aio/models/advisory_endress.py | 6 +- .../aio/models/advisory_enisa_id_product.py | 6 +- .../aio/models/advisory_enisa_id_vendor.py | 6 +- .../aio/models/advisory_eol_alibaba.py | 6 +- .../aio/models/advisory_eol_microsoft.py | 6 +- .../aio/models/advisory_eol_release_data.py | 6 +- vulncheck_sdk/aio/models/advisory_euvd.py | 6 +- vulncheck_sdk/aio/models/advisory_event.py | 6 +- .../aio/models/advisory_exodus_intel.py | 6 +- .../models/advisory_exploit_db_exploitv2.py | 6 +- .../models/advisory_external_references.py | 6 +- vulncheck_sdk/aio/models/advisory_f5.py | 6 +- vulncheck_sdk/aio/models/advisory_f_secure.py | 6 +- vulncheck_sdk/aio/models/advisory_fanuc.py | 6 +- vulncheck_sdk/aio/models/advisory_fastly.py | 6 +- vulncheck_sdk/aio/models/advisory_festo.py | 6 +- .../aio/models/advisory_file_cloud.py | 6 +- .../aio/models/advisory_file_zilla.py | 6 +- vulncheck_sdk/aio/models/advisory_fix_aff.py | 6 +- vulncheck_sdk/aio/models/advisory_flag.py | 8 +- .../aio/models/advisory_flatt_security.py | 6 +- .../aio/models/advisory_forge_rock.py | 6 +- .../aio/models/advisory_fortinet_advisory.py | 6 +- .../aio/models/advisory_fortinet_ips.py | 6 +- vulncheck_sdk/aio/models/advisory_foxit.py | 6 +- .../aio/models/advisory_foxit_affected.py | 6 +- .../aio/models/advisory_fresenius.py | 6 +- .../aio/models/advisory_gallagher.py | 6 +- vulncheck_sdk/aio/models/advisory_gcp.py | 6 +- vulncheck_sdk/aio/models/advisory_ge_gas.py | 6 +- .../models/advisory_ge_healthcare_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_gen.py | 6 +- vulncheck_sdk/aio/models/advisory_genetec.py | 6 +- .../models/advisory_gh_advisory_json_lean.py | 6 +- vulncheck_sdk/aio/models/advisory_gh_cvss.py | 6 +- .../aio/models/advisory_gh_identifier.py | 6 +- vulncheck_sdk/aio/models/advisory_gh_node.py | 6 +- .../aio/models/advisory_gh_package.py | 6 +- .../aio/models/advisory_gh_reference.py | 6 +- .../aio/models/advisory_gh_vulnerabilities.py | 6 +- vulncheck_sdk/aio/models/advisory_ghsa.py | 6 +- .../aio/models/advisory_ghsa_affected.py | 6 +- .../models/advisory_ghsa_database_specific.py | 6 +- .../advisory_ghsa_eco_system_specific.py | 6 +- .../aio/models/advisory_ghsa_event.py | 6 +- .../aio/models/advisory_ghsa_package.py | 6 +- .../aio/models/advisory_ghsa_range.py | 6 +- .../aio/models/advisory_ghsa_reference.py | 6 +- .../aio/models/advisory_ghsa_severity.py | 6 +- vulncheck_sdk/aio/models/advisory_gigabyte.py | 6 +- .../aio/models/advisory_git_hub_exploit.py | 6 +- .../aio/models/advisory_git_lab_exploit.py | 6 +- .../aio/models/advisory_gitee_exploit.py | 6 +- .../aio/models/advisory_gitlab_advisory.py | 8 +- vulncheck_sdk/aio/models/advisory_glibc.py | 6 +- .../aio/models/advisory_gmo_cyber_security.py | 6 +- vulncheck_sdk/aio/models/advisory_gnu_tls.py | 6 +- .../aio/models/advisory_go_credits.py | 6 +- vulncheck_sdk/aio/models/advisory_go_event.py | 6 +- .../aio/models/advisory_go_vuln_affected.py | 6 +- .../advisory_go_vuln_database_specific.py | 6 +- .../advisory_go_vuln_ecosystem_specific.py | 6 +- .../aio/models/advisory_go_vuln_import.py | 6 +- .../aio/models/advisory_go_vuln_json.py | 6 +- .../aio/models/advisory_go_vuln_package.py | 6 +- .../aio/models/advisory_go_vuln_ranges.py | 6 +- .../aio/models/advisory_go_vuln_reference.py | 6 +- vulncheck_sdk/aio/models/advisory_grafana.py | 6 +- .../models/advisory_grey_noise_detection.py | 6 +- .../aio/models/advisory_grey_noise_tags.py | 6 +- .../aio/models/advisory_hacktivity.py | 6 +- .../aio/models/advisory_hardware_update.py | 6 +- .../aio/models/advisory_harmony_os.py | 6 +- .../aio/models/advisory_hashi_corp.py | 6 +- .../aio/models/advisory_haskell_affected.py | 6 +- .../models/advisory_haskell_sadb_advisory.py | 6 +- .../aio/models/advisory_haskell_version.py | 6 +- vulncheck_sdk/aio/models/advisory_hcl.py | 6 +- .../aio/models/advisory_hik_vision.py | 6 +- .../aio/models/advisory_hillrom_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_hitachi.py | 6 +- .../aio/models/advisory_hitachi_energy.py | 6 +- vulncheck_sdk/aio/models/advisory_hk_cert.py | 6 +- vulncheck_sdk/aio/models/advisory_hms.py | 6 +- .../aio/models/advisory_honeywell.py | 6 +- vulncheck_sdk/aio/models/advisory_hp.py | 6 +- vulncheck_sdk/aio/models/advisory_hpe.py | 6 +- vulncheck_sdk/aio/models/advisory_huawei.py | 6 +- .../aio/models/advisory_huawei_euler_os.py | 6 +- .../aio/models/advisory_huawei_ips.py | 6 +- vulncheck_sdk/aio/models/advisory_i_val.py | 6 +- vulncheck_sdk/aio/models/advisory_iava.py | 6 +- vulncheck_sdk/aio/models/advisory_ibm.py | 6 +- vulncheck_sdk/aio/models/advisory_idemia.py | 6 +- vulncheck_sdk/aio/models/advisory_igel.py | 6 +- vulncheck_sdk/aio/models/advisory_impact.py | 6 +- .../aio/models/advisory_incibe_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_intel.py | 6 +- .../aio/models/advisory_ip_intel_record.py | 6 +- .../aio/models/advisory_israeli_alert.py | 6 +- .../models/advisory_israeli_vulnerability.py | 6 +- vulncheck_sdk/aio/models/advisory_istio.py | 6 +- vulncheck_sdk/aio/models/advisory_itw.py | 6 +- .../aio/models/advisory_itw_exploit.py | 6 +- vulncheck_sdk/aio/models/advisory_ivanti.py | 6 +- .../aio/models/advisory_ivanti_rss.py | 6 +- vulncheck_sdk/aio/models/advisory_j_frog.py | 6 +- vulncheck_sdk/aio/models/advisory_jenkins.py | 6 +- .../aio/models/advisory_jet_brains.py | 6 +- .../aio/models/advisory_jnj_advisory.py | 6 +- .../aio/models/advisory_johnson_controls.py | 6 +- vulncheck_sdk/aio/models/advisory_juniper.py | 6 +- vulncheck_sdk/aio/models/advisory_jvn.py | 6 +- .../aio/models/advisory_jvn_advisory_item.py | 6 +- .../aio/models/advisory_jvn_reference.py | 6 +- vulncheck_sdk/aio/models/advisory_jvncpe.py | 6 +- vulncheck_sdk/aio/models/advisory_k8_s.py | 6 +- .../advisory_kaspersky_icscert_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_kb.py | 6 +- .../models/advisory_kb_threat_description.py | 6 +- .../advisory_kev_catalog_vulnerability.py | 6 +- .../aio/models/advisory_kore_logic.py | 6 +- .../aio/models/advisory_kr_cert_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_kunbus.py | 6 +- .../aio/models/advisory_lantronix.py | 6 +- vulncheck_sdk/aio/models/advisory_lenovo.py | 6 +- .../aio/models/advisory_lexmark_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_lg.py | 6 +- .../aio/models/advisory_libre_office.py | 6 +- vulncheck_sdk/aio/models/advisory_linux.py | 6 +- .../aio/models/advisory_log_source.py | 6 +- vulncheck_sdk/aio/models/advisory_lol_advs.py | 8 +- .../aio/models/advisory_m_affected.py | 6 +- vulncheck_sdk/aio/models/advisory_m_branch.py | 6 +- vulncheck_sdk/aio/models/advisory_m_cna.py | 6 +- .../aio/models/advisory_m_containers.py | 6 +- .../aio/models/advisory_m_cve_metadata.py | 6 +- .../aio/models/advisory_m_cvss_v20.py | 6 +- .../aio/models/advisory_m_cvss_v30.py | 6 +- .../aio/models/advisory_m_cvss_v31.py | 6 +- .../aio/models/advisory_m_cvss_v40.py | 6 +- .../aio/models/advisory_m_descriptions.py | 6 +- .../models/advisory_m_document_tracking.py | 6 +- vulncheck_sdk/aio/models/advisory_m_files.py | 6 +- .../models/advisory_m_full_product_name.py | 6 +- .../aio/models/advisory_m_identification.py | 6 +- vulncheck_sdk/aio/models/advisory_m_item.py | 6 +- vulncheck_sdk/aio/models/advisory_m_nodes.py | 6 +- .../aio/models/advisory_m_problem_types.py | 6 +- .../aio/models/advisory_m_product_status.py | 6 +- .../aio/models/advisory_m_product_tree.py | 6 +- .../models/advisory_m_provider_metadata.py | 6 +- .../aio/models/advisory_m_reference.py | 6 +- .../aio/models/advisory_m_remediation.py | 8 +- .../aio/models/advisory_m_version.py | 6 +- .../aio/models/advisory_m_vulnerability.py | 6 +- vulncheck_sdk/aio/models/advisory_ma_cert.py | 6 +- .../aio/models/advisory_malicious_package.py | 6 +- .../aio/models/advisory_manage_engine.py | 6 +- .../models/advisory_manage_engine_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_mbed_tls.py | 6 +- vulncheck_sdk/aio/models/advisory_mc_afee.py | 6 +- .../aio/models/advisory_mc_afee_score.py | 6 +- .../aio/models/advisory_mcpe_applicability.py | 6 +- .../aio/models/advisory_mcpe_match.py | 6 +- .../aio/models/advisory_me_product.py | 6 +- vulncheck_sdk/aio/models/advisory_mediatek.py | 6 +- .../aio/models/advisory_medtronic_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_mendix.py | 6 +- .../aio/models/advisory_meta_advisories.py | 6 +- .../aio/models/advisory_meta_data.py | 6 +- .../aio/models/advisory_metasploit_exploit.py | 6 +- vulncheck_sdk/aio/models/advisory_metric.py | 6 +- .../aio/models/advisory_metric_scenario.py | 6 +- .../aio/models/advisory_metrics_other.py | 6 +- .../aio/models/advisory_microsoft_csaf.py | 6 +- .../aio/models/advisory_microsoft_cvrf.py | 6 +- .../advisory_microsoft_driver_block_list.py | 8 +- .../advisory_microsoft_file_metadata.py | 6 +- .../aio/models/advisory_microsoft_kb.py | 6 +- vulncheck_sdk/aio/models/advisory_mikrotik.py | 6 +- vulncheck_sdk/aio/models/advisory_mindray.py | 6 +- .../aio/models/advisory_misp_meta.py | 6 +- .../aio/models/advisory_misp_related_item.py | 6 +- .../aio/models/advisory_misp_value.py | 6 +- .../aio/models/advisory_misp_value_no_id.py | 6 +- vulncheck_sdk/aio/models/advisory_mitel.py | 6 +- .../advisory_mitre_attack_group_no_id.py | 6 +- .../aio/models/advisory_mitre_attack_ref.py | 6 +- .../advisory_mitre_attack_tech_with_refs.py | 6 +- .../models/advisory_mitre_attack_technique.py | 6 +- .../aio/models/advisory_mitre_cve_list_v5.py | 6 +- .../models/advisory_mitre_cve_list_v5_ref.py | 6 +- .../aio/models/advisory_mitre_group_cti.py | 6 +- .../advisory_mitsubishi_electric_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_mongo_db.py | 6 +- .../aio/models/advisory_moxa_advisory.py | 6 +- .../aio/models/advisory_mozilla_advisory.py | 6 +- .../aio/models/advisory_mozilla_component.py | 6 +- .../aio/models/advisory_ms_document_title.py | 6 +- vulncheck_sdk/aio/models/advisory_mscvrf.py | 6 +- vulncheck_sdk/aio/models/advisory_naver.py | 6 +- vulncheck_sdk/aio/models/advisory_ncsc.py | 6 +- vulncheck_sdk/aio/models/advisory_ncsccve.py | 6 +- vulncheck_sdk/aio/models/advisory_nec.py | 6 +- vulncheck_sdk/aio/models/advisory_nessus.py | 6 +- vulncheck_sdk/aio/models/advisory_net_app.py | 6 +- vulncheck_sdk/aio/models/advisory_netatalk.py | 6 +- vulncheck_sdk/aio/models/advisory_netgate.py | 6 +- vulncheck_sdk/aio/models/advisory_netgear.py | 6 +- vulncheck_sdk/aio/models/advisory_netskope.py | 6 +- vulncheck_sdk/aio/models/advisory_nexpose.py | 6 +- .../aio/models/advisory_nginx_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_nhs.py | 6 +- vulncheck_sdk/aio/models/advisory_ni.py | 6 +- .../aio/models/advisory_nist_control.py | 6 +- .../aio/models/advisory_node_author.py | 6 +- vulncheck_sdk/aio/models/advisory_node_js.py | 6 +- .../aio/models/advisory_node_security.py | 6 +- vulncheck_sdk/aio/models/advisory_nokia.py | 6 +- vulncheck_sdk/aio/models/advisory_note.py | 6 +- .../aio/models/advisory_note_pad_plus_plus.py | 6 +- vulncheck_sdk/aio/models/advisory_nozomi.py | 6 +- vulncheck_sdk/aio/models/advisory_ntp.py | 6 +- vulncheck_sdk/aio/models/advisory_nuclei.py | 6 +- .../models/advisory_nvd20_configuration.py | 6 +- .../aio/models/advisory_nvd20_cvecpe_match.py | 6 +- .../aio/models/advisory_nvd20_node.py | 6 +- .../aio/models/advisory_nvd20_source.py | 6 +- .../aio/models/advisory_nvdcpe_dictionary.py | 6 +- .../aio/models/advisory_nvidia_revision.py | 8 +- .../aio/models/advisory_nz_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_o_curl.py | 6 +- .../aio/models/advisory_octopus_deploy.py | 6 +- vulncheck_sdk/aio/models/advisory_okta.py | 6 +- vulncheck_sdk/aio/models/advisory_omron.py | 6 +- vulncheck_sdk/aio/models/advisory_one_e.py | 6 +- vulncheck_sdk/aio/models/advisory_open_bsd.py | 6 +- .../aio/models/advisory_open_cvdb.py | 6 +- vulncheck_sdk/aio/models/advisory_open_jdk.py | 6 +- .../aio/models/advisory_open_jdkcve.py | 6 +- vulncheck_sdk/aio/models/advisory_open_ssh.py | 6 +- .../aio/models/advisory_open_ssl_sec_adv.py | 6 +- .../models/advisory_open_ssl_vulnerability.py | 6 +- .../aio/models/advisory_open_stack.py | 6 +- vulncheck_sdk/aio/models/advisory_opengear.py | 6 +- .../aio/models/advisory_oracle_cpu.py | 6 +- .../aio/models/advisory_oracle_cpucsaf.py | 6 +- .../aio/models/advisory_original_ghsa.py | 6 +- vulncheck_sdk/aio/models/advisory_osv.py | 6 +- vulncheck_sdk/aio/models/advisory_osv_obj.py | 6 +- .../aio/models/advisory_osv_package.py | 6 +- .../aio/models/advisory_osv_reference.py | 6 +- vulncheck_sdk/aio/models/advisory_otrs.py | 6 +- vulncheck_sdk/aio/models/advisory_oval_cve.py | 6 +- .../aio/models/advisory_oval_reference.py | 6 +- vulncheck_sdk/aio/models/advisory_override.py | 6 +- .../models/advisory_override_annotation.py | 6 +- .../models/advisory_override_configuration.py | 6 +- .../aio/models/advisory_override_cve.py | 6 +- .../aio/models/advisory_own_cloud.py | 6 +- vulncheck_sdk/aio/models/advisory_package.py | 6 +- .../aio/models/advisory_package_stat.py | 6 +- .../models/advisory_packetstorm_exploit.py | 6 +- vulncheck_sdk/aio/models/advisory_palantir.py | 6 +- .../aio/models/advisory_palo_alto_advisory.py | 6 +- .../aio/models/advisory_panasonic.py | 6 +- .../aio/models/advisory_paper_cut.py | 6 +- vulncheck_sdk/aio/models/advisory_patch.py | 6 +- vulncheck_sdk/aio/models/advisory_pega.py | 6 +- vulncheck_sdk/aio/models/advisory_pg_fix.py | 6 +- .../aio/models/advisory_philips_advisory.py | 6 +- .../advisory_phoenix_contact_advisory.py | 6 +- .../aio/models/advisory_phpmy_admin.py | 6 +- vulncheck_sdk/aio/models/advisory_pk_cert.py | 6 +- .../aio/models/advisory_postgres_sql.py | 6 +- .../aio/models/advisory_power_dns.py | 6 +- .../aio/models/advisory_prime_version.py | 6 +- vulncheck_sdk/aio/models/advisory_product.py | 10 +- .../aio/models/advisory_product_branch.py | 6 +- .../advisory_product_specific_detail.py | 6 +- .../aio/models/advisory_products_affected.py | 6 +- vulncheck_sdk/aio/models/advisory_progress.py | 6 +- .../aio/models/advisory_proofpoint.py | 6 +- vulncheck_sdk/aio/models/advisory_ptc.py | 6 +- .../aio/models/advisory_ptm_descriptions.py | 6 +- .../aio/models/advisory_publisher.py | 6 +- .../aio/models/advisory_pure_storage.py | 6 +- .../aio/models/advisory_py_pa_advisory.py | 6 +- .../aio/models/advisory_py_pa_affected.py | 6 +- .../aio/models/advisory_py_pa_event.py | 6 +- .../aio/models/advisory_py_pa_package.py | 6 +- .../aio/models/advisory_py_pa_range.py | 6 +- .../aio/models/advisory_py_pa_reference.py | 6 +- .../aio/models/advisory_qnap_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_qqid.py | 6 +- vulncheck_sdk/aio/models/advisory_qsb.py | 6 +- vulncheck_sdk/aio/models/advisory_qualcomm.py | 6 +- vulncheck_sdk/aio/models/advisory_qualys.py | 6 +- .../aio/models/advisory_qualys_qid.py | 6 +- .../aio/models/advisory_r_description.py | 6 +- vulncheck_sdk/aio/models/advisory_r_note.py | 6 +- .../aio/models/advisory_r_revision.py | 8 +- .../aio/models/advisory_r_score_set.py | 6 +- vulncheck_sdk/aio/models/advisory_r_threat.py | 8 +- vulncheck_sdk/aio/models/advisory_range.py | 6 +- .../aio/models/advisory_ransomware_exploit.py | 6 +- .../aio/models/advisory_record_type.py | 6 +- vulncheck_sdk/aio/models/advisory_red_lion.py | 6 +- .../aio/models/advisory_redhat_cve.py | 6 +- .../aio/models/advisory_reference.py | 6 +- .../aio/models/advisory_related_rule.py | 6 +- .../aio/models/advisory_remediation_data.py | 8 +- vulncheck_sdk/aio/models/advisory_renesas.py | 6 +- .../aio/models/advisory_reported_exploit.py | 6 +- .../aio/models/advisory_restart_data.py | 6 +- vulncheck_sdk/aio/models/advisory_revision.py | 92 - .../aio/models/advisory_revision_history.py | 8 +- vulncheck_sdk/aio/models/advisory_revive.py | 6 +- vulncheck_sdk/aio/models/advisory_rhel_cve.py | 6 +- vulncheck_sdk/aio/models/advisory_roche.py | 6 +- .../aio/models/advisory_roche_cve.py | 6 +- vulncheck_sdk/aio/models/advisory_rockwell.py | 6 +- .../advisory_rockwell_affected_product.py | 6 +- .../aio/models/advisory_rocky_advisory.py | 8 +- .../aio/models/advisory_rocky_cve.py | 6 +- .../aio/models/advisory_rocky_errata.py | 6 +- .../aio/models/advisory_rocky_fix.py | 6 +- .../aio/models/advisory_rocky_package.py | 6 +- .../aio/models/advisory_rocky_version.py | 6 +- vulncheck_sdk/aio/models/advisory_rsync.py | 6 +- vulncheck_sdk/aio/models/advisory_ruckus.py | 6 +- .../aio/models/advisory_rustsec_advisory.py | 6 +- .../aio/models/advisory_rustsec_affected.py | 6 +- .../advisory_rustsec_front_matter_advisory.py | 8 +- .../advisory_rustsec_front_matter_versions.py | 6 +- .../aio/models/advisory_sa_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_safran.py | 6 +- .../aio/models/advisory_saint_exploit.py | 6 +- .../aio/models/advisory_sales_force.py | 6 +- vulncheck_sdk/aio/models/advisory_samba.py | 6 +- vulncheck_sdk/aio/models/advisory_sandisk.py | 6 +- .../aio/models/advisory_sans_dshield.py | 6 +- vulncheck_sdk/aio/models/advisory_sap.py | 6 +- .../aio/models/advisory_schneider_cve.py | 6 +- .../advisory_schneider_electric_advisory.py | 6 +- .../aio/models/advisory_schutzwerk.py | 6 +- .../aio/models/advisory_score_set.py | 90 - .../aio/models/advisory_sec_consult.py | 6 +- vulncheck_sdk/aio/models/advisory_sec_fix.py | 6 +- .../aio/models/advisory_security_bulletin.py | 6 +- .../aio/models/advisory_security_lab.py | 6 +- .../aio/models/advisory_seebug_exploit.py | 6 +- vulncheck_sdk/aio/models/advisory_sel.py | 6 +- .../aio/models/advisory_sentinel_one.py | 6 +- .../aio/models/advisory_service_now.py | 6 +- .../aio/models/advisory_seven_zip.py | 6 +- vulncheck_sdk/aio/models/advisory_severity.py | 6 +- ...y_shadow_server_exploited_vulnerability.py | 6 +- vulncheck_sdk/aio/models/advisory_shielder.py | 6 +- vulncheck_sdk/aio/models/advisory_sick.py | 6 +- .../advisory_siemens_acknowledgments.py | 6 +- .../aio/models/advisory_siemens_advisory.py | 6 +- .../aio/models/advisory_siemens_branch.py | 6 +- .../aio/models/advisory_siemens_cvssv3.py | 6 +- .../aio/models/advisory_siemens_cwe.py | 6 +- .../models/advisory_siemens_distribution.py | 6 +- .../aio/models/advisory_siemens_document.py | 6 +- .../aio/models/advisory_siemens_engine.py | 6 +- .../aio/models/advisory_siemens_generator.py | 6 +- .../aio/models/advisory_siemens_notes.py | 6 +- .../aio/models/advisory_siemens_product.py | 6 +- ...y_siemens_product_identification_helper.py | 6 +- .../models/advisory_siemens_product_status.py | 6 +- .../models/advisory_siemens_product_tree.py | 6 +- .../aio/models/advisory_siemens_publisher.py | 6 +- .../aio/models/advisory_siemens_references.py | 6 +- .../models/advisory_siemens_remediation.py | 6 +- .../advisory_siemens_revision_history.py | 8 +- .../aio/models/advisory_siemens_score.py | 6 +- .../aio/models/advisory_siemens_sub_branch.py | 6 +- .../models/advisory_siemens_sub_sub_branch.py | 6 +- .../aio/models/advisory_siemens_tlp.py | 6 +- .../aio/models/advisory_siemens_tracking.py | 6 +- .../models/advisory_siemens_vulnerability.py | 6 +- .../aio/models/advisory_sierra_wireless.py | 6 +- .../aio/models/advisory_sigma_rule.py | 6 +- .../aio/models/advisory_sigma_rule_rule.py | 8 +- .../aio/models/advisory_sing_cert.py | 6 +- vulncheck_sdk/aio/models/advisory_sitecore.py | 6 +- .../aio/models/advisory_slackware.py | 6 +- .../aio/models/advisory_software_update.py | 6 +- .../models/advisory_solar_winds_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_solr.py | 6 +- vulncheck_sdk/aio/models/advisory_sonatype.py | 6 +- .../models/advisory_sonic_wall_advisory.py | 6 +- .../advisory_spacelabs_healthcare_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_splunk.py | 6 +- .../aio/models/advisory_splunk_product.py | 6 +- vulncheck_sdk/aio/models/advisory_spring.py | 6 +- .../aio/models/advisory_ssa_source.py | 6 +- .../aio/models/advisory_ssd_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_status.py | 90 - .../aio/models/advisory_stormshield.py | 6 +- .../aio/models/advisory_stryker_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_sudo.py | 6 +- .../aio/models/advisory_suse_security.py | 6 +- .../advisory_swisslog_healthcare_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_symfony.py | 6 +- .../aio/models/advisory_synacktiv.py | 6 +- .../aio/models/advisory_syncro_soft.py | 6 +- vulncheck_sdk/aio/models/advisory_synology.py | 6 +- vulncheck_sdk/aio/models/advisory_syss.py | 6 +- .../aio/models/advisory_tailscale.py | 6 +- .../aio/models/advisory_talos_advisory.py | 6 +- .../aio/models/advisory_team_viewer.py | 6 +- .../advisory_tenable_research_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_tencent.py | 6 +- vulncheck_sdk/aio/models/advisory_thales.py | 6 +- .../aio/models/advisory_the_missing_link.py | 6 +- .../aio/models/advisory_thermo_fisher.py | 6 +- vulncheck_sdk/aio/models/advisory_threat.py | 90 - ...sory_threat_actor_with_external_objects.py | 6 +- .../aio/models/advisory_threat_data.py | 6 +- vulncheck_sdk/aio/models/advisory_ti.py | 6 +- vulncheck_sdk/aio/models/advisory_tibco.py | 6 +- vulncheck_sdk/aio/models/advisory_timeline.py | 6 +- vulncheck_sdk/aio/models/advisory_tool.py | 6 +- vulncheck_sdk/aio/models/advisory_tool_ref.py | 6 +- vulncheck_sdk/aio/models/advisory_tp_link.py | 6 +- vulncheck_sdk/aio/models/advisory_tracking.py | 6 +- .../aio/models/advisory_tracking_id.py | 6 +- .../aio/models/advisory_trane_technology.py | 6 +- .../aio/models/advisory_trend_micro.py | 6 +- .../aio/models/advisory_triage_notes.py | 6 +- .../aio/models/advisory_trustwave.py | 6 +- .../aio/models/advisory_tw_cert_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_ubiquiti.py | 6 +- .../aio/models/advisory_ubuntu_cve.py | 6 +- .../advisory_ubuntu_package_release_status.py | 6 +- vulncheck_sdk/aio/models/advisory_unify.py | 6 +- vulncheck_sdk/aio/models/advisory_unisoc.py | 6 +- vulncheck_sdk/aio/models/advisory_update.py | 21 +- vulncheck_sdk/aio/models/advisory_usd.py | 6 +- .../aio/models/advisory_usom_advisory.py | 6 +- .../models/advisory_v3_acceptance_level.py | 6 +- vulncheck_sdk/aio/models/advisory_van_dyke.py | 6 +- .../models/advisory_vapid_labs_advisory.py | 6 +- .../aio/models/advisory_vc_vulnerable_cpes.py | 6 +- .../aio/models/advisory_vccpe_dictionary.py | 6 +- .../aio/models/advisory_vde_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_veeam.py | 6 +- .../advisory_vendor_name_for_threat_actor.py | 6 +- .../aio/models/advisory_vendor_product.py | 6 +- .../aio/models/advisory_vendor_ref.py | 6 +- vulncheck_sdk/aio/models/advisory_veritas.py | 6 +- .../aio/models/advisory_virtuozzo.py | 6 +- vulncheck_sdk/aio/models/advisory_vlc.py | 6 +- .../aio/models/advisory_vm_ware_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_void_sec.py | 6 +- .../aio/models/advisory_vuln_check.py | 6 +- .../aio/models/advisory_vuln_check_config.py | 6 +- .../models/advisory_vuln_check_cve_list_v5.py | 6 +- .../aio/models/advisory_vuln_check_kev.py | 6 +- .../aio/models/advisory_vuln_check_package.py | 6 +- .../aio/models/advisory_vulnerability.py | 136 - .../advisory_vulnerable_debian_package.py | 6 +- .../aio/models/advisory_vulnerable_product.py | 6 +- .../aio/models/advisory_vulnrichment.py | 6 +- .../advisory_vulnrichment_containers.py | 6 +- .../models/advisory_vulnrichment_content.py | 6 +- .../models/advisory_vulnrichment_cve_ref.py | 6 +- .../models/advisory_vulnrichment_metric.py | 6 +- .../models/advisory_vulnrichment_option.py | 6 +- .../aio/models/advisory_vulnrichment_other.py | 6 +- .../aio/models/advisory_vyaire_advisory.py | 6 +- .../aio/models/advisory_watch_guard.py | 6 +- .../aio/models/advisory_whats_app.py | 6 +- vulncheck_sdk/aio/models/advisory_wibu.py | 6 +- .../aio/models/advisory_wireshark.py | 6 +- .../aio/models/advisory_with_secure.py | 6 +- vulncheck_sdk/aio/models/advisory_wolf_ssl.py | 6 +- vulncheck_sdk/aio/models/advisory_wolfi.py | 6 +- .../aio/models/advisory_wolfi_package.py | 6 +- .../aio/models/advisory_wolfi_sec_fix.py | 6 +- .../aio/models/advisory_wordfence.py | 6 +- vulncheck_sdk/aio/models/advisory_wrt.py | 6 +- vulncheck_sdk/aio/models/advisory_xdb.py | 6 +- vulncheck_sdk/aio/models/advisory_xen.py | 6 +- vulncheck_sdk/aio/models/advisory_xerox.py | 6 +- vulncheck_sdk/aio/models/advisory_xiaomi.py | 6 +- vulncheck_sdk/aio/models/advisory_xylem.py | 6 +- vulncheck_sdk/aio/models/advisory_yamaha.py | 6 +- .../aio/models/advisory_yokogawa_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_yubico.py | 6 +- vulncheck_sdk/aio/models/advisory_zdi.py | 6 +- .../aio/models/advisory_zdi_product.py | 6 +- .../aio/models/advisory_zdi_response.py | 6 +- .../models/advisory_zdi_response_vendor.py | 6 +- .../aio/models/advisory_zdi_vendor.py | 6 +- vulncheck_sdk/aio/models/advisory_zebra.py | 6 +- .../aio/models/advisory_zero_day_advisory.py | 6 +- .../models/advisory_zero_science_advisory.py | 6 +- vulncheck_sdk/aio/models/advisory_zimbra.py | 6 +- vulncheck_sdk/aio/models/advisory_zoom.py | 6 +- vulncheck_sdk/aio/models/advisory_zscaler.py | 6 +- .../aio/models/advisory_zulu_version.py | 6 +- vulncheck_sdk/aio/models/advisory_zuso.py | 6 +- vulncheck_sdk/aio/models/advisory_zyxel.py | 6 +- .../aio/models/api_base_metric_v2.py | 6 +- .../aio/models/api_base_metric_v3.py | 6 +- .../aio/models/api_categorization_extended.py | 6 +- .../aio/models/api_client_fingerprints.py | 6 +- .../aio/models/api_configurations.py | 6 +- vulncheck_sdk/aio/models/api_cpe.py | 6 +- vulncheck_sdk/aio/models/api_cpe_match.py | 6 +- vulncheck_sdk/aio/models/api_cpe_name.py | 6 +- vulncheck_sdk/aio/models/api_cve.py | 6 +- vulncheck_sdk/aio/models/api_cve_data_meta.py | 6 +- .../aio/models/api_cve_data_meta_extended.py | 6 +- vulncheck_sdk/aio/models/api_cve_extended.py | 6 +- vulncheck_sdk/aio/models/api_cve_items.py | 6 +- .../aio/models/api_cve_items_extended.py | 6 +- vulncheck_sdk/aio/models/api_cvssv2.py | 6 +- vulncheck_sdk/aio/models/api_cvssv3.py | 6 +- vulncheck_sdk/aio/models/api_cwe.py | 6 +- vulncheck_sdk/aio/models/api_date_time.py | 88 - vulncheck_sdk/aio/models/api_description.py | 6 +- .../aio/models/api_description_data.py | 6 +- vulncheck_sdk/aio/models/api_epss.py | 6 +- vulncheck_sdk/aio/models/api_epss_data.py | 6 +- vulncheck_sdk/aio/models/api_exploit_chain.py | 6 +- .../aio/models/api_exploit_chain_cve.py | 6 +- .../aio/models/api_exploit_v3_result.py | 8 +- .../aio/models/api_exploits_change.py | 20 +- .../aio/models/api_exploits_changelog.py | 6 +- .../aio/models/api_exploits_trending.py | 6 +- .../aio/models/api_exploits_v3_count.py | 6 +- .../aio/models/api_exploits_v3_timeline.py | 6 +- vulncheck_sdk/aio/models/api_http_details.py | 6 +- vulncheck_sdk/aio/models/api_impact.py | 8 +- .../aio/models/api_impact_extended.py | 6 +- .../aio/models/api_initial_access.py | 6 +- .../aio/models/api_initial_access_artifact.py | 6 +- .../aio/models/api_mitre_attack_tech.py | 6 +- .../aio/models/api_mitre_attack_to_cve.py | 6 +- .../aio/models/api_mitre_d3fend_technique.py | 6 +- .../aio/models/api_mitre_detection_tech.py | 6 +- .../api_mitre_mitigation2_d3fend_mapping.py | 6 +- .../aio/models/api_mitre_mitigation_tech.py | 6 +- vulncheck_sdk/aio/models/api_nodes.py | 6 +- .../models/api_normalized_exploit_v3_entry.py | 6 +- .../models/api_normalized_report_v3_entry.py | 6 +- .../aio/models/api_nvd20_cpe_match.py | 6 +- .../aio/models/api_nvd20_cpe_name.py | 6 +- vulncheck_sdk/aio/models/api_nvd20_cve.py | 6 +- .../aio/models/api_nvd20_cve_extended.py | 6 +- .../aio/models/api_nvd20_cvss_data_v2.py | 6 +- .../aio/models/api_nvd20_cvss_data_v3.py | 6 +- .../aio/models/api_nvd20_cvss_metric_v2.py | 6 +- .../aio/models/api_nvd20_cvss_metric_v3.py | 6 +- .../aio/models/api_nvd20_cvss_metric_v40.py | 6 +- .../aio/models/api_nvd20_description.py | 6 +- vulncheck_sdk/aio/models/api_nvd20_metric.py | 6 +- .../aio/models/api_nvd20_metric_extended.py | 6 +- .../aio/models/api_nvd20_reference.py | 6 +- .../models/api_nvd20_reference_extended.py | 6 +- ...i_nvd20_temporal_associated_base_metric.py | 6 +- .../aio/models/api_nvd20_temporal_cvssv2.py | 6 +- .../aio/models/api_nvd20_temporal_cvssv3.py | 6 +- ...api_nvd20_threat_associated_base_metric.py | 6 +- .../aio/models/api_nvd20_threat_cvssv40.py | 6 +- .../aio/models/api_nvd20_vendor_comment.py | 6 +- .../aio/models/api_nvd20_weakness.py | 6 +- .../api_nvd20_weakness_desc_extended.py | 6 +- .../aio/models/api_nvd20_weakness_extended.py | 6 +- vulncheck_sdk/aio/models/api_oss_package.py | 6 +- .../aio/models/api_oss_package_artifacts.py | 6 +- .../models/api_oss_package_download_info.py | 6 +- .../aio/models/api_oss_package_hash_info.py | 6 +- .../api_oss_package_research_attributes.py | 6 +- .../models/api_oss_package_vulnerability.py | 6 +- vulncheck_sdk/aio/models/api_package.py | 6 +- vulncheck_sdk/aio/models/api_problem_type.py | 6 +- .../aio/models/api_problem_type_data.py | 6 +- .../models/api_problem_type_data_extended.py | 6 +- .../models/api_problem_type_description.py | 6 +- .../api_problem_type_description_extended.py | 6 +- .../aio/models/api_problem_type_extended.py | 6 +- vulncheck_sdk/aio/models/api_reference.py | 6 +- .../aio/models/api_reference_data.py | 6 +- .../aio/models/api_reference_data_extended.py | 6 +- vulncheck_sdk/aio/models/api_references.py | 6 +- .../aio/models/api_references_extended.py | 6 +- .../aio/models/api_related_attack_pattern.py | 6 +- vulncheck_sdk/aio/models/api_ssvc.py | 6 +- .../aio/models/api_temporal_cvssv2.py | 6 +- .../aio/models/api_temporal_cvssv3.py | 6 +- .../aio/models/api_temporal_metric_v2.py | 6 +- .../aio/models/api_temporal_metric_v3.py | 6 +- vulncheck_sdk/aio/models/api_update.py | 21 +- .../aio/models/api_vuln_check_canary.py | 6 +- .../aio/models/api_vulnerability_alias.py | 6 +- .../aio/models/models_entitlements.py | 6 +- vulncheck_sdk/aio/models/paginate_match.py | 6 +- .../aio/models/paginate_pagination.py | 6 +- vulncheck_sdk/aio/models/paginate_param.py | 6 +- .../aio/models/params_index_backup.py | 6 +- .../aio/models/params_index_backup_list.py | 6 +- vulncheck_sdk/aio/models/params_index_list.py | 6 +- .../aio/models/purl_batch_vuln_finding.py | 8 +- .../aio/models/purl_package_urljson.py | 6 +- .../aio/models/purl_qualifier_json.py | 6 +- .../aio/models/purls_purl_response.py | 10 +- .../aio/models/purls_vulnerability.py | 6 +- ...response_array_params_index_backup_list.py | 6 +- ...render_response_array_params_index_list.py | 6 +- ..._array_advisory_a10_paginate_pagination.py | 6 +- ...visory_abb_advisory_paginate_pagination.py | 6 +- ...ray_advisory_abbott_paginate_pagination.py | 6 +- ...y_advisory_absolute_paginate_pagination.py | 6 +- ...ay_advisory_acronis_paginate_pagination.py | 6 +- ...sory_adobe_advisory_paginate_pagination.py | 6 +- ..._advisory_advantech_paginate_pagination.py | 6 +- ...y_advisory_advisory_paginate_pagination.py | 6 +- ...ory_advisory_record_paginate_pagination.py | 6 +- ..._array_advisory_aix_paginate_pagination.py | 6 +- ...sory_aleph_research_paginate_pagination.py | 6 +- ...ay_advisory_alibaba_paginate_pagination.py | 6 +- ...y_alma_linux_update_paginate_pagination.py | 6 +- ...alpine_linux_sec_db_paginate_pagination.py | 6 +- ...advisory_amazon_cve_paginate_pagination.py | 6 +- ..._array_advisory_amd_paginate_pagination.py | 6 +- ..._array_advisory_ami_paginate_pagination.py | 6 +- ...nchore_nvd_override_paginate_pagination.py | 6 +- ...ry_android_advisory_paginate_pagination.py | 6 +- ...ry_apache_active_mq_paginate_pagination.py | 6 +- ...sory_apache_archiva_paginate_pagination.py | 6 +- ...visory_apache_arrow_paginate_pagination.py | 6 +- ...visory_apache_camel_paginate_pagination.py | 6 +- ...sory_apache_commons_paginate_pagination.py | 6 +- ...ory_apache_couch_db_paginate_pagination.py | 6 +- ...visory_apache_flink_paginate_pagination.py | 6 +- ...ry_apache_guacamole_paginate_pagination.py | 6 +- ...isory_apache_hadoop_paginate_pagination.py | 6 +- ...dvisory_apache_http_paginate_pagination.py | 6 +- ...ory_apache_jsp_wiki_paginate_pagination.py | 6 +- ...visory_apache_kafka_paginate_pagination.py | 6 +- ...he_logging_services_paginate_pagination.py | 6 +- ...visory_apache_ni_fi_paginate_pagination.py | 6 +- ...isory_apache_of_biz_paginate_pagination.py | 6 +- ...pache_open_meetings_paginate_pagination.py | 6 +- ..._apache_open_office_paginate_pagination.py | 6 +- ...isory_apache_pulsar_paginate_pagination.py | 6 +- ...visory_apache_shiro_paginate_pagination.py | 6 +- ...visory_apache_spark_paginate_pagination.py | 6 +- ...isory_apache_struts_paginate_pagination.py | 6 +- ...y_apache_subversion_paginate_pagination.py | 6 +- ...ory_apache_superset_paginate_pagination.py | 6 +- ...isory_apache_tomcat_paginate_pagination.py | 6 +- ...y_apache_zoo_keeper_paginate_pagination.py | 6 +- ..._advisory_app_check_paginate_pagination.py | 6 +- ...ay_advisory_appgate_paginate_pagination.py | 6 +- ...sory_apple_advisory_paginate_pagination.py | 6 +- ...advisory_arch_issue_paginate_pagination.py | 6 +- ...ray_advisory_arista_paginate_pagination.py | 6 +- ...rray_advisory_aruba_paginate_pagination.py | 6 +- ...array_advisory_asrg_paginate_pagination.py | 6 +- ...advisory_asset_note_paginate_pagination.py | 6 +- ...y_advisory_asterisk_paginate_pagination.py | 6 +- ...rray_advisory_astra_paginate_pagination.py | 6 +- ...array_advisory_asus_paginate_pagination.py | 6 +- ..._atlassian_advisory_paginate_pagination.py | 6 +- ...sory_atlassian_vuln_paginate_pagination.py | 6 +- ...ay_advisory_atredis_paginate_pagination.py | 6 +- ...advisory_audiocodes_paginate_pagination.py | 6 +- ...y_advisory_aus_cert_paginate_pagination.py | 6 +- ...y_advisory_autodesk_paginate_pagination.py | 6 +- ...rray_advisory_avaya_paginate_pagination.py | 6 +- ...sory_aveva_advisory_paginate_pagination.py | 6 +- ...dvisory_avidml_advs_paginate_pagination.py | 6 +- ...y_advisory_avigilon_paginate_pagination.py | 6 +- ..._array_advisory_aws_paginate_pagination.py | 6 +- ...array_advisory_axis_paginate_pagination.py | 6 +- ...array_advisory_azul_paginate_pagination.py | 6 +- ...ry_b_braun_advisory_paginate_pagination.py | 6 +- ...rray_advisory_bandr_paginate_pagination.py | 6 +- ...ory_baxter_advisory_paginate_pagination.py | 6 +- ...visory_bdu_advisory_paginate_pagination.py | 6 +- ...y_beckhoff_advisory_paginate_pagination.py | 6 +- ...ory_beckman_coulter_paginate_pagination.py | 6 +- ..._dickinson_advisory_paginate_pagination.py | 6 +- ...ory_belden_advisory_paginate_pagination.py | 6 +- ...visory_beyond_trust_paginate_pagination.py | 6 +- ...ay_advisory_binarly_paginate_pagination.py | 6 +- ...visory_bit_defender_paginate_pagination.py | 6 +- ...dvisory_black_berry_paginate_pagination.py | 6 +- ..._array_advisory_bls_paginate_pagination.py | 6 +- ...sory_bosch_advisory_paginate_pagination.py | 6 +- ...scientific_advisory_paginate_pagination.py | 6 +- ...ray_advisory_botnet_paginate_pagination.py | 6 +- ...ber_centre_advisory_paginate_pagination.py | 6 +- ...sory_canvas_exploit_paginate_pagination.py | 6 +- ...carestream_advisory_paginate_pagination.py | 6 +- ...ay_advisory_carrier_paginate_pagination.py | 6 +- ...dvisory_cbl_mariner_paginate_pagination.py | 6 +- ...ay_advisory_cert_be_paginate_pagination.py | 6 +- ...ry_cert_fr_advisory_paginate_pagination.py | 6 +- ...ay_advisory_cert_in_paginate_pagination.py | 6 +- ...t_ir_security_alert_paginate_pagination.py | 6 +- ...ay_advisory_cert_se_paginate_pagination.py | 6 +- ...ay_advisory_cert_ua_paginate_pagination.py | 6 +- ...ory_certeu_advisory_paginate_pagination.py | 6 +- ...array_advisory_cesa_paginate_pagination.py | 6 +- ...dvisory_chain_guard_paginate_pagination.py | 6 +- ...dvisory_check_point_paginate_pagination.py | 6 +- ...ray_advisory_chrome_paginate_pagination.py | 6 +- ...rray_advisory_ciena_paginate_pagination.py | 6 +- ...advisory_cisa_alert_paginate_pagination.py | 6 +- ...isory_cisa_csaf_adv_paginate_pagination.py | 6 +- ...sory_cisco_advisory_paginate_pagination.py | 6 +- ...advisory_cisco_csaf_paginate_pagination.py | 6 +- ...co_known_good_value_paginate_pagination.py | 6 +- ...ory_citrix_advisory_paginate_pagination.py | 6 +- ...aroty_vulnerability_paginate_pagination.py | 6 +- ...advisory_cloud_bees_paginate_pagination.py | 6 +- ...ud_vuln_db_advisory_paginate_pagination.py | 6 +- ...ry_cnnvd_entry_json_paginate_pagination.py | 6 +- ...isory_cnvd_bulletin_paginate_pagination.py | 6 +- ..._advisory_cnvd_flaw_paginate_pagination.py | 6 +- ...ry_codesys_advisory_paginate_pagination.py | 6 +- ...advisory_comm_vault_paginate_pagination.py | 6 +- ...ry_compass_security_paginate_pagination.py | 6 +- ...visory_container_os_paginate_pagination.py | 6 +- ...core_impact_exploit_paginate_pagination.py | 6 +- ...y_advisory_crestron_paginate_pagination.py | 6 +- ..._advisory_crowd_sec_paginate_pagination.py | 6 +- ...array_advisory_curl_paginate_pagination.py | 6 +- ...array_advisory_cvrf_paginate_pagination.py | 6 +- ...ray_advisory_d_link_paginate_pagination.py | 6 +- ...rray_advisory_dahua_paginate_pagination.py | 6 +- ...ay_advisory_danfoss_paginate_pagination.py | 6 +- ...y_advisory_dassault_paginate_pagination.py | 6 +- ...n_security_advisory_paginate_pagination.py | 6 +- ...array_advisory_dell_paginate_pagination.py | 6 +- ...sory_delta_advisory_paginate_pagination.py | 6 +- ...y_advisory_dfn_cert_paginate_pagination.py | 6 +- ...sory_distro_package_paginate_pagination.py | 6 +- ...ray_advisory_django_paginate_pagination.py | 6 +- ..._array_advisory_dnn_paginate_pagination.py | 6 +- ...ay_advisory_dot_cms_paginate_pagination.py | 6 +- ...ory_dragos_advisory_paginate_pagination.py | 6 +- ...ay_advisory_draytek_paginate_pagination.py | 6 +- ...ray_advisory_drupal_paginate_pagination.py | 6 +- ...sory_eaton_advisory_paginate_pagination.py | 6 +- ...ay_advisory_elastic_paginate_pagination.py | 6 +- ...ray_advisory_elspec_paginate_pagination.py | 6 +- ...rging_threats_snort_paginate_pagination.py | 6 +- ...ry_emerson_advisory_paginate_pagination.py | 6 +- ...dvisory_end_of_life_paginate_pagination.py | 6 +- ...ay_advisory_endress_paginate_pagination.py | 6 +- ...dvisory_eol_alibaba_paginate_pagination.py | 6 +- ...isory_eol_microsoft_paginate_pagination.py | 6 +- ...ry_eol_release_data_paginate_pagination.py | 6 +- ...array_advisory_euvd_paginate_pagination.py | 6 +- ...visory_exodus_intel_paginate_pagination.py | 6 +- ...xploit_db_exploitv2_paginate_pagination.py | 6 +- ...a_array_advisory_f5_paginate_pagination.py | 6 +- ...y_advisory_f_secure_paginate_pagination.py | 6 +- ...rray_advisory_fanuc_paginate_pagination.py | 6 +- ...ray_advisory_fastly_paginate_pagination.py | 6 +- ...rray_advisory_festo_paginate_pagination.py | 6 +- ...advisory_file_cloud_paginate_pagination.py | 6 +- ...advisory_file_zilla_paginate_pagination.py | 6 +- ...sory_flatt_security_paginate_pagination.py | 6 +- ...advisory_forge_rock_paginate_pagination.py | 6 +- ...y_fortinet_advisory_paginate_pagination.py | 6 +- ...visory_fortinet_ips_paginate_pagination.py | 6 +- ...rray_advisory_foxit_paginate_pagination.py | 6 +- ..._advisory_fresenius_paginate_pagination.py | 6 +- ..._advisory_gallagher_paginate_pagination.py | 6 +- ..._array_advisory_gcp_paginate_pagination.py | 6 +- ...ray_advisory_ge_gas_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ..._array_advisory_gen_paginate_pagination.py | 6 +- ...ay_advisory_genetec_paginate_pagination.py | 6 +- ..._advisory_json_lean_paginate_pagination.py | 6 +- ...array_advisory_ghsa_paginate_pagination.py | 6 +- ...y_advisory_gigabyte_paginate_pagination.py | 6 +- ...ory_git_hub_exploit_paginate_pagination.py | 6 +- ...ory_git_lab_exploit_paginate_pagination.py | 6 +- ...isory_gitee_exploit_paginate_pagination.py | 6 +- ...ory_gitlab_advisory_paginate_pagination.py | 6 +- ...rray_advisory_glibc_paginate_pagination.py | 6 +- ..._gmo_cyber_security_paginate_pagination.py | 6 +- ...ay_advisory_gnu_tls_paginate_pagination.py | 6 +- ...visory_go_vuln_json_paginate_pagination.py | 6 +- ...ay_advisory_grafana_paginate_pagination.py | 6 +- ...rey_noise_detection_paginate_pagination.py | 6 +- ...advisory_hacktivity_paginate_pagination.py | 6 +- ...advisory_harmony_os_paginate_pagination.py | 6 +- ...advisory_hashi_corp_paginate_pagination.py | 6 +- ...skell_sadb_advisory_paginate_pagination.py | 6 +- ..._array_advisory_hcl_paginate_pagination.py | 6 +- ...advisory_hik_vision_paginate_pagination.py | 6 +- ...ry_hillrom_advisory_paginate_pagination.py | 6 +- ...sory_hitachi_energy_paginate_pagination.py | 6 +- ...ay_advisory_hitachi_paginate_pagination.py | 6 +- ...ay_advisory_hk_cert_paginate_pagination.py | 6 +- ..._array_advisory_hms_paginate_pagination.py | 6 +- ..._advisory_honeywell_paginate_pagination.py | 6 +- ...a_array_advisory_hp_paginate_pagination.py | 6 +- ..._array_advisory_hpe_paginate_pagination.py | 6 +- ...ory_huawei_euler_os_paginate_pagination.py | 6 +- ...advisory_huawei_ips_paginate_pagination.py | 6 +- ...ray_advisory_huawei_paginate_pagination.py | 6 +- ...array_advisory_iava_paginate_pagination.py | 6 +- ..._array_advisory_ibm_paginate_pagination.py | 6 +- ...ray_advisory_idemia_paginate_pagination.py | 6 +- ...array_advisory_igel_paginate_pagination.py | 6 +- ...ory_incibe_advisory_paginate_pagination.py | 6 +- ...rray_advisory_intel_paginate_pagination.py | 6 +- ...ory_ip_intel_record_paginate_pagination.py | 6 +- ...isory_israeli_alert_paginate_pagination.py | 6 +- ...raeli_vulnerability_paginate_pagination.py | 6 +- ...rray_advisory_istio_paginate_pagination.py | 6 +- ...dvisory_itw_exploit_paginate_pagination.py | 6 +- ...ray_advisory_ivanti_paginate_pagination.py | 6 +- ...advisory_ivanti_rss_paginate_pagination.py | 6 +- ...ray_advisory_j_frog_paginate_pagination.py | 6 +- ...ay_advisory_jenkins_paginate_pagination.py | 6 +- ...advisory_jet_brains_paginate_pagination.py | 6 +- ...visory_jnj_advisory_paginate_pagination.py | 6 +- ...ry_johnson_controls_paginate_pagination.py | 6 +- ...ay_advisory_juniper_paginate_pagination.py | 6 +- ...y_jvn_advisory_item_paginate_pagination.py | 6 +- ..._array_advisory_jvn_paginate_pagination.py | 6 +- ...array_advisory_k8_s_paginate_pagination.py | 6 +- ...ky_icscert_advisory_paginate_pagination.py | 6 +- ...talog_vulnerability_paginate_pagination.py | 6 +- ...advisory_kore_logic_paginate_pagination.py | 6 +- ...ry_kr_cert_advisory_paginate_pagination.py | 6 +- ...ray_advisory_kunbus_paginate_pagination.py | 6 +- ..._advisory_lantronix_paginate_pagination.py | 6 +- ...ray_advisory_lenovo_paginate_pagination.py | 6 +- ...ry_lexmark_advisory_paginate_pagination.py | 6 +- ...a_array_advisory_lg_paginate_pagination.py | 6 +- ...visory_libre_office_paginate_pagination.py | 6 +- ...rray_advisory_linux_paginate_pagination.py | 6 +- ...y_advisory_lol_advs_paginate_pagination.py | 6 +- ...ay_advisory_m_files_paginate_pagination.py | 6 +- ...ay_advisory_ma_cert_paginate_pagination.py | 6 +- ...y_malicious_package_paginate_pagination.py | 6 +- ...age_engine_advisory_paginate_pagination.py | 6 +- ...y_advisory_mbed_tls_paginate_pagination.py | 6 +- ...ay_advisory_mc_afee_paginate_pagination.py | 6 +- ...y_advisory_mediatek_paginate_pagination.py | 6 +- ..._medtronic_advisory_paginate_pagination.py | 6 +- ...ray_advisory_mendix_paginate_pagination.py | 6 +- ...ory_meta_advisories_paginate_pagination.py | 6 +- ..._advisory_meta_data_paginate_pagination.py | 6 +- ..._metasploit_exploit_paginate_pagination.py | 6 +- ...sory_microsoft_csaf_paginate_pagination.py | 6 +- ...sory_microsoft_cvrf_paginate_pagination.py | 6 +- ...t_driver_block_list_paginate_pagination.py | 6 +- ...visory_microsoft_kb_paginate_pagination.py | 6 +- ...y_advisory_mikrotik_paginate_pagination.py | 6 +- ...ay_advisory_mindray_paginate_pagination.py | 6 +- ...advisory_misp_value_paginate_pagination.py | 6 +- ...rray_advisory_mitel_paginate_pagination.py | 6 +- ...y_mitre_cve_list_v5_paginate_pagination.py | 6 +- ...i_electric_advisory_paginate_pagination.py | 6 +- ...y_advisory_mongo_db_paginate_pagination.py | 6 +- ...isory_moxa_advisory_paginate_pagination.py | 6 +- ...ry_mozilla_advisory_paginate_pagination.py | 6 +- ...rray_advisory_naver_paginate_pagination.py | 6 +- ...array_advisory_ncsc_paginate_pagination.py | 6 +- ...ay_advisory_ncsccve_paginate_pagination.py | 6 +- ..._array_advisory_nec_paginate_pagination.py | 6 +- ...ray_advisory_nessus_paginate_pagination.py | 6 +- ...ay_advisory_net_app_paginate_pagination.py | 6 +- ...y_advisory_netatalk_paginate_pagination.py | 6 +- ...ay_advisory_netgate_paginate_pagination.py | 6 +- ...ay_advisory_netgear_paginate_pagination.py | 6 +- ...y_advisory_netskope_paginate_pagination.py | 6 +- ...ay_advisory_nexpose_paginate_pagination.py | 6 +- ...sory_nginx_advisory_paginate_pagination.py | 6 +- ..._array_advisory_nhs_paginate_pagination.py | 6 +- ...a_array_advisory_ni_paginate_pagination.py | 6 +- ...ay_advisory_node_js_paginate_pagination.py | 6 +- ...isory_node_security_paginate_pagination.py | 6 +- ...rray_advisory_nokia_paginate_pagination.py | 6 +- ..._note_pad_plus_plus_paginate_pagination.py | 6 +- ...ray_advisory_nozomi_paginate_pagination.py | 6 +- ..._array_advisory_ntp_paginate_pagination.py | 6 +- ...ray_advisory_nuclei_paginate_pagination.py | 6 +- ...visory_nvd20_source_paginate_pagination.py | 6 +- ...y_nvdcpe_dictionary_paginate_pagination.py | 6 +- ...dvisory_nz_advisory_paginate_pagination.py | 6 +- ...sory_octopus_deploy_paginate_pagination.py | 6 +- ...array_advisory_okta_paginate_pagination.py | 6 +- ...rray_advisory_omron_paginate_pagination.py | 6 +- ...rray_advisory_one_e_paginate_pagination.py | 6 +- ...y_advisory_open_bsd_paginate_pagination.py | 6 +- ..._advisory_open_cvdb_paginate_pagination.py | 6 +- ...y_advisory_open_jdk_paginate_pagination.py | 6 +- ...y_advisory_open_ssh_paginate_pagination.py | 6 +- ...ry_open_ssl_sec_adv_paginate_pagination.py | 6 +- ...advisory_open_stack_paginate_pagination.py | 6 +- ...y_advisory_opengear_paginate_pagination.py | 6 +- ...advisory_oracle_cpu_paginate_pagination.py | 6 +- ...sory_oracle_cpucsaf_paginate_pagination.py | 6 +- ..._array_advisory_osv_paginate_pagination.py | 6 +- ...array_advisory_otrs_paginate_pagination.py | 6 +- ..._advisory_own_cloud_paginate_pagination.py | 6 +- ...packetstorm_exploit_paginate_pagination.py | 6 +- ...y_advisory_palantir_paginate_pagination.py | 6 +- ..._palo_alto_advisory_paginate_pagination.py | 6 +- ..._advisory_panasonic_paginate_pagination.py | 6 +- ..._advisory_paper_cut_paginate_pagination.py | 6 +- ...array_advisory_pega_paginate_pagination.py | 6 +- ...ry_philips_advisory_paginate_pagination.py | 6 +- ...ix_contact_advisory_paginate_pagination.py | 6 +- ...dvisory_phpmy_admin_paginate_pagination.py | 6 +- ...ay_advisory_pk_cert_paginate_pagination.py | 6 +- ...visory_postgres_sql_paginate_pagination.py | 6 +- ..._advisory_power_dns_paginate_pagination.py | 6 +- ...y_advisory_progress_paginate_pagination.py | 6 +- ...advisory_proofpoint_paginate_pagination.py | 6 +- ..._array_advisory_ptc_paginate_pagination.py | 6 +- ...visory_pure_storage_paginate_pagination.py | 6 +- ...sory_py_pa_advisory_paginate_pagination.py | 6 +- ...isory_qnap_advisory_paginate_pagination.py | 6 +- ...array_advisory_qqid_paginate_pagination.py | 6 +- ..._array_advisory_qsb_paginate_pagination.py | 6 +- ...y_advisory_qualcomm_paginate_pagination.py | 6 +- ...ray_advisory_qualys_paginate_pagination.py | 6 +- ...advisory_qualys_qid_paginate_pagination.py | 6 +- ..._ransomware_exploit_paginate_pagination.py | 6 +- ...y_advisory_red_lion_paginate_pagination.py | 6 +- ...advisory_redhat_cve_paginate_pagination.py | 6 +- ...ay_advisory_renesas_paginate_pagination.py | 6 +- ...ray_advisory_revive_paginate_pagination.py | 6 +- ...y_advisory_rhel_cve_paginate_pagination.py | 6 +- ...rray_advisory_roche_paginate_pagination.py | 6 +- ...y_advisory_rockwell_paginate_pagination.py | 6 +- ...visory_rocky_errata_paginate_pagination.py | 6 +- ...rray_advisory_rsync_paginate_pagination.py | 6 +- ...ray_advisory_ruckus_paginate_pagination.py | 6 +- ...ry_rustsec_advisory_paginate_pagination.py | 6 +- ...dvisory_sa_advisory_paginate_pagination.py | 6 +- ...ray_advisory_safran_paginate_pagination.py | 6 +- ...isory_saint_exploit_paginate_pagination.py | 6 +- ...dvisory_sales_force_paginate_pagination.py | 6 +- ...rray_advisory_samba_paginate_pagination.py | 6 +- ...ay_advisory_sandisk_paginate_pagination.py | 6 +- ...visory_sans_dshield_paginate_pagination.py | 6 +- ..._array_advisory_sap_paginate_pagination.py | 6 +- ...r_electric_advisory_paginate_pagination.py | 6 +- ...advisory_schutzwerk_paginate_pagination.py | 6 +- ...dvisory_sec_consult_paginate_pagination.py | 6 +- ...y_security_bulletin_paginate_pagination.py | 6 +- ...visory_security_lab_paginate_pagination.py | 6 +- ...sory_seebug_exploit_paginate_pagination.py | 6 +- ..._array_advisory_sel_paginate_pagination.py | 6 +- ...visory_sentinel_one_paginate_pagination.py | 6 +- ...dvisory_service_now_paginate_pagination.py | 6 +- ..._advisory_seven_zip_paginate_pagination.py | 6 +- ...oited_vulnerability_paginate_pagination.py | 6 +- ...y_advisory_shielder_paginate_pagination.py | 6 +- ...array_advisory_sick_paginate_pagination.py | 6 +- ...ry_siemens_advisory_paginate_pagination.py | 6 +- ...ory_sierra_wireless_paginate_pagination.py | 6 +- ...advisory_sigma_rule_paginate_pagination.py | 6 +- ..._advisory_sing_cert_paginate_pagination.py | 6 +- ...y_advisory_sitecore_paginate_pagination.py | 6 +- ..._advisory_slackware_paginate_pagination.py | 6 +- ...olar_winds_advisory_paginate_pagination.py | 6 +- ...array_advisory_solr_paginate_pagination.py | 6 +- ...y_advisory_sonatype_paginate_pagination.py | 6 +- ...sonic_wall_advisory_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ...ray_advisory_splunk_paginate_pagination.py | 6 +- ...ray_advisory_spring_paginate_pagination.py | 6 +- ...visory_ssd_advisory_paginate_pagination.py | 6 +- ...dvisory_stormshield_paginate_pagination.py | 6 +- ...ry_stryker_advisory_paginate_pagination.py | 6 +- ...array_advisory_sudo_paginate_pagination.py | 6 +- ...isory_suse_security_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ...ay_advisory_symfony_paginate_pagination.py | 6 +- ..._advisory_synacktiv_paginate_pagination.py | 6 +- ...dvisory_syncro_soft_paginate_pagination.py | 6 +- ...y_advisory_synology_paginate_pagination.py | 6 +- ...array_advisory_syss_paginate_pagination.py | 6 +- ..._advisory_tailscale_paginate_pagination.py | 6 +- ...sory_talos_advisory_paginate_pagination.py | 6 +- ...dvisory_team_viewer_paginate_pagination.py | 6 +- ...e_research_advisory_paginate_pagination.py | 6 +- ...ay_advisory_tencent_paginate_pagination.py | 6 +- ...ray_advisory_thales_paginate_pagination.py | 6 +- ...ry_the_missing_link_paginate_pagination.py | 6 +- ...isory_thermo_fisher_paginate_pagination.py | 6 +- ...th_external_objects_paginate_pagination.py | 6 +- ...a_array_advisory_ti_paginate_pagination.py | 6 +- ...rray_advisory_tibco_paginate_pagination.py | 6 +- ...ay_advisory_tp_link_paginate_pagination.py | 6 +- ...ry_trane_technology_paginate_pagination.py | 6 +- ...dvisory_trend_micro_paginate_pagination.py | 6 +- ..._advisory_trustwave_paginate_pagination.py | 6 +- ...ry_tw_cert_advisory_paginate_pagination.py | 6 +- ...y_advisory_ubiquiti_paginate_pagination.py | 6 +- ...advisory_ubuntu_cve_paginate_pagination.py | 6 +- ...rray_advisory_unify_paginate_pagination.py | 6 +- ...ray_advisory_unisoc_paginate_pagination.py | 6 +- ...ray_advisory_update_paginate_pagination.py | 6 +- ..._array_advisory_usd_paginate_pagination.py | 6 +- ...isory_usom_advisory_paginate_pagination.py | 6 +- ...y_advisory_van_dyke_paginate_pagination.py | 6 +- ...vapid_labs_advisory_paginate_pagination.py | 6 +- ..._vc_vulnerable_cpes_paginate_pagination.py | 6 +- ...ry_vccpe_dictionary_paginate_pagination.py | 6 +- ...visory_vde_advisory_paginate_pagination.py | 6 +- ...rray_advisory_veeam_paginate_pagination.py | 6 +- ...ay_advisory_veritas_paginate_pagination.py | 6 +- ..._advisory_virtuozzo_paginate_pagination.py | 6 +- ..._array_advisory_vlc_paginate_pagination.py | 6 +- ...ry_vm_ware_advisory_paginate_pagination.py | 6 +- ...y_advisory_void_sec_paginate_pagination.py | 6 +- ...y_vuln_check_config_paginate_pagination.py | 6 +- ...n_check_cve_list_v5_paginate_pagination.py | 6 +- ...sory_vuln_check_kev_paginate_pagination.py | 6 +- ...advisory_vuln_check_paginate_pagination.py | 6 +- ...able_debian_package_paginate_pagination.py | 6 +- ...visory_vulnrichment_paginate_pagination.py | 6 +- ...ory_vyaire_advisory_paginate_pagination.py | 6 +- ...dvisory_watch_guard_paginate_pagination.py | 6 +- ..._advisory_whats_app_paginate_pagination.py | 6 +- ...array_advisory_wibu_paginate_pagination.py | 6 +- ..._advisory_wireshark_paginate_pagination.py | 6 +- ...dvisory_with_secure_paginate_pagination.py | 6 +- ...y_advisory_wolf_ssl_paginate_pagination.py | 6 +- ...rray_advisory_wolfi_paginate_pagination.py | 6 +- ..._advisory_wordfence_paginate_pagination.py | 6 +- ..._array_advisory_wrt_paginate_pagination.py | 6 +- ..._array_advisory_xen_paginate_pagination.py | 6 +- ...rray_advisory_xerox_paginate_pagination.py | 6 +- ...ray_advisory_xiaomi_paginate_pagination.py | 6 +- ...rray_advisory_xylem_paginate_pagination.py | 6 +- ...ray_advisory_yamaha_paginate_pagination.py | 6 +- ...y_yokogawa_advisory_paginate_pagination.py | 6 +- ...ray_advisory_yubico_paginate_pagination.py | 6 +- ...rray_advisory_zebra_paginate_pagination.py | 6 +- ...y_zero_day_advisory_paginate_pagination.py | 6 +- ...ro_science_advisory_paginate_pagination.py | 6 +- ...ray_advisory_zimbra_paginate_pagination.py | 6 +- ...array_advisory_zoom_paginate_pagination.py | 6 +- ...ay_advisory_zscaler_paginate_pagination.py | 6 +- ...array_advisory_zuso_paginate_pagination.py | 6 +- ...rray_advisory_zyxel_paginate_pagination.py | 6 +- ..._cve_items_extended_paginate_pagination.py | 6 +- ...array_api_cve_items_paginate_pagination.py | 6 +- ...adata_array_api_cwe_paginate_pagination.py | 6 +- ...array_api_epss_data_paginate_pagination.py | 6 +- ...y_api_exploit_chain_paginate_pagination.py | 6 +- ...i_exploit_v3_result_paginate_pagination.py | 6 +- ..._exploits_changelog_paginate_pagination.py | 6 +- ..._api_initial_access_paginate_pagination.py | 6 +- ...mitre_attack_to_cve_paginate_pagination.py | 6 +- ...api_nvd20_cpe_match_paginate_pagination.py | 6 +- ..._nvd20_cve_extended_paginate_pagination.py | 6 +- ...array_api_nvd20_cve_paginate_pagination.py | 6 +- ...ray_api_oss_package_paginate_pagination.py | 6 +- ...ta_array_api_update_paginate_pagination.py | 6 +- ...i_vuln_check_canary_paginate_pagination.py | 6 +- ...vulnerability_alias_paginate_pagination.py | 6 +- ...purls_purl_response_paginate_pagination.py | 6 +- ..._string_v3controllers_response_metadata.py | 6 +- ..._v3controllers_backup_response_metadata.py | 6 +- ...ta_v3controllers_purl_response_metadata.py | 6 +- ...a_v3controllers_purls_response_metadata.py | 6 +- ...ry_updated.py => search_error_response.py} | 22 +- ...tionship.py => search_v4_advisory_meta.py} | 36 +- ....py => search_v4_advisory_return_value.py} | 38 +- .../models/search_v4_feed_item.py} | 20 +- .../search_v4_list_feed_return_value.py} | 32 +- .../v3controllers_backup_response_metadata.py | 6 +- .../v3controllers_purl_response_data.py | 6 +- .../v3controllers_purl_response_metadata.py | 8 +- .../v3controllers_purls_response_metadata.py | 6 +- .../models/v3controllers_response_metadata.py | 6 +- vulncheck_sdk/aio/rest.py | 4 +- vulncheck_sdk/api/__init__.py | 1 + vulncheck_sdk/api/advisory_api.py | 869 + vulncheck_sdk/api/endpoints_api.py | 170 +- vulncheck_sdk/api/indices_api.py | 28315 ++++++---------- vulncheck_sdk/api_client.py | 6 +- vulncheck_sdk/configuration.py | 16 +- vulncheck_sdk/exceptions.py | 4 +- vulncheck_sdk/models/__init__.py | 24 +- vulncheck_sdk/models/advisory_a10.py | 6 +- vulncheck_sdk/models/advisory_abb_advisory.py | 6 +- vulncheck_sdk/models/advisory_abbott.py | 6 +- vulncheck_sdk/models/advisory_absolute.py | 6 +- .../models/advisory_acknowledgement.py | 6 +- vulncheck_sdk/models/advisory_acronis.py | 6 +- .../models/advisory_adobe_advisory.py | 6 +- .../models/advisory_adobe_affected.py | 6 +- vulncheck_sdk/models/advisory_adobe_cve.py | 6 +- .../models/advisory_adobe_solution.py | 6 +- vulncheck_sdk/models/advisory_adp.py | 6 +- .../models/advisory_adp_container.py | 8 +- vulncheck_sdk/models/advisory_advantech.py | 6 +- vulncheck_sdk/models/advisory_advisory.py | 6 +- .../models/advisory_advisory_details.py | 24 +- .../models/advisory_advisory_record.py | 6 +- vulncheck_sdk/models/advisory_affected.py | 22 +- .../models/advisory_affected_chrome.py | 6 +- .../advisory_affected_debian_package.py | 6 +- .../advisory_affected_debian_release.py | 6 +- .../advisory_affected_debian_repository.py | 6 +- .../models/advisory_affected_file.py | 6 +- .../models/advisory_affected_product.py | 6 +- vulncheck_sdk/models/advisory_affected_rel.py | 6 +- .../advisory_affected_ubuntu_package.py | 6 +- vulncheck_sdk/models/advisory_aix.py | 6 +- .../models/advisory_aleph_research.py | 6 +- vulncheck_sdk/models/advisory_alibaba.py | 6 +- vulncheck_sdk/models/advisory_alma_date.py | 8 +- .../models/advisory_alma_linux_update.py | 6 +- .../models/advisory_alma_object_id.py | 6 +- vulncheck_sdk/models/advisory_alma_package.py | 6 +- .../models/advisory_alma_package_list.py | 6 +- .../models/advisory_alma_reference.py | 6 +- .../models/advisory_alpine_linux_sec_db.py | 6 +- .../advisory_alpine_linux_sec_db_package.py | 6 +- .../advisory_alpine_linux_security_fix.py | 6 +- .../advisory_amazon_affected_package.py | 6 +- vulncheck_sdk/models/advisory_amazon_cve.py | 6 +- vulncheck_sdk/models/advisory_amd.py | 6 +- vulncheck_sdk/models/advisory_ami.py | 6 +- .../models/advisory_anchore_nvd_override.py | 6 +- .../models/advisory_android_advisory.py | 6 +- .../models/advisory_android_affected.py | 6 +- .../models/advisory_android_event.py | 6 +- .../models/advisory_android_package.py | 6 +- .../models/advisory_android_range.py | 6 +- .../models/advisory_android_reference.py | 6 +- .../models/advisory_apache_active_mq.py | 6 +- .../models/advisory_apache_archiva.py | 6 +- vulncheck_sdk/models/advisory_apache_arrow.py | 6 +- vulncheck_sdk/models/advisory_apache_camel.py | 6 +- .../models/advisory_apache_commons.py | 6 +- .../models/advisory_apache_couch_db.py | 6 +- vulncheck_sdk/models/advisory_apache_flink.py | 6 +- .../models/advisory_apache_guacamole.py | 6 +- .../models/advisory_apache_hadoop.py | 6 +- vulncheck_sdk/models/advisory_apache_http.py | 6 +- .../models/advisory_apache_jsp_wiki.py | 6 +- vulncheck_sdk/models/advisory_apache_kafka.py | 6 +- .../advisory_apache_logging_services.py | 6 +- vulncheck_sdk/models/advisory_apache_ni_fi.py | 6 +- .../models/advisory_apache_of_biz.py | 6 +- .../models/advisory_apache_open_meetings.py | 6 +- .../models/advisory_apache_open_office.py | 6 +- .../models/advisory_apache_pulsar.py | 6 +- vulncheck_sdk/models/advisory_apache_shiro.py | 6 +- vulncheck_sdk/models/advisory_apache_spark.py | 6 +- .../models/advisory_apache_struts.py | 6 +- .../models/advisory_apache_subversion.py | 6 +- .../models/advisory_apache_superset.py | 6 +- .../models/advisory_apache_tomcat.py | 6 +- .../models/advisory_apache_zoo_keeper.py | 6 +- vulncheck_sdk/models/advisory_app_check.py | 6 +- vulncheck_sdk/models/advisory_appgate.py | 6 +- .../models/advisory_apple_advisory.py | 6 +- .../models/advisory_apple_component.py | 6 +- vulncheck_sdk/models/advisory_arch_issue.py | 6 +- vulncheck_sdk/models/advisory_arista.py | 6 +- vulncheck_sdk/models/advisory_aruba.py | 6 +- vulncheck_sdk/models/advisory_asrg.py | 6 +- vulncheck_sdk/models/advisory_asset_note.py | 6 +- vulncheck_sdk/models/advisory_asterisk.py | 6 +- vulncheck_sdk/models/advisory_astra.py | 6 +- vulncheck_sdk/models/advisory_asus.py | 6 +- .../models/advisory_atlassian_advisory.py | 6 +- .../models/advisory_atlassian_products.py | 6 +- .../models/advisory_atlassian_vuln.py | 6 +- vulncheck_sdk/models/advisory_atredis.py | 6 +- vulncheck_sdk/models/advisory_audiocodes.py | 6 +- vulncheck_sdk/models/advisory_aus_cert.py | 6 +- vulncheck_sdk/models/advisory_autodesk.py | 6 +- vulncheck_sdk/models/advisory_avaya.py | 6 +- .../models/advisory_aveva_advisory.py | 6 +- vulncheck_sdk/models/advisory_avidml_advs.py | 6 +- vulncheck_sdk/models/advisory_avigilon.py | 6 +- vulncheck_sdk/models/advisory_award.py | 6 +- vulncheck_sdk/models/advisory_aws.py | 6 +- vulncheck_sdk/models/advisory_axis.py | 6 +- vulncheck_sdk/models/advisory_azul.py | 6 +- .../models/advisory_b_braun_advisory.py | 6 +- vulncheck_sdk/models/advisory_bandr.py | 6 +- .../models/advisory_baxter_advisory.py | 6 +- vulncheck_sdk/models/advisory_bdu_advisory.py | 6 +- vulncheck_sdk/models/advisory_bdu_cvss.py | 6 +- vulncheck_sdk/models/advisory_bdu_cvss3.py | 6 +- .../models/advisory_bdu_environment.py | 6 +- vulncheck_sdk/models/advisory_bdu_soft.py | 6 +- vulncheck_sdk/models/advisory_bdu_types.py | 6 +- vulncheck_sdk/models/advisory_bdu_vector.py | 6 +- .../advisory_bdu_vulnerable_software.py | 6 +- vulncheck_sdk/models/advisory_bduos.py | 6 +- .../models/advisory_beckhoff_advisory.py | 6 +- .../models/advisory_beckman_coulter.py | 6 +- .../advisory_becton_dickinson_advisory.py | 6 +- .../models/advisory_belden_advisory.py | 6 +- vulncheck_sdk/models/advisory_beyond_trust.py | 6 +- vulncheck_sdk/models/advisory_binarly.py | 6 +- vulncheck_sdk/models/advisory_bit_defender.py | 6 +- vulncheck_sdk/models/advisory_black_berry.py | 6 +- vulncheck_sdk/models/advisory_bls.py | 6 +- .../models/advisory_bosch_advisory.py | 6 +- .../advisory_boston_scientific_advisory.py | 6 +- vulncheck_sdk/models/advisory_botnet.py | 6 +- vulncheck_sdk/models/advisory_bugzilla.py | 6 +- .../advisory_ca_cyber_centre_advisory.py | 6 +- .../models/advisory_canvas_exploit.py | 6 +- vulncheck_sdk/models/advisory_capec.py | 6 +- .../models/advisory_carestream_advisory.py | 6 +- vulncheck_sdk/models/advisory_carrier.py | 6 +- vulncheck_sdk/models/advisory_cbl_mariner.py | 6 +- .../models/advisory_centos_package.py | 6 +- vulncheck_sdk/models/advisory_cert_be.py | 6 +- .../models/advisory_cert_fr_advisory.py | 6 +- vulncheck_sdk/models/advisory_cert_in.py | 6 +- .../models/advisory_cert_ir_security_alert.py | 6 +- vulncheck_sdk/models/advisory_cert_se.py | 6 +- vulncheck_sdk/models/advisory_cert_ua.py | 6 +- .../models/advisory_certeu_advisory.py | 6 +- vulncheck_sdk/models/advisory_cesa.py | 6 +- vulncheck_sdk/models/advisory_chain_guard.py | 6 +- .../models/advisory_chain_guard_package.py | 6 +- .../models/advisory_chain_guard_sec_fix.py | 6 +- vulncheck_sdk/models/advisory_check_point.py | 6 +- vulncheck_sdk/models/advisory_chrome.py | 6 +- vulncheck_sdk/models/advisory_ciena.py | 6 +- vulncheck_sdk/models/advisory_cis_control.py | 6 +- vulncheck_sdk/models/advisory_cisa_alert.py | 6 +- .../models/advisory_cisa_csaf_adv.py | 6 +- .../models/advisory_cisco_advisory.py | 6 +- vulncheck_sdk/models/advisory_cisco_csaf.py | 13 +- .../models/advisory_cisco_known_good_value.py | 6 +- .../models/advisory_citrix_advisory.py | 6 +- .../models/advisory_claroty_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_cloud_bees.py | 6 +- .../models/advisory_cloud_vuln_db_advisory.py | 6 +- .../models/advisory_cnnvd_entry_json.py | 6 +- .../models/advisory_cnvd_bulletin.py | 8 +- vulncheck_sdk/models/advisory_cnvd_flaw.py | 6 +- .../models/advisory_codesys_advisory.py | 6 +- vulncheck_sdk/models/advisory_comm_vault.py | 6 +- .../models/advisory_comm_vault_cve_details.py | 6 +- .../advisory_comm_vault_impacted_product.py | 6 +- ...ory_comm_vault_impacted_product_details.py | 6 +- .../models/advisory_comm_vault_resolution.py | 6 +- .../advisory_comm_vault_resolution_details.py | 6 +- .../models/advisory_compass_security.py | 6 +- vulncheck_sdk/models/advisory_container_os.py | 6 +- .../models/advisory_core_impact_exploit.py | 6 +- vulncheck_sdk/models/advisory_correction.py | 6 +- vulncheck_sdk/models/advisory_cos_update.py | 6 +- vulncheck_sdk/models/advisory_cpe_match.py | 6 +- vulncheck_sdk/models/advisory_cpe_node.py | 6 +- vulncheck_sdk/models/advisory_credit.py | 6 +- vulncheck_sdk/models/advisory_crestron.py | 6 +- vulncheck_sdk/models/advisory_crowd_sec.py | 6 +- vulncheck_sdk/models/advisory_csaf.py | 10 +- vulncheck_sdk/models/advisory_csaf_note.py | 6 +- .../models/advisory_csaf_reference.py | 6 +- .../models/advisory_csaf_relationship.py | 6 +- vulncheck_sdk/models/advisory_csaf_score.py | 6 +- .../models/advisory_csaf_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_curl.py | 6 +- .../models/advisory_curl_affected.py | 6 +- vulncheck_sdk/models/advisory_curl_credit.py | 6 +- vulncheck_sdk/models/advisory_curl_cwe.py | 6 +- vulncheck_sdk/models/advisory_curl_range.py | 6 +- vulncheck_sdk/models/advisory_cve_detail.py | 6 +- .../models/advisory_cve_details_link.py | 6 +- .../models/advisory_cve_reference.py | 6 +- vulncheck_sdk/models/advisory_cvrf.py | 56 +- .../models/advisory_cvrf_reference.py | 90 - vulncheck_sdk/models/advisory_cvss.py | 6 +- vulncheck_sdk/models/advisory_cvsss_v23.py | 6 +- vulncheck_sdk/models/advisory_cvssv2.py | 6 +- vulncheck_sdk/models/advisory_cvssv3.py | 6 +- vulncheck_sdk/models/advisory_cvssv40.py | 6 +- .../models/advisory_cvssv40_threat.py | 6 +- vulncheck_sdk/models/advisory_cwe.py | 6 +- .../models/advisory_cwe_acceptance_level.py | 6 +- vulncheck_sdk/models/advisory_cwe_data.py | 6 +- vulncheck_sdk/models/advisory_cwes.py | 24 +- vulncheck_sdk/models/advisory_cycle.py | 41 +- vulncheck_sdk/models/advisory_d_link.py | 6 +- vulncheck_sdk/models/advisory_dahua.py | 6 +- .../models/advisory_dan_foss_cve_details.py | 6 +- vulncheck_sdk/models/advisory_danfoss.py | 6 +- vulncheck_sdk/models/advisory_dassault.py | 6 +- vulncheck_sdk/models/advisory_date_time.py | 88 - vulncheck_sdk/models/advisory_db_specific.py | 6 +- vulncheck_sdk/models/advisory_debian_cve.py | 6 +- .../advisory_debian_security_advisory.py | 6 +- vulncheck_sdk/models/advisory_dell.py | 6 +- vulncheck_sdk/models/advisory_dell_cve.py | 6 +- .../models/advisory_delta_advisory.py | 6 +- vulncheck_sdk/models/advisory_dfn_cert.py | 6 +- .../models/advisory_distro_package.py | 6 +- .../models/advisory_distro_version.py | 6 +- vulncheck_sdk/models/advisory_django.py | 6 +- vulncheck_sdk/models/advisory_dnn.py | 6 +- .../models/advisory_document_metadata.py | 8 +- .../models/advisory_document_publisher.py | 6 +- .../models/advisory_document_tracking.py | 106 - vulncheck_sdk/models/advisory_dot_cms.py | 6 +- .../models/advisory_dragos_advisory.py | 6 +- vulncheck_sdk/models/advisory_draytek.py | 6 +- vulncheck_sdk/models/advisory_drupal.py | 6 +- .../models/advisory_eaton_advisory.py | 6 +- vulncheck_sdk/models/advisory_eco_system.py | 6 +- vulncheck_sdk/models/advisory_elastic.py | 6 +- vulncheck_sdk/models/advisory_elspec.py | 6 +- .../models/advisory_emerging_threats_snort.py | 6 +- .../models/advisory_emerson_advisory.py | 6 +- vulncheck_sdk/models/advisory_end_of_life.py | 6 +- vulncheck_sdk/models/advisory_endress.py | 6 +- .../models/advisory_enisa_id_product.py | 6 +- .../models/advisory_enisa_id_vendor.py | 6 +- vulncheck_sdk/models/advisory_eol_alibaba.py | 6 +- .../models/advisory_eol_microsoft.py | 6 +- .../models/advisory_eol_release_data.py | 6 +- vulncheck_sdk/models/advisory_euvd.py | 6 +- vulncheck_sdk/models/advisory_event.py | 6 +- vulncheck_sdk/models/advisory_exodus_intel.py | 6 +- .../models/advisory_exploit_db_exploitv2.py | 6 +- .../models/advisory_external_references.py | 6 +- vulncheck_sdk/models/advisory_f5.py | 6 +- vulncheck_sdk/models/advisory_f_secure.py | 6 +- vulncheck_sdk/models/advisory_fanuc.py | 6 +- vulncheck_sdk/models/advisory_fastly.py | 6 +- vulncheck_sdk/models/advisory_festo.py | 6 +- vulncheck_sdk/models/advisory_file_cloud.py | 6 +- vulncheck_sdk/models/advisory_file_zilla.py | 6 +- vulncheck_sdk/models/advisory_fix_aff.py | 6 +- vulncheck_sdk/models/advisory_flag.py | 8 +- .../models/advisory_flatt_security.py | 6 +- vulncheck_sdk/models/advisory_forge_rock.py | 6 +- .../models/advisory_fortinet_advisory.py | 6 +- vulncheck_sdk/models/advisory_fortinet_ips.py | 6 +- vulncheck_sdk/models/advisory_foxit.py | 6 +- .../models/advisory_foxit_affected.py | 6 +- vulncheck_sdk/models/advisory_fresenius.py | 6 +- vulncheck_sdk/models/advisory_gallagher.py | 6 +- vulncheck_sdk/models/advisory_gcp.py | 6 +- vulncheck_sdk/models/advisory_ge_gas.py | 6 +- .../models/advisory_ge_healthcare_advisory.py | 6 +- vulncheck_sdk/models/advisory_gen.py | 6 +- vulncheck_sdk/models/advisory_genetec.py | 6 +- .../models/advisory_gh_advisory_json_lean.py | 6 +- vulncheck_sdk/models/advisory_gh_cvss.py | 6 +- .../models/advisory_gh_identifier.py | 6 +- vulncheck_sdk/models/advisory_gh_node.py | 6 +- vulncheck_sdk/models/advisory_gh_package.py | 6 +- vulncheck_sdk/models/advisory_gh_reference.py | 6 +- .../models/advisory_gh_vulnerabilities.py | 6 +- vulncheck_sdk/models/advisory_ghsa.py | 6 +- .../models/advisory_ghsa_affected.py | 6 +- .../models/advisory_ghsa_database_specific.py | 6 +- .../advisory_ghsa_eco_system_specific.py | 6 +- vulncheck_sdk/models/advisory_ghsa_event.py | 6 +- vulncheck_sdk/models/advisory_ghsa_package.py | 6 +- vulncheck_sdk/models/advisory_ghsa_range.py | 6 +- .../models/advisory_ghsa_reference.py | 6 +- .../models/advisory_ghsa_severity.py | 6 +- vulncheck_sdk/models/advisory_gigabyte.py | 6 +- .../models/advisory_git_hub_exploit.py | 6 +- .../models/advisory_git_lab_exploit.py | 6 +- .../models/advisory_gitee_exploit.py | 6 +- .../models/advisory_gitlab_advisory.py | 8 +- vulncheck_sdk/models/advisory_glibc.py | 6 +- .../models/advisory_gmo_cyber_security.py | 6 +- vulncheck_sdk/models/advisory_gnu_tls.py | 6 +- vulncheck_sdk/models/advisory_go_credits.py | 6 +- vulncheck_sdk/models/advisory_go_event.py | 6 +- .../models/advisory_go_vuln_affected.py | 6 +- .../advisory_go_vuln_database_specific.py | 6 +- .../advisory_go_vuln_ecosystem_specific.py | 6 +- .../models/advisory_go_vuln_import.py | 6 +- vulncheck_sdk/models/advisory_go_vuln_json.py | 6 +- .../models/advisory_go_vuln_package.py | 6 +- .../models/advisory_go_vuln_ranges.py | 6 +- .../models/advisory_go_vuln_reference.py | 6 +- vulncheck_sdk/models/advisory_grafana.py | 6 +- .../models/advisory_grey_noise_detection.py | 6 +- .../models/advisory_grey_noise_tags.py | 6 +- vulncheck_sdk/models/advisory_hacktivity.py | 6 +- .../models/advisory_hardware_update.py | 6 +- vulncheck_sdk/models/advisory_harmony_os.py | 6 +- vulncheck_sdk/models/advisory_hashi_corp.py | 6 +- .../models/advisory_haskell_affected.py | 6 +- .../models/advisory_haskell_sadb_advisory.py | 6 +- .../models/advisory_haskell_version.py | 6 +- vulncheck_sdk/models/advisory_hcl.py | 6 +- vulncheck_sdk/models/advisory_hik_vision.py | 6 +- .../models/advisory_hillrom_advisory.py | 6 +- vulncheck_sdk/models/advisory_hitachi.py | 6 +- .../models/advisory_hitachi_energy.py | 6 +- vulncheck_sdk/models/advisory_hk_cert.py | 6 +- vulncheck_sdk/models/advisory_hms.py | 6 +- vulncheck_sdk/models/advisory_honeywell.py | 6 +- vulncheck_sdk/models/advisory_hp.py | 6 +- vulncheck_sdk/models/advisory_hpe.py | 6 +- vulncheck_sdk/models/advisory_huawei.py | 6 +- .../models/advisory_huawei_euler_os.py | 6 +- vulncheck_sdk/models/advisory_huawei_ips.py | 6 +- vulncheck_sdk/models/advisory_i_val.py | 6 +- vulncheck_sdk/models/advisory_iava.py | 6 +- vulncheck_sdk/models/advisory_ibm.py | 6 +- vulncheck_sdk/models/advisory_idemia.py | 6 +- vulncheck_sdk/models/advisory_igel.py | 6 +- vulncheck_sdk/models/advisory_impact.py | 6 +- .../models/advisory_incibe_advisory.py | 6 +- vulncheck_sdk/models/advisory_intel.py | 6 +- .../models/advisory_ip_intel_record.py | 6 +- .../models/advisory_israeli_alert.py | 6 +- .../models/advisory_israeli_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_issued.py | 88 - vulncheck_sdk/models/advisory_istio.py | 6 +- vulncheck_sdk/models/advisory_itw.py | 6 +- vulncheck_sdk/models/advisory_itw_exploit.py | 6 +- vulncheck_sdk/models/advisory_ivanti.py | 6 +- vulncheck_sdk/models/advisory_ivanti_rss.py | 6 +- vulncheck_sdk/models/advisory_j_frog.py | 6 +- vulncheck_sdk/models/advisory_jenkins.py | 6 +- vulncheck_sdk/models/advisory_jet_brains.py | 6 +- vulncheck_sdk/models/advisory_jnj_advisory.py | 6 +- .../models/advisory_johnson_controls.py | 6 +- vulncheck_sdk/models/advisory_juniper.py | 6 +- vulncheck_sdk/models/advisory_jvn.py | 6 +- .../models/advisory_jvn_advisory_item.py | 6 +- .../models/advisory_jvn_reference.py | 6 +- vulncheck_sdk/models/advisory_jvncpe.py | 6 +- vulncheck_sdk/models/advisory_k8_s.py | 6 +- .../advisory_kaspersky_icscert_advisory.py | 6 +- vulncheck_sdk/models/advisory_kb.py | 6 +- .../models/advisory_kb_threat_description.py | 6 +- .../advisory_kev_catalog_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_kore_logic.py | 6 +- .../models/advisory_kr_cert_advisory.py | 6 +- vulncheck_sdk/models/advisory_kunbus.py | 6 +- vulncheck_sdk/models/advisory_lantronix.py | 6 +- vulncheck_sdk/models/advisory_lenovo.py | 6 +- .../models/advisory_lexmark_advisory.py | 6 +- vulncheck_sdk/models/advisory_lg.py | 6 +- vulncheck_sdk/models/advisory_libre_office.py | 6 +- vulncheck_sdk/models/advisory_linux.py | 6 +- vulncheck_sdk/models/advisory_log_source.py | 6 +- vulncheck_sdk/models/advisory_lol_advs.py | 8 +- vulncheck_sdk/models/advisory_m_affected.py | 6 +- vulncheck_sdk/models/advisory_m_branch.py | 6 +- vulncheck_sdk/models/advisory_m_cna.py | 6 +- vulncheck_sdk/models/advisory_m_containers.py | 6 +- .../models/advisory_m_cve_metadata.py | 6 +- vulncheck_sdk/models/advisory_m_cvss_v20.py | 6 +- vulncheck_sdk/models/advisory_m_cvss_v30.py | 6 +- vulncheck_sdk/models/advisory_m_cvss_v31.py | 6 +- vulncheck_sdk/models/advisory_m_cvss_v40.py | 6 +- .../models/advisory_m_descriptions.py | 6 +- .../models/advisory_m_document_tracking.py | 6 +- vulncheck_sdk/models/advisory_m_files.py | 6 +- .../models/advisory_m_full_product_name.py | 6 +- .../models/advisory_m_identification.py | 6 +- vulncheck_sdk/models/advisory_m_item.py | 6 +- vulncheck_sdk/models/advisory_m_nodes.py | 6 +- .../models/advisory_m_problem_types.py | 6 +- .../models/advisory_m_product_status.py | 6 +- .../models/advisory_m_product_tree.py | 6 +- .../models/advisory_m_provider_metadata.py | 6 +- vulncheck_sdk/models/advisory_m_reference.py | 6 +- .../models/advisory_m_remediation.py | 8 +- vulncheck_sdk/models/advisory_m_version.py | 6 +- .../models/advisory_m_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_ma_cert.py | 6 +- .../models/advisory_malicious_package.py | 6 +- .../models/advisory_manage_engine.py | 6 +- .../models/advisory_manage_engine_advisory.py | 6 +- vulncheck_sdk/models/advisory_mbed_tls.py | 6 +- vulncheck_sdk/models/advisory_mc_afee.py | 6 +- .../models/advisory_mc_afee_score.py | 6 +- .../models/advisory_mcpe_applicability.py | 6 +- vulncheck_sdk/models/advisory_mcpe_match.py | 6 +- vulncheck_sdk/models/advisory_me_product.py | 6 +- vulncheck_sdk/models/advisory_mediatek.py | 6 +- .../models/advisory_medtronic_advisory.py | 6 +- vulncheck_sdk/models/advisory_mendix.py | 6 +- .../models/advisory_meta_advisories.py | 6 +- vulncheck_sdk/models/advisory_meta_data.py | 6 +- .../models/advisory_metasploit_exploit.py | 6 +- vulncheck_sdk/models/advisory_metric.py | 6 +- .../models/advisory_metric_scenario.py | 6 +- .../models/advisory_metrics_other.py | 6 +- .../models/advisory_microsoft_csaf.py | 6 +- .../models/advisory_microsoft_cvrf.py | 6 +- .../advisory_microsoft_driver_block_list.py | 8 +- .../advisory_microsoft_file_metadata.py | 6 +- vulncheck_sdk/models/advisory_microsoft_kb.py | 6 +- vulncheck_sdk/models/advisory_mikrotik.py | 6 +- vulncheck_sdk/models/advisory_mindray.py | 6 +- vulncheck_sdk/models/advisory_misp_meta.py | 6 +- .../models/advisory_misp_related_item.py | 6 +- vulncheck_sdk/models/advisory_misp_value.py | 6 +- .../models/advisory_misp_value_no_id.py | 6 +- vulncheck_sdk/models/advisory_mitel.py | 6 +- .../advisory_mitre_attack_group_no_id.py | 6 +- .../models/advisory_mitre_attack_ref.py | 6 +- .../advisory_mitre_attack_tech_with_refs.py | 6 +- .../models/advisory_mitre_attack_technique.py | 6 +- .../models/advisory_mitre_cve_list_v5.py | 6 +- .../models/advisory_mitre_cve_list_v5_ref.py | 6 +- .../models/advisory_mitre_group_cti.py | 6 +- .../advisory_mitsubishi_electric_advisory.py | 6 +- vulncheck_sdk/models/advisory_mongo_db.py | 6 +- .../models/advisory_moxa_advisory.py | 6 +- .../models/advisory_mozilla_advisory.py | 6 +- .../models/advisory_mozilla_component.py | 6 +- .../models/advisory_ms_document_title.py | 6 +- vulncheck_sdk/models/advisory_mscvrf.py | 6 +- vulncheck_sdk/models/advisory_naver.py | 6 +- vulncheck_sdk/models/advisory_ncsc.py | 6 +- vulncheck_sdk/models/advisory_ncsccve.py | 6 +- vulncheck_sdk/models/advisory_nec.py | 6 +- vulncheck_sdk/models/advisory_nessus.py | 6 +- vulncheck_sdk/models/advisory_net_app.py | 6 +- vulncheck_sdk/models/advisory_netatalk.py | 6 +- vulncheck_sdk/models/advisory_netgate.py | 6 +- vulncheck_sdk/models/advisory_netgear.py | 6 +- vulncheck_sdk/models/advisory_netskope.py | 6 +- vulncheck_sdk/models/advisory_nexpose.py | 6 +- .../models/advisory_nginx_advisory.py | 6 +- vulncheck_sdk/models/advisory_nhs.py | 6 +- vulncheck_sdk/models/advisory_ni.py | 6 +- vulncheck_sdk/models/advisory_nist_control.py | 6 +- vulncheck_sdk/models/advisory_node_author.py | 6 +- vulncheck_sdk/models/advisory_node_js.py | 6 +- .../models/advisory_node_security.py | 6 +- vulncheck_sdk/models/advisory_nokia.py | 6 +- vulncheck_sdk/models/advisory_note.py | 6 +- .../models/advisory_note_pad_plus_plus.py | 6 +- vulncheck_sdk/models/advisory_nozomi.py | 6 +- vulncheck_sdk/models/advisory_ntp.py | 6 +- vulncheck_sdk/models/advisory_nuclei.py | 6 +- .../models/advisory_nvd20_configuration.py | 6 +- .../models/advisory_nvd20_cvecpe_match.py | 6 +- vulncheck_sdk/models/advisory_nvd20_node.py | 6 +- vulncheck_sdk/models/advisory_nvd20_source.py | 6 +- .../models/advisory_nvdcpe_dictionary.py | 6 +- .../models/advisory_nvidia_revision.py | 8 +- vulncheck_sdk/models/advisory_nz_advisory.py | 6 +- vulncheck_sdk/models/advisory_o_curl.py | 6 +- .../models/advisory_octopus_deploy.py | 6 +- vulncheck_sdk/models/advisory_okta.py | 6 +- vulncheck_sdk/models/advisory_omron.py | 6 +- vulncheck_sdk/models/advisory_one_e.py | 6 +- vulncheck_sdk/models/advisory_open_bsd.py | 6 +- vulncheck_sdk/models/advisory_open_cvdb.py | 6 +- vulncheck_sdk/models/advisory_open_jdk.py | 6 +- vulncheck_sdk/models/advisory_open_jdkcve.py | 6 +- vulncheck_sdk/models/advisory_open_ssh.py | 6 +- .../models/advisory_open_ssl_sec_adv.py | 6 +- .../models/advisory_open_ssl_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_open_stack.py | 6 +- vulncheck_sdk/models/advisory_opengear.py | 6 +- vulncheck_sdk/models/advisory_oracle_cpu.py | 6 +- .../models/advisory_oracle_cpucsaf.py | 6 +- .../models/advisory_original_ghsa.py | 6 +- vulncheck_sdk/models/advisory_osv.py | 6 +- vulncheck_sdk/models/advisory_osv_obj.py | 6 +- vulncheck_sdk/models/advisory_osv_package.py | 6 +- .../models/advisory_osv_reference.py | 6 +- vulncheck_sdk/models/advisory_otrs.py | 6 +- vulncheck_sdk/models/advisory_oval_cve.py | 6 +- .../models/advisory_oval_reference.py | 6 +- vulncheck_sdk/models/advisory_override.py | 6 +- .../models/advisory_override_annotation.py | 6 +- .../models/advisory_override_configuration.py | 6 +- vulncheck_sdk/models/advisory_override_cve.py | 6 +- vulncheck_sdk/models/advisory_own_cloud.py | 6 +- vulncheck_sdk/models/advisory_package.py | 6 +- vulncheck_sdk/models/advisory_package_stat.py | 6 +- .../models/advisory_packetstorm_exploit.py | 6 +- vulncheck_sdk/models/advisory_palantir.py | 6 +- .../models/advisory_palo_alto_advisory.py | 6 +- vulncheck_sdk/models/advisory_panasonic.py | 6 +- vulncheck_sdk/models/advisory_paper_cut.py | 6 +- vulncheck_sdk/models/advisory_patch.py | 6 +- vulncheck_sdk/models/advisory_pega.py | 6 +- vulncheck_sdk/models/advisory_pg_fix.py | 6 +- .../models/advisory_philips_advisory.py | 6 +- .../advisory_phoenix_contact_advisory.py | 6 +- vulncheck_sdk/models/advisory_phpmy_admin.py | 6 +- vulncheck_sdk/models/advisory_pk_cert.py | 6 +- vulncheck_sdk/models/advisory_postgres_sql.py | 6 +- vulncheck_sdk/models/advisory_power_dns.py | 6 +- .../models/advisory_prime_version.py | 6 +- vulncheck_sdk/models/advisory_product.py | 10 +- .../models/advisory_product_branch.py | 6 +- .../advisory_product_specific_detail.py | 6 +- .../models/advisory_products_affected.py | 6 +- vulncheck_sdk/models/advisory_progress.py | 6 +- vulncheck_sdk/models/advisory_proofpoint.py | 6 +- vulncheck_sdk/models/advisory_ptc.py | 6 +- .../models/advisory_ptm_descriptions.py | 6 +- vulncheck_sdk/models/advisory_publisher.py | 6 +- vulncheck_sdk/models/advisory_pure_storage.py | 6 +- .../models/advisory_py_pa_advisory.py | 6 +- .../models/advisory_py_pa_affected.py | 6 +- vulncheck_sdk/models/advisory_py_pa_event.py | 6 +- .../models/advisory_py_pa_package.py | 6 +- vulncheck_sdk/models/advisory_py_pa_range.py | 6 +- .../models/advisory_py_pa_reference.py | 6 +- .../models/advisory_qnap_advisory.py | 6 +- vulncheck_sdk/models/advisory_qqid.py | 6 +- vulncheck_sdk/models/advisory_qsb.py | 6 +- vulncheck_sdk/models/advisory_qualcomm.py | 6 +- vulncheck_sdk/models/advisory_qualys.py | 6 +- vulncheck_sdk/models/advisory_qualys_qid.py | 6 +- .../models/advisory_r_description.py | 6 +- vulncheck_sdk/models/advisory_r_note.py | 6 +- vulncheck_sdk/models/advisory_r_revision.py | 8 +- vulncheck_sdk/models/advisory_r_score_set.py | 6 +- vulncheck_sdk/models/advisory_r_threat.py | 8 +- vulncheck_sdk/models/advisory_range.py | 6 +- .../models/advisory_ransomware_exploit.py | 6 +- vulncheck_sdk/models/advisory_record_type.py | 6 +- vulncheck_sdk/models/advisory_red_lion.py | 6 +- vulncheck_sdk/models/advisory_redhat_cve.py | 6 +- vulncheck_sdk/models/advisory_reference.py | 6 +- vulncheck_sdk/models/advisory_related_rule.py | 6 +- vulncheck_sdk/models/advisory_relationship.py | 92 - .../models/advisory_remediation_data.py | 8 +- vulncheck_sdk/models/advisory_renesas.py | 6 +- .../models/advisory_reported_exploit.py | 6 +- vulncheck_sdk/models/advisory_restart_data.py | 6 +- vulncheck_sdk/models/advisory_revision.py | 92 - .../models/advisory_revision_history.py | 8 +- vulncheck_sdk/models/advisory_revive.py | 6 +- vulncheck_sdk/models/advisory_rhel_cve.py | 6 +- vulncheck_sdk/models/advisory_roche.py | 6 +- vulncheck_sdk/models/advisory_roche_cve.py | 6 +- vulncheck_sdk/models/advisory_rockwell.py | 6 +- .../advisory_rockwell_affected_product.py | 6 +- .../models/advisory_rocky_advisory.py | 8 +- vulncheck_sdk/models/advisory_rocky_cve.py | 6 +- vulncheck_sdk/models/advisory_rocky_errata.py | 6 +- vulncheck_sdk/models/advisory_rocky_fix.py | 6 +- .../models/advisory_rocky_package.py | 6 +- .../models/advisory_rocky_version.py | 6 +- vulncheck_sdk/models/advisory_rsync.py | 6 +- vulncheck_sdk/models/advisory_ruckus.py | 6 +- .../models/advisory_rustsec_advisory.py | 6 +- .../models/advisory_rustsec_affected.py | 6 +- .../advisory_rustsec_front_matter_advisory.py | 8 +- .../advisory_rustsec_front_matter_versions.py | 6 +- vulncheck_sdk/models/advisory_sa_advisory.py | 6 +- vulncheck_sdk/models/advisory_safran.py | 6 +- .../models/advisory_saint_exploit.py | 6 +- vulncheck_sdk/models/advisory_sales_force.py | 6 +- vulncheck_sdk/models/advisory_samba.py | 6 +- vulncheck_sdk/models/advisory_sandisk.py | 6 +- vulncheck_sdk/models/advisory_sans_dshield.py | 6 +- vulncheck_sdk/models/advisory_sap.py | 6 +- .../models/advisory_schneider_cve.py | 6 +- .../advisory_schneider_electric_advisory.py | 6 +- vulncheck_sdk/models/advisory_schutzwerk.py | 6 +- vulncheck_sdk/models/advisory_score_set.py | 90 - vulncheck_sdk/models/advisory_sec_consult.py | 6 +- vulncheck_sdk/models/advisory_sec_fix.py | 6 +- .../models/advisory_security_bulletin.py | 6 +- vulncheck_sdk/models/advisory_security_lab.py | 6 +- .../models/advisory_seebug_exploit.py | 6 +- vulncheck_sdk/models/advisory_sel.py | 6 +- vulncheck_sdk/models/advisory_sentinel_one.py | 6 +- vulncheck_sdk/models/advisory_service_now.py | 6 +- vulncheck_sdk/models/advisory_seven_zip.py | 6 +- vulncheck_sdk/models/advisory_severity.py | 6 +- ...y_shadow_server_exploited_vulnerability.py | 6 +- vulncheck_sdk/models/advisory_shielder.py | 6 +- vulncheck_sdk/models/advisory_sick.py | 6 +- .../advisory_siemens_acknowledgments.py | 6 +- .../models/advisory_siemens_advisory.py | 6 +- .../models/advisory_siemens_branch.py | 6 +- .../models/advisory_siemens_cvssv3.py | 6 +- vulncheck_sdk/models/advisory_siemens_cwe.py | 6 +- .../models/advisory_siemens_distribution.py | 6 +- .../models/advisory_siemens_document.py | 6 +- .../models/advisory_siemens_engine.py | 6 +- .../models/advisory_siemens_generator.py | 6 +- .../models/advisory_siemens_notes.py | 6 +- .../models/advisory_siemens_product.py | 6 +- ...y_siemens_product_identification_helper.py | 6 +- .../models/advisory_siemens_product_status.py | 6 +- .../models/advisory_siemens_product_tree.py | 6 +- .../models/advisory_siemens_publisher.py | 6 +- .../models/advisory_siemens_references.py | 6 +- .../models/advisory_siemens_remediation.py | 6 +- .../advisory_siemens_revision_history.py | 8 +- .../models/advisory_siemens_score.py | 6 +- .../models/advisory_siemens_sub_branch.py | 6 +- .../models/advisory_siemens_sub_sub_branch.py | 6 +- vulncheck_sdk/models/advisory_siemens_tlp.py | 6 +- .../models/advisory_siemens_tracking.py | 6 +- .../models/advisory_siemens_vulnerability.py | 6 +- .../models/advisory_sierra_wireless.py | 6 +- vulncheck_sdk/models/advisory_sigma_rule.py | 6 +- .../models/advisory_sigma_rule_rule.py | 8 +- vulncheck_sdk/models/advisory_sing_cert.py | 6 +- vulncheck_sdk/models/advisory_sitecore.py | 6 +- vulncheck_sdk/models/advisory_slackware.py | 6 +- .../models/advisory_software_update.py | 6 +- .../models/advisory_solar_winds_advisory.py | 6 +- vulncheck_sdk/models/advisory_solr.py | 6 +- vulncheck_sdk/models/advisory_sonatype.py | 6 +- .../models/advisory_sonic_wall_advisory.py | 6 +- .../advisory_spacelabs_healthcare_advisory.py | 6 +- vulncheck_sdk/models/advisory_splunk.py | 6 +- .../models/advisory_splunk_product.py | 6 +- vulncheck_sdk/models/advisory_spring.py | 6 +- vulncheck_sdk/models/advisory_ssa_source.py | 6 +- vulncheck_sdk/models/advisory_ssd_advisory.py | 6 +- vulncheck_sdk/models/advisory_status.py | 90 - vulncheck_sdk/models/advisory_stormshield.py | 6 +- .../models/advisory_stryker_advisory.py | 6 +- vulncheck_sdk/models/advisory_sudo.py | 6 +- .../models/advisory_suse_security.py | 6 +- .../advisory_swisslog_healthcare_advisory.py | 6 +- vulncheck_sdk/models/advisory_symfony.py | 6 +- vulncheck_sdk/models/advisory_synacktiv.py | 6 +- vulncheck_sdk/models/advisory_syncro_soft.py | 6 +- vulncheck_sdk/models/advisory_synology.py | 6 +- vulncheck_sdk/models/advisory_syss.py | 6 +- vulncheck_sdk/models/advisory_tailscale.py | 6 +- .../models/advisory_talos_advisory.py | 6 +- vulncheck_sdk/models/advisory_team_viewer.py | 6 +- .../advisory_tenable_research_advisory.py | 6 +- vulncheck_sdk/models/advisory_tencent.py | 6 +- vulncheck_sdk/models/advisory_thales.py | 6 +- .../models/advisory_the_missing_link.py | 6 +- .../models/advisory_thermo_fisher.py | 6 +- vulncheck_sdk/models/advisory_threat.py | 90 - ...sory_threat_actor_with_external_objects.py | 6 +- vulncheck_sdk/models/advisory_threat_data.py | 6 +- vulncheck_sdk/models/advisory_ti.py | 6 +- vulncheck_sdk/models/advisory_tibco.py | 6 +- vulncheck_sdk/models/advisory_timeline.py | 6 +- vulncheck_sdk/models/advisory_tool.py | 6 +- vulncheck_sdk/models/advisory_tool_ref.py | 6 +- vulncheck_sdk/models/advisory_tp_link.py | 6 +- vulncheck_sdk/models/advisory_tracking.py | 6 +- vulncheck_sdk/models/advisory_tracking_id.py | 6 +- .../models/advisory_trane_technology.py | 6 +- vulncheck_sdk/models/advisory_trend_micro.py | 6 +- vulncheck_sdk/models/advisory_triage_notes.py | 6 +- vulncheck_sdk/models/advisory_trustwave.py | 6 +- .../models/advisory_tw_cert_advisory.py | 6 +- vulncheck_sdk/models/advisory_ubiquiti.py | 6 +- vulncheck_sdk/models/advisory_ubuntu_cve.py | 6 +- .../advisory_ubuntu_package_release_status.py | 6 +- vulncheck_sdk/models/advisory_unify.py | 6 +- vulncheck_sdk/models/advisory_unisoc.py | 6 +- vulncheck_sdk/models/advisory_update.py | 21 +- vulncheck_sdk/models/advisory_updated.py | 88 - vulncheck_sdk/models/advisory_usd.py | 6 +- .../models/advisory_usom_advisory.py | 6 +- .../models/advisory_v3_acceptance_level.py | 6 +- vulncheck_sdk/models/advisory_van_dyke.py | 6 +- .../models/advisory_vapid_labs_advisory.py | 6 +- .../models/advisory_vc_vulnerable_cpes.py | 6 +- .../models/advisory_vccpe_dictionary.py | 6 +- vulncheck_sdk/models/advisory_vde_advisory.py | 6 +- vulncheck_sdk/models/advisory_veeam.py | 6 +- .../advisory_vendor_name_for_threat_actor.py | 6 +- .../models/advisory_vendor_product.py | 6 +- vulncheck_sdk/models/advisory_vendor_ref.py | 6 +- vulncheck_sdk/models/advisory_veritas.py | 6 +- vulncheck_sdk/models/advisory_virtuozzo.py | 6 +- vulncheck_sdk/models/advisory_vlc.py | 6 +- .../models/advisory_vm_ware_advisory.py | 6 +- vulncheck_sdk/models/advisory_void_sec.py | 6 +- vulncheck_sdk/models/advisory_vuln_check.py | 6 +- .../models/advisory_vuln_check_config.py | 6 +- .../models/advisory_vuln_check_cve_list_v5.py | 6 +- .../models/advisory_vuln_check_kev.py | 6 +- .../models/advisory_vuln_check_package.py | 6 +- .../models/advisory_vulnerability.py | 136 - .../advisory_vulnerable_debian_package.py | 6 +- .../models/advisory_vulnerable_product.py | 6 +- vulncheck_sdk/models/advisory_vulnrichment.py | 6 +- .../advisory_vulnrichment_containers.py | 6 +- .../models/advisory_vulnrichment_content.py | 6 +- .../models/advisory_vulnrichment_cve_ref.py | 6 +- .../models/advisory_vulnrichment_metric.py | 6 +- .../models/advisory_vulnrichment_option.py | 6 +- .../models/advisory_vulnrichment_other.py | 6 +- .../models/advisory_vyaire_advisory.py | 6 +- vulncheck_sdk/models/advisory_watch_guard.py | 6 +- vulncheck_sdk/models/advisory_whats_app.py | 6 +- vulncheck_sdk/models/advisory_wibu.py | 6 +- vulncheck_sdk/models/advisory_wireshark.py | 6 +- vulncheck_sdk/models/advisory_with_secure.py | 6 +- vulncheck_sdk/models/advisory_wolf_ssl.py | 6 +- vulncheck_sdk/models/advisory_wolfi.py | 6 +- .../models/advisory_wolfi_package.py | 6 +- .../models/advisory_wolfi_sec_fix.py | 6 +- vulncheck_sdk/models/advisory_wordfence.py | 6 +- vulncheck_sdk/models/advisory_wrt.py | 6 +- vulncheck_sdk/models/advisory_xdb.py | 6 +- vulncheck_sdk/models/advisory_xen.py | 6 +- vulncheck_sdk/models/advisory_xerox.py | 6 +- vulncheck_sdk/models/advisory_xiaomi.py | 6 +- vulncheck_sdk/models/advisory_xylem.py | 6 +- vulncheck_sdk/models/advisory_yamaha.py | 6 +- .../models/advisory_yokogawa_advisory.py | 6 +- vulncheck_sdk/models/advisory_yubico.py | 6 +- vulncheck_sdk/models/advisory_zdi.py | 6 +- vulncheck_sdk/models/advisory_zdi_product.py | 6 +- vulncheck_sdk/models/advisory_zdi_response.py | 6 +- .../models/advisory_zdi_response_vendor.py | 6 +- vulncheck_sdk/models/advisory_zdi_vendor.py | 6 +- vulncheck_sdk/models/advisory_zebra.py | 6 +- .../models/advisory_zero_day_advisory.py | 6 +- .../models/advisory_zero_science_advisory.py | 6 +- vulncheck_sdk/models/advisory_zimbra.py | 6 +- vulncheck_sdk/models/advisory_zoom.py | 6 +- vulncheck_sdk/models/advisory_zscaler.py | 6 +- vulncheck_sdk/models/advisory_zulu_version.py | 6 +- vulncheck_sdk/models/advisory_zuso.py | 6 +- vulncheck_sdk/models/advisory_zyxel.py | 6 +- vulncheck_sdk/models/api_base_metric_v2.py | 6 +- vulncheck_sdk/models/api_base_metric_v3.py | 6 +- .../models/api_categorization_extended.py | 6 +- .../models/api_client_fingerprints.py | 6 +- vulncheck_sdk/models/api_configurations.py | 6 +- vulncheck_sdk/models/api_cpe.py | 6 +- vulncheck_sdk/models/api_cpe_match.py | 6 +- vulncheck_sdk/models/api_cpe_name.py | 6 +- vulncheck_sdk/models/api_cve.py | 6 +- vulncheck_sdk/models/api_cve_data_meta.py | 6 +- .../models/api_cve_data_meta_extended.py | 6 +- vulncheck_sdk/models/api_cve_extended.py | 6 +- vulncheck_sdk/models/api_cve_items.py | 6 +- .../models/api_cve_items_extended.py | 6 +- vulncheck_sdk/models/api_cvssv2.py | 6 +- vulncheck_sdk/models/api_cvssv3.py | 6 +- vulncheck_sdk/models/api_cwe.py | 6 +- vulncheck_sdk/models/api_date_time.py | 88 - vulncheck_sdk/models/api_description.py | 6 +- vulncheck_sdk/models/api_description_data.py | 6 +- vulncheck_sdk/models/api_epss.py | 6 +- vulncheck_sdk/models/api_epss_data.py | 6 +- vulncheck_sdk/models/api_exploit_chain.py | 6 +- vulncheck_sdk/models/api_exploit_chain_cve.py | 6 +- vulncheck_sdk/models/api_exploit_v3_result.py | 8 +- vulncheck_sdk/models/api_exploits_change.py | 20 +- .../models/api_exploits_changelog.py | 6 +- vulncheck_sdk/models/api_exploits_trending.py | 6 +- vulncheck_sdk/models/api_exploits_v3_count.py | 6 +- .../models/api_exploits_v3_timeline.py | 6 +- vulncheck_sdk/models/api_http_details.py | 6 +- vulncheck_sdk/models/api_impact.py | 8 +- vulncheck_sdk/models/api_impact_extended.py | 6 +- vulncheck_sdk/models/api_initial_access.py | 6 +- .../models/api_initial_access_artifact.py | 6 +- vulncheck_sdk/models/api_mitre_attack_tech.py | 6 +- .../models/api_mitre_attack_to_cve.py | 6 +- .../models/api_mitre_d3fend_technique.py | 6 +- .../models/api_mitre_detection_tech.py | 6 +- .../api_mitre_mitigation2_d3fend_mapping.py | 6 +- .../models/api_mitre_mitigation_tech.py | 6 +- vulncheck_sdk/models/api_nodes.py | 6 +- .../models/api_normalized_exploit_v3_entry.py | 6 +- .../models/api_normalized_report_v3_entry.py | 6 +- vulncheck_sdk/models/api_nvd20_cpe_match.py | 6 +- vulncheck_sdk/models/api_nvd20_cpe_name.py | 6 +- vulncheck_sdk/models/api_nvd20_cve.py | 6 +- .../models/api_nvd20_cve_extended.py | 6 +- .../models/api_nvd20_cvss_data_v2.py | 6 +- .../models/api_nvd20_cvss_data_v3.py | 6 +- .../models/api_nvd20_cvss_metric_v2.py | 6 +- .../models/api_nvd20_cvss_metric_v3.py | 6 +- .../models/api_nvd20_cvss_metric_v40.py | 6 +- vulncheck_sdk/models/api_nvd20_description.py | 6 +- vulncheck_sdk/models/api_nvd20_metric.py | 6 +- .../models/api_nvd20_metric_extended.py | 6 +- vulncheck_sdk/models/api_nvd20_reference.py | 6 +- .../models/api_nvd20_reference_extended.py | 6 +- ...i_nvd20_temporal_associated_base_metric.py | 6 +- .../models/api_nvd20_temporal_cvssv2.py | 6 +- .../models/api_nvd20_temporal_cvssv3.py | 6 +- ...api_nvd20_threat_associated_base_metric.py | 6 +- .../models/api_nvd20_threat_cvssv40.py | 6 +- .../models/api_nvd20_vendor_comment.py | 6 +- vulncheck_sdk/models/api_nvd20_weakness.py | 6 +- .../api_nvd20_weakness_desc_extended.py | 6 +- .../models/api_nvd20_weakness_extended.py | 6 +- vulncheck_sdk/models/api_oss_package.py | 6 +- .../models/api_oss_package_artifacts.py | 6 +- .../models/api_oss_package_download_info.py | 6 +- .../models/api_oss_package_hash_info.py | 6 +- .../api_oss_package_research_attributes.py | 6 +- .../models/api_oss_package_vulnerability.py | 6 +- vulncheck_sdk/models/api_package.py | 6 +- vulncheck_sdk/models/api_problem_type.py | 6 +- vulncheck_sdk/models/api_problem_type_data.py | 6 +- .../models/api_problem_type_data_extended.py | 6 +- .../models/api_problem_type_description.py | 6 +- .../api_problem_type_description_extended.py | 6 +- .../models/api_problem_type_extended.py | 6 +- vulncheck_sdk/models/api_reference.py | 6 +- vulncheck_sdk/models/api_reference_data.py | 6 +- .../models/api_reference_data_extended.py | 6 +- vulncheck_sdk/models/api_references.py | 6 +- .../models/api_references_extended.py | 6 +- .../models/api_related_attack_pattern.py | 6 +- vulncheck_sdk/models/api_ssvc.py | 6 +- vulncheck_sdk/models/api_temporal_cvssv2.py | 6 +- vulncheck_sdk/models/api_temporal_cvssv3.py | 6 +- .../models/api_temporal_metric_v2.py | 6 +- .../models/api_temporal_metric_v3.py | 6 +- vulncheck_sdk/models/api_update.py | 21 +- vulncheck_sdk/models/api_vuln_check_canary.py | 6 +- .../models/api_vulnerability_alias.py | 6 +- vulncheck_sdk/models/models_entitlements.py | 6 +- vulncheck_sdk/models/paginate_match.py | 6 +- vulncheck_sdk/models/paginate_pagination.py | 6 +- vulncheck_sdk/models/paginate_param.py | 6 +- vulncheck_sdk/models/params_index_backup.py | 6 +- .../models/params_index_backup_list.py | 6 +- vulncheck_sdk/models/params_index_list.py | 6 +- .../models/purl_batch_vuln_finding.py | 8 +- vulncheck_sdk/models/purl_package_urljson.py | 6 +- vulncheck_sdk/models/purl_qualifier_json.py | 6 +- vulncheck_sdk/models/purls_purl_response.py | 10 +- vulncheck_sdk/models/purls_vulnerability.py | 6 +- ...response_array_params_index_backup_list.py | 6 +- ...render_response_array_params_index_list.py | 6 +- ..._array_advisory_a10_paginate_pagination.py | 6 +- ...visory_abb_advisory_paginate_pagination.py | 6 +- ...ray_advisory_abbott_paginate_pagination.py | 6 +- ...y_advisory_absolute_paginate_pagination.py | 6 +- ...ay_advisory_acronis_paginate_pagination.py | 6 +- ...sory_adobe_advisory_paginate_pagination.py | 6 +- ..._advisory_advantech_paginate_pagination.py | 6 +- ...y_advisory_advisory_paginate_pagination.py | 6 +- ...ory_advisory_record_paginate_pagination.py | 6 +- ..._array_advisory_aix_paginate_pagination.py | 6 +- ...sory_aleph_research_paginate_pagination.py | 6 +- ...ay_advisory_alibaba_paginate_pagination.py | 6 +- ...y_alma_linux_update_paginate_pagination.py | 6 +- ...alpine_linux_sec_db_paginate_pagination.py | 6 +- ...advisory_amazon_cve_paginate_pagination.py | 6 +- ..._array_advisory_amd_paginate_pagination.py | 6 +- ..._array_advisory_ami_paginate_pagination.py | 6 +- ...nchore_nvd_override_paginate_pagination.py | 6 +- ...ry_android_advisory_paginate_pagination.py | 6 +- ...ry_apache_active_mq_paginate_pagination.py | 6 +- ...sory_apache_archiva_paginate_pagination.py | 6 +- ...visory_apache_arrow_paginate_pagination.py | 6 +- ...visory_apache_camel_paginate_pagination.py | 6 +- ...sory_apache_commons_paginate_pagination.py | 6 +- ...ory_apache_couch_db_paginate_pagination.py | 6 +- ...visory_apache_flink_paginate_pagination.py | 6 +- ...ry_apache_guacamole_paginate_pagination.py | 6 +- ...isory_apache_hadoop_paginate_pagination.py | 6 +- ...dvisory_apache_http_paginate_pagination.py | 6 +- ...ory_apache_jsp_wiki_paginate_pagination.py | 6 +- ...visory_apache_kafka_paginate_pagination.py | 6 +- ...he_logging_services_paginate_pagination.py | 6 +- ...visory_apache_ni_fi_paginate_pagination.py | 6 +- ...isory_apache_of_biz_paginate_pagination.py | 6 +- ...pache_open_meetings_paginate_pagination.py | 6 +- ..._apache_open_office_paginate_pagination.py | 6 +- ...isory_apache_pulsar_paginate_pagination.py | 6 +- ...visory_apache_shiro_paginate_pagination.py | 6 +- ...visory_apache_spark_paginate_pagination.py | 6 +- ...isory_apache_struts_paginate_pagination.py | 6 +- ...y_apache_subversion_paginate_pagination.py | 6 +- ...ory_apache_superset_paginate_pagination.py | 6 +- ...isory_apache_tomcat_paginate_pagination.py | 6 +- ...y_apache_zoo_keeper_paginate_pagination.py | 6 +- ..._advisory_app_check_paginate_pagination.py | 6 +- ...ay_advisory_appgate_paginate_pagination.py | 6 +- ...sory_apple_advisory_paginate_pagination.py | 6 +- ...advisory_arch_issue_paginate_pagination.py | 6 +- ...ray_advisory_arista_paginate_pagination.py | 6 +- ...rray_advisory_aruba_paginate_pagination.py | 6 +- ...array_advisory_asrg_paginate_pagination.py | 6 +- ...advisory_asset_note_paginate_pagination.py | 6 +- ...y_advisory_asterisk_paginate_pagination.py | 6 +- ...rray_advisory_astra_paginate_pagination.py | 6 +- ...array_advisory_asus_paginate_pagination.py | 6 +- ..._atlassian_advisory_paginate_pagination.py | 6 +- ...sory_atlassian_vuln_paginate_pagination.py | 6 +- ...ay_advisory_atredis_paginate_pagination.py | 6 +- ...advisory_audiocodes_paginate_pagination.py | 6 +- ...y_advisory_aus_cert_paginate_pagination.py | 6 +- ...y_advisory_autodesk_paginate_pagination.py | 6 +- ...rray_advisory_avaya_paginate_pagination.py | 6 +- ...sory_aveva_advisory_paginate_pagination.py | 6 +- ...dvisory_avidml_advs_paginate_pagination.py | 6 +- ...y_advisory_avigilon_paginate_pagination.py | 6 +- ..._array_advisory_aws_paginate_pagination.py | 6 +- ...array_advisory_axis_paginate_pagination.py | 6 +- ...array_advisory_azul_paginate_pagination.py | 6 +- ...ry_b_braun_advisory_paginate_pagination.py | 6 +- ...rray_advisory_bandr_paginate_pagination.py | 6 +- ...ory_baxter_advisory_paginate_pagination.py | 6 +- ...visory_bdu_advisory_paginate_pagination.py | 6 +- ...y_beckhoff_advisory_paginate_pagination.py | 6 +- ...ory_beckman_coulter_paginate_pagination.py | 6 +- ..._dickinson_advisory_paginate_pagination.py | 6 +- ...ory_belden_advisory_paginate_pagination.py | 6 +- ...visory_beyond_trust_paginate_pagination.py | 6 +- ...ay_advisory_binarly_paginate_pagination.py | 6 +- ...visory_bit_defender_paginate_pagination.py | 6 +- ...dvisory_black_berry_paginate_pagination.py | 6 +- ..._array_advisory_bls_paginate_pagination.py | 6 +- ...sory_bosch_advisory_paginate_pagination.py | 6 +- ...scientific_advisory_paginate_pagination.py | 6 +- ...ray_advisory_botnet_paginate_pagination.py | 6 +- ...ber_centre_advisory_paginate_pagination.py | 6 +- ...sory_canvas_exploit_paginate_pagination.py | 6 +- ...carestream_advisory_paginate_pagination.py | 6 +- ...ay_advisory_carrier_paginate_pagination.py | 6 +- ...dvisory_cbl_mariner_paginate_pagination.py | 6 +- ...ay_advisory_cert_be_paginate_pagination.py | 6 +- ...ry_cert_fr_advisory_paginate_pagination.py | 6 +- ...ay_advisory_cert_in_paginate_pagination.py | 6 +- ...t_ir_security_alert_paginate_pagination.py | 6 +- ...ay_advisory_cert_se_paginate_pagination.py | 6 +- ...ay_advisory_cert_ua_paginate_pagination.py | 6 +- ...ory_certeu_advisory_paginate_pagination.py | 6 +- ...array_advisory_cesa_paginate_pagination.py | 6 +- ...dvisory_chain_guard_paginate_pagination.py | 6 +- ...dvisory_check_point_paginate_pagination.py | 6 +- ...ray_advisory_chrome_paginate_pagination.py | 6 +- ...rray_advisory_ciena_paginate_pagination.py | 6 +- ...advisory_cisa_alert_paginate_pagination.py | 6 +- ...isory_cisa_csaf_adv_paginate_pagination.py | 6 +- ...sory_cisco_advisory_paginate_pagination.py | 6 +- ...advisory_cisco_csaf_paginate_pagination.py | 6 +- ...co_known_good_value_paginate_pagination.py | 6 +- ...ory_citrix_advisory_paginate_pagination.py | 6 +- ...aroty_vulnerability_paginate_pagination.py | 6 +- ...advisory_cloud_bees_paginate_pagination.py | 6 +- ...ud_vuln_db_advisory_paginate_pagination.py | 6 +- ...ry_cnnvd_entry_json_paginate_pagination.py | 6 +- ...isory_cnvd_bulletin_paginate_pagination.py | 6 +- ..._advisory_cnvd_flaw_paginate_pagination.py | 6 +- ...ry_codesys_advisory_paginate_pagination.py | 6 +- ...advisory_comm_vault_paginate_pagination.py | 6 +- ...ry_compass_security_paginate_pagination.py | 6 +- ...visory_container_os_paginate_pagination.py | 6 +- ...core_impact_exploit_paginate_pagination.py | 6 +- ...y_advisory_crestron_paginate_pagination.py | 6 +- ..._advisory_crowd_sec_paginate_pagination.py | 6 +- ...array_advisory_curl_paginate_pagination.py | 6 +- ...array_advisory_cvrf_paginate_pagination.py | 6 +- ...ray_advisory_d_link_paginate_pagination.py | 6 +- ...rray_advisory_dahua_paginate_pagination.py | 6 +- ...ay_advisory_danfoss_paginate_pagination.py | 6 +- ...y_advisory_dassault_paginate_pagination.py | 6 +- ...n_security_advisory_paginate_pagination.py | 6 +- ...array_advisory_dell_paginate_pagination.py | 6 +- ...sory_delta_advisory_paginate_pagination.py | 6 +- ...y_advisory_dfn_cert_paginate_pagination.py | 6 +- ...sory_distro_package_paginate_pagination.py | 6 +- ...ray_advisory_django_paginate_pagination.py | 6 +- ..._array_advisory_dnn_paginate_pagination.py | 6 +- ...ay_advisory_dot_cms_paginate_pagination.py | 6 +- ...ory_dragos_advisory_paginate_pagination.py | 6 +- ...ay_advisory_draytek_paginate_pagination.py | 6 +- ...ray_advisory_drupal_paginate_pagination.py | 6 +- ...sory_eaton_advisory_paginate_pagination.py | 6 +- ...ay_advisory_elastic_paginate_pagination.py | 6 +- ...ray_advisory_elspec_paginate_pagination.py | 6 +- ...rging_threats_snort_paginate_pagination.py | 6 +- ...ry_emerson_advisory_paginate_pagination.py | 6 +- ...dvisory_end_of_life_paginate_pagination.py | 6 +- ...ay_advisory_endress_paginate_pagination.py | 6 +- ...dvisory_eol_alibaba_paginate_pagination.py | 6 +- ...isory_eol_microsoft_paginate_pagination.py | 6 +- ...ry_eol_release_data_paginate_pagination.py | 6 +- ...array_advisory_euvd_paginate_pagination.py | 6 +- ...visory_exodus_intel_paginate_pagination.py | 6 +- ...xploit_db_exploitv2_paginate_pagination.py | 6 +- ...a_array_advisory_f5_paginate_pagination.py | 6 +- ...y_advisory_f_secure_paginate_pagination.py | 6 +- ...rray_advisory_fanuc_paginate_pagination.py | 6 +- ...ray_advisory_fastly_paginate_pagination.py | 6 +- ...rray_advisory_festo_paginate_pagination.py | 6 +- ...advisory_file_cloud_paginate_pagination.py | 6 +- ...advisory_file_zilla_paginate_pagination.py | 6 +- ...sory_flatt_security_paginate_pagination.py | 6 +- ...advisory_forge_rock_paginate_pagination.py | 6 +- ...y_fortinet_advisory_paginate_pagination.py | 6 +- ...visory_fortinet_ips_paginate_pagination.py | 6 +- ...rray_advisory_foxit_paginate_pagination.py | 6 +- ..._advisory_fresenius_paginate_pagination.py | 6 +- ..._advisory_gallagher_paginate_pagination.py | 6 +- ..._array_advisory_gcp_paginate_pagination.py | 6 +- ...ray_advisory_ge_gas_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ..._array_advisory_gen_paginate_pagination.py | 6 +- ...ay_advisory_genetec_paginate_pagination.py | 6 +- ..._advisory_json_lean_paginate_pagination.py | 6 +- ...array_advisory_ghsa_paginate_pagination.py | 6 +- ...y_advisory_gigabyte_paginate_pagination.py | 6 +- ...ory_git_hub_exploit_paginate_pagination.py | 6 +- ...ory_git_lab_exploit_paginate_pagination.py | 6 +- ...isory_gitee_exploit_paginate_pagination.py | 6 +- ...ory_gitlab_advisory_paginate_pagination.py | 6 +- ...rray_advisory_glibc_paginate_pagination.py | 6 +- ..._gmo_cyber_security_paginate_pagination.py | 6 +- ...ay_advisory_gnu_tls_paginate_pagination.py | 6 +- ...visory_go_vuln_json_paginate_pagination.py | 6 +- ...ay_advisory_grafana_paginate_pagination.py | 6 +- ...rey_noise_detection_paginate_pagination.py | 6 +- ...advisory_hacktivity_paginate_pagination.py | 6 +- ...advisory_harmony_os_paginate_pagination.py | 6 +- ...advisory_hashi_corp_paginate_pagination.py | 6 +- ...skell_sadb_advisory_paginate_pagination.py | 6 +- ..._array_advisory_hcl_paginate_pagination.py | 6 +- ...advisory_hik_vision_paginate_pagination.py | 6 +- ...ry_hillrom_advisory_paginate_pagination.py | 6 +- ...sory_hitachi_energy_paginate_pagination.py | 6 +- ...ay_advisory_hitachi_paginate_pagination.py | 6 +- ...ay_advisory_hk_cert_paginate_pagination.py | 6 +- ..._array_advisory_hms_paginate_pagination.py | 6 +- ..._advisory_honeywell_paginate_pagination.py | 6 +- ...a_array_advisory_hp_paginate_pagination.py | 6 +- ..._array_advisory_hpe_paginate_pagination.py | 6 +- ...ory_huawei_euler_os_paginate_pagination.py | 6 +- ...advisory_huawei_ips_paginate_pagination.py | 6 +- ...ray_advisory_huawei_paginate_pagination.py | 6 +- ...array_advisory_iava_paginate_pagination.py | 6 +- ..._array_advisory_ibm_paginate_pagination.py | 6 +- ...ray_advisory_idemia_paginate_pagination.py | 6 +- ...array_advisory_igel_paginate_pagination.py | 6 +- ...ory_incibe_advisory_paginate_pagination.py | 6 +- ...rray_advisory_intel_paginate_pagination.py | 6 +- ...ory_ip_intel_record_paginate_pagination.py | 6 +- ...isory_israeli_alert_paginate_pagination.py | 6 +- ...raeli_vulnerability_paginate_pagination.py | 6 +- ...rray_advisory_istio_paginate_pagination.py | 6 +- ...dvisory_itw_exploit_paginate_pagination.py | 6 +- ...ray_advisory_ivanti_paginate_pagination.py | 6 +- ...advisory_ivanti_rss_paginate_pagination.py | 6 +- ...ray_advisory_j_frog_paginate_pagination.py | 6 +- ...ay_advisory_jenkins_paginate_pagination.py | 6 +- ...advisory_jet_brains_paginate_pagination.py | 6 +- ...visory_jnj_advisory_paginate_pagination.py | 6 +- ...ry_johnson_controls_paginate_pagination.py | 6 +- ...ay_advisory_juniper_paginate_pagination.py | 6 +- ...y_jvn_advisory_item_paginate_pagination.py | 6 +- ..._array_advisory_jvn_paginate_pagination.py | 6 +- ...array_advisory_k8_s_paginate_pagination.py | 6 +- ...ky_icscert_advisory_paginate_pagination.py | 6 +- ...talog_vulnerability_paginate_pagination.py | 6 +- ...advisory_kore_logic_paginate_pagination.py | 6 +- ...ry_kr_cert_advisory_paginate_pagination.py | 6 +- ...ray_advisory_kunbus_paginate_pagination.py | 6 +- ..._advisory_lantronix_paginate_pagination.py | 6 +- ...ray_advisory_lenovo_paginate_pagination.py | 6 +- ...ry_lexmark_advisory_paginate_pagination.py | 6 +- ...a_array_advisory_lg_paginate_pagination.py | 6 +- ...visory_libre_office_paginate_pagination.py | 6 +- ...rray_advisory_linux_paginate_pagination.py | 6 +- ...y_advisory_lol_advs_paginate_pagination.py | 6 +- ...ay_advisory_m_files_paginate_pagination.py | 6 +- ...ay_advisory_ma_cert_paginate_pagination.py | 6 +- ...y_malicious_package_paginate_pagination.py | 6 +- ...age_engine_advisory_paginate_pagination.py | 6 +- ...y_advisory_mbed_tls_paginate_pagination.py | 6 +- ...ay_advisory_mc_afee_paginate_pagination.py | 6 +- ...y_advisory_mediatek_paginate_pagination.py | 6 +- ..._medtronic_advisory_paginate_pagination.py | 6 +- ...ray_advisory_mendix_paginate_pagination.py | 6 +- ...ory_meta_advisories_paginate_pagination.py | 6 +- ..._advisory_meta_data_paginate_pagination.py | 6 +- ..._metasploit_exploit_paginate_pagination.py | 6 +- ...sory_microsoft_csaf_paginate_pagination.py | 6 +- ...sory_microsoft_cvrf_paginate_pagination.py | 6 +- ...t_driver_block_list_paginate_pagination.py | 6 +- ...visory_microsoft_kb_paginate_pagination.py | 6 +- ...y_advisory_mikrotik_paginate_pagination.py | 6 +- ...ay_advisory_mindray_paginate_pagination.py | 6 +- ...advisory_misp_value_paginate_pagination.py | 6 +- ...rray_advisory_mitel_paginate_pagination.py | 6 +- ...y_mitre_cve_list_v5_paginate_pagination.py | 6 +- ...i_electric_advisory_paginate_pagination.py | 6 +- ...y_advisory_mongo_db_paginate_pagination.py | 6 +- ...isory_moxa_advisory_paginate_pagination.py | 6 +- ...ry_mozilla_advisory_paginate_pagination.py | 6 +- ...rray_advisory_naver_paginate_pagination.py | 6 +- ...array_advisory_ncsc_paginate_pagination.py | 6 +- ...ay_advisory_ncsccve_paginate_pagination.py | 6 +- ..._array_advisory_nec_paginate_pagination.py | 6 +- ...ray_advisory_nessus_paginate_pagination.py | 6 +- ...ay_advisory_net_app_paginate_pagination.py | 6 +- ...y_advisory_netatalk_paginate_pagination.py | 6 +- ...ay_advisory_netgate_paginate_pagination.py | 6 +- ...ay_advisory_netgear_paginate_pagination.py | 6 +- ...y_advisory_netskope_paginate_pagination.py | 6 +- ...ay_advisory_nexpose_paginate_pagination.py | 6 +- ...sory_nginx_advisory_paginate_pagination.py | 6 +- ..._array_advisory_nhs_paginate_pagination.py | 6 +- ...a_array_advisory_ni_paginate_pagination.py | 6 +- ...ay_advisory_node_js_paginate_pagination.py | 6 +- ...isory_node_security_paginate_pagination.py | 6 +- ...rray_advisory_nokia_paginate_pagination.py | 6 +- ..._note_pad_plus_plus_paginate_pagination.py | 6 +- ...ray_advisory_nozomi_paginate_pagination.py | 6 +- ..._array_advisory_ntp_paginate_pagination.py | 6 +- ...ray_advisory_nuclei_paginate_pagination.py | 6 +- ...visory_nvd20_source_paginate_pagination.py | 6 +- ...y_nvdcpe_dictionary_paginate_pagination.py | 6 +- ...dvisory_nz_advisory_paginate_pagination.py | 6 +- ...sory_octopus_deploy_paginate_pagination.py | 6 +- ...array_advisory_okta_paginate_pagination.py | 6 +- ...rray_advisory_omron_paginate_pagination.py | 6 +- ...rray_advisory_one_e_paginate_pagination.py | 6 +- ...y_advisory_open_bsd_paginate_pagination.py | 6 +- ..._advisory_open_cvdb_paginate_pagination.py | 6 +- ...y_advisory_open_jdk_paginate_pagination.py | 6 +- ...y_advisory_open_ssh_paginate_pagination.py | 6 +- ...ry_open_ssl_sec_adv_paginate_pagination.py | 6 +- ...advisory_open_stack_paginate_pagination.py | 6 +- ...y_advisory_opengear_paginate_pagination.py | 6 +- ...advisory_oracle_cpu_paginate_pagination.py | 6 +- ...sory_oracle_cpucsaf_paginate_pagination.py | 6 +- ..._array_advisory_osv_paginate_pagination.py | 6 +- ...array_advisory_otrs_paginate_pagination.py | 6 +- ..._advisory_own_cloud_paginate_pagination.py | 6 +- ...packetstorm_exploit_paginate_pagination.py | 6 +- ...y_advisory_palantir_paginate_pagination.py | 6 +- ..._palo_alto_advisory_paginate_pagination.py | 6 +- ..._advisory_panasonic_paginate_pagination.py | 6 +- ..._advisory_paper_cut_paginate_pagination.py | 6 +- ...array_advisory_pega_paginate_pagination.py | 6 +- ...ry_philips_advisory_paginate_pagination.py | 6 +- ...ix_contact_advisory_paginate_pagination.py | 6 +- ...dvisory_phpmy_admin_paginate_pagination.py | 6 +- ...ay_advisory_pk_cert_paginate_pagination.py | 6 +- ...visory_postgres_sql_paginate_pagination.py | 6 +- ..._advisory_power_dns_paginate_pagination.py | 6 +- ...y_advisory_progress_paginate_pagination.py | 6 +- ...advisory_proofpoint_paginate_pagination.py | 6 +- ..._array_advisory_ptc_paginate_pagination.py | 6 +- ...visory_pure_storage_paginate_pagination.py | 6 +- ...sory_py_pa_advisory_paginate_pagination.py | 6 +- ...isory_qnap_advisory_paginate_pagination.py | 6 +- ...array_advisory_qqid_paginate_pagination.py | 6 +- ..._array_advisory_qsb_paginate_pagination.py | 6 +- ...y_advisory_qualcomm_paginate_pagination.py | 6 +- ...ray_advisory_qualys_paginate_pagination.py | 6 +- ...advisory_qualys_qid_paginate_pagination.py | 6 +- ..._ransomware_exploit_paginate_pagination.py | 6 +- ...y_advisory_red_lion_paginate_pagination.py | 6 +- ...advisory_redhat_cve_paginate_pagination.py | 6 +- ...ay_advisory_renesas_paginate_pagination.py | 6 +- ...ray_advisory_revive_paginate_pagination.py | 6 +- ...y_advisory_rhel_cve_paginate_pagination.py | 6 +- ...rray_advisory_roche_paginate_pagination.py | 6 +- ...y_advisory_rockwell_paginate_pagination.py | 6 +- ...visory_rocky_errata_paginate_pagination.py | 6 +- ...rray_advisory_rsync_paginate_pagination.py | 6 +- ...ray_advisory_ruckus_paginate_pagination.py | 6 +- ...ry_rustsec_advisory_paginate_pagination.py | 6 +- ...dvisory_sa_advisory_paginate_pagination.py | 6 +- ...ray_advisory_safran_paginate_pagination.py | 6 +- ...isory_saint_exploit_paginate_pagination.py | 6 +- ...dvisory_sales_force_paginate_pagination.py | 6 +- ...rray_advisory_samba_paginate_pagination.py | 6 +- ...ay_advisory_sandisk_paginate_pagination.py | 6 +- ...visory_sans_dshield_paginate_pagination.py | 6 +- ..._array_advisory_sap_paginate_pagination.py | 6 +- ...r_electric_advisory_paginate_pagination.py | 6 +- ...advisory_schutzwerk_paginate_pagination.py | 6 +- ...dvisory_sec_consult_paginate_pagination.py | 6 +- ...y_security_bulletin_paginate_pagination.py | 6 +- ...visory_security_lab_paginate_pagination.py | 6 +- ...sory_seebug_exploit_paginate_pagination.py | 6 +- ..._array_advisory_sel_paginate_pagination.py | 6 +- ...visory_sentinel_one_paginate_pagination.py | 6 +- ...dvisory_service_now_paginate_pagination.py | 6 +- ..._advisory_seven_zip_paginate_pagination.py | 6 +- ...oited_vulnerability_paginate_pagination.py | 6 +- ...y_advisory_shielder_paginate_pagination.py | 6 +- ...array_advisory_sick_paginate_pagination.py | 6 +- ...ry_siemens_advisory_paginate_pagination.py | 6 +- ...ory_sierra_wireless_paginate_pagination.py | 6 +- ...advisory_sigma_rule_paginate_pagination.py | 6 +- ..._advisory_sing_cert_paginate_pagination.py | 6 +- ...y_advisory_sitecore_paginate_pagination.py | 6 +- ..._advisory_slackware_paginate_pagination.py | 6 +- ...olar_winds_advisory_paginate_pagination.py | 6 +- ...array_advisory_solr_paginate_pagination.py | 6 +- ...y_advisory_sonatype_paginate_pagination.py | 6 +- ...sonic_wall_advisory_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ...ray_advisory_splunk_paginate_pagination.py | 6 +- ...ray_advisory_spring_paginate_pagination.py | 6 +- ...visory_ssd_advisory_paginate_pagination.py | 6 +- ...dvisory_stormshield_paginate_pagination.py | 6 +- ...ry_stryker_advisory_paginate_pagination.py | 6 +- ...array_advisory_sudo_paginate_pagination.py | 6 +- ...isory_suse_security_paginate_pagination.py | 6 +- ...healthcare_advisory_paginate_pagination.py | 6 +- ...ay_advisory_symfony_paginate_pagination.py | 6 +- ..._advisory_synacktiv_paginate_pagination.py | 6 +- ...dvisory_syncro_soft_paginate_pagination.py | 6 +- ...y_advisory_synology_paginate_pagination.py | 6 +- ...array_advisory_syss_paginate_pagination.py | 6 +- ..._advisory_tailscale_paginate_pagination.py | 6 +- ...sory_talos_advisory_paginate_pagination.py | 6 +- ...dvisory_team_viewer_paginate_pagination.py | 6 +- ...e_research_advisory_paginate_pagination.py | 6 +- ...ay_advisory_tencent_paginate_pagination.py | 6 +- ...ray_advisory_thales_paginate_pagination.py | 6 +- ...ry_the_missing_link_paginate_pagination.py | 6 +- ...isory_thermo_fisher_paginate_pagination.py | 6 +- ...th_external_objects_paginate_pagination.py | 6 +- ...a_array_advisory_ti_paginate_pagination.py | 6 +- ...rray_advisory_tibco_paginate_pagination.py | 6 +- ...ay_advisory_tp_link_paginate_pagination.py | 6 +- ...ry_trane_technology_paginate_pagination.py | 6 +- ...dvisory_trend_micro_paginate_pagination.py | 6 +- ..._advisory_trustwave_paginate_pagination.py | 6 +- ...ry_tw_cert_advisory_paginate_pagination.py | 6 +- ...y_advisory_ubiquiti_paginate_pagination.py | 6 +- ...advisory_ubuntu_cve_paginate_pagination.py | 6 +- ...rray_advisory_unify_paginate_pagination.py | 6 +- ...ray_advisory_unisoc_paginate_pagination.py | 6 +- ...ray_advisory_update_paginate_pagination.py | 6 +- ..._array_advisory_usd_paginate_pagination.py | 6 +- ...isory_usom_advisory_paginate_pagination.py | 6 +- ...y_advisory_van_dyke_paginate_pagination.py | 6 +- ...vapid_labs_advisory_paginate_pagination.py | 6 +- ..._vc_vulnerable_cpes_paginate_pagination.py | 6 +- ...ry_vccpe_dictionary_paginate_pagination.py | 6 +- ...visory_vde_advisory_paginate_pagination.py | 6 +- ...rray_advisory_veeam_paginate_pagination.py | 6 +- ...ay_advisory_veritas_paginate_pagination.py | 6 +- ..._advisory_virtuozzo_paginate_pagination.py | 6 +- ..._array_advisory_vlc_paginate_pagination.py | 6 +- ...ry_vm_ware_advisory_paginate_pagination.py | 6 +- ...y_advisory_void_sec_paginate_pagination.py | 6 +- ...y_vuln_check_config_paginate_pagination.py | 6 +- ...n_check_cve_list_v5_paginate_pagination.py | 6 +- ...sory_vuln_check_kev_paginate_pagination.py | 6 +- ...advisory_vuln_check_paginate_pagination.py | 6 +- ...able_debian_package_paginate_pagination.py | 6 +- ...visory_vulnrichment_paginate_pagination.py | 6 +- ...ory_vyaire_advisory_paginate_pagination.py | 6 +- ...dvisory_watch_guard_paginate_pagination.py | 6 +- ..._advisory_whats_app_paginate_pagination.py | 6 +- ...array_advisory_wibu_paginate_pagination.py | 6 +- ..._advisory_wireshark_paginate_pagination.py | 6 +- ...dvisory_with_secure_paginate_pagination.py | 6 +- ...y_advisory_wolf_ssl_paginate_pagination.py | 6 +- ...rray_advisory_wolfi_paginate_pagination.py | 6 +- ..._advisory_wordfence_paginate_pagination.py | 6 +- ..._array_advisory_wrt_paginate_pagination.py | 6 +- ..._array_advisory_xen_paginate_pagination.py | 6 +- ...rray_advisory_xerox_paginate_pagination.py | 6 +- ...ray_advisory_xiaomi_paginate_pagination.py | 6 +- ...rray_advisory_xylem_paginate_pagination.py | 6 +- ...ray_advisory_yamaha_paginate_pagination.py | 6 +- ...y_yokogawa_advisory_paginate_pagination.py | 6 +- ...ray_advisory_yubico_paginate_pagination.py | 6 +- ...rray_advisory_zebra_paginate_pagination.py | 6 +- ...y_zero_day_advisory_paginate_pagination.py | 6 +- ...ro_science_advisory_paginate_pagination.py | 6 +- ...ray_advisory_zimbra_paginate_pagination.py | 6 +- ...array_advisory_zoom_paginate_pagination.py | 6 +- ...ay_advisory_zscaler_paginate_pagination.py | 6 +- ...array_advisory_zuso_paginate_pagination.py | 6 +- ...rray_advisory_zyxel_paginate_pagination.py | 6 +- ..._cve_items_extended_paginate_pagination.py | 6 +- ...array_api_cve_items_paginate_pagination.py | 6 +- ...adata_array_api_cwe_paginate_pagination.py | 6 +- ...array_api_epss_data_paginate_pagination.py | 6 +- ...y_api_exploit_chain_paginate_pagination.py | 6 +- ...i_exploit_v3_result_paginate_pagination.py | 6 +- ..._exploits_changelog_paginate_pagination.py | 6 +- ..._api_initial_access_paginate_pagination.py | 6 +- ...mitre_attack_to_cve_paginate_pagination.py | 6 +- ...api_nvd20_cpe_match_paginate_pagination.py | 6 +- ..._nvd20_cve_extended_paginate_pagination.py | 6 +- ...array_api_nvd20_cve_paginate_pagination.py | 6 +- ...ray_api_oss_package_paginate_pagination.py | 6 +- ...ta_array_api_update_paginate_pagination.py | 6 +- ...i_vuln_check_canary_paginate_pagination.py | 6 +- ...vulnerability_alias_paginate_pagination.py | 6 +- ...purls_purl_response_paginate_pagination.py | 6 +- ..._string_v3controllers_response_metadata.py | 6 +- ..._v3controllers_backup_response_metadata.py | 6 +- ...ta_v3controllers_purl_response_metadata.py | 6 +- ...a_v3controllers_purls_response_metadata.py | 6 +- .../search_error_response.py} | 22 +- ...ent_note.py => search_v4_advisory_meta.py} | 36 +- .../search_v4_advisory_return_value.py} | 34 +- .../search_v4_feed_item.py} | 20 +- .../search_v4_list_feed_return_value.py} | 32 +- .../v3controllers_backup_response_metadata.py | 6 +- .../v3controllers_purl_response_data.py | 6 +- .../v3controllers_purl_response_metadata.py | 8 +- .../v3controllers_purls_response_metadata.py | 6 +- .../models/v3controllers_response_metadata.py | 6 +- vulncheck_sdk/rest.py | 4 +- 6674 files changed, 44973 insertions(+), 57425 deletions(-) create mode 100644 docs/AdvisoryApi.md delete mode 100644 docs/AdvisoryCVRFReference.md delete mode 100644 docs/AdvisoryDateTime.md delete mode 100644 docs/AdvisoryDocumentNote.md delete mode 100644 docs/AdvisoryDocumentTracking.md delete mode 100644 docs/AdvisoryIssued.md delete mode 100644 docs/AdvisoryProductTree.md delete mode 100644 docs/AdvisoryRelationship.md delete mode 100644 docs/AdvisoryRevision.md delete mode 100644 docs/AdvisoryScoreSet.md delete mode 100644 docs/AdvisoryStatus.md delete mode 100644 docs/AdvisoryThreat.md delete mode 100644 docs/AdvisoryUpdated.md delete mode 100644 docs/AdvisoryVulnerability.md delete mode 100644 docs/ApiDateTime.md create mode 100644 docs/SearchErrorResponse.md create mode 100644 docs/SearchV4AdvisoryMeta.md create mode 100644 docs/SearchV4AdvisoryReturnValue.md rename docs/{AdvisoryCWENode.md => SearchV4FeedItem.md} (50%) create mode 100644 docs/SearchV4ListFeedReturnValue.md create mode 100644 test/aio/test_advisory_api.py delete mode 100644 test/aio/test_advisory_cvrf_reference.py delete mode 100644 test/aio/test_advisory_date_time.py delete mode 100644 test/aio/test_advisory_document_note.py delete mode 100644 test/aio/test_advisory_document_tracking.py delete mode 100644 test/aio/test_advisory_issued.py delete mode 100644 test/aio/test_advisory_product_tree.py delete mode 100644 test/aio/test_advisory_relationship.py delete mode 100644 test/aio/test_advisory_revision.py delete mode 100644 test/aio/test_advisory_score_set.py delete mode 100644 test/aio/test_advisory_threat.py delete mode 100644 test/aio/test_advisory_updated.py delete mode 100644 test/aio/test_advisory_vulnerability.py delete mode 100644 test/aio/test_api_date_time.py rename test/{blocking/test_advisory_status.py => aio/test_search_error_response.py} (52%) create mode 100644 test/aio/test_search_v4_advisory_meta.py create mode 100644 test/aio/test_search_v4_advisory_return_value.py rename test/{blocking/test_advisory_cwe_node.py => aio/test_search_v4_feed_item.py} (56%) create mode 100644 test/aio/test_search_v4_list_feed_return_value.py create mode 100644 test/blocking/test_advisory_api.py delete mode 100644 test/blocking/test_advisory_cvrf_reference.py delete mode 100644 test/blocking/test_advisory_date_time.py delete mode 100644 test/blocking/test_advisory_document_note.py delete mode 100644 test/blocking/test_advisory_document_tracking.py delete mode 100644 test/blocking/test_advisory_issued.py delete mode 100644 test/blocking/test_advisory_product_tree.py delete mode 100644 test/blocking/test_advisory_relationship.py delete mode 100644 test/blocking/test_advisory_revision.py delete mode 100644 test/blocking/test_advisory_score_set.py delete mode 100644 test/blocking/test_advisory_threat.py delete mode 100644 test/blocking/test_advisory_updated.py delete mode 100644 test/blocking/test_advisory_vulnerability.py delete mode 100644 test/blocking/test_api_date_time.py rename test/{aio/test_advisory_status.py => blocking/test_search_error_response.py} (52%) create mode 100644 test/blocking/test_search_v4_advisory_meta.py create mode 100644 test/blocking/test_search_v4_advisory_return_value.py rename test/{aio/test_advisory_cwe_node.py => blocking/test_search_v4_feed_item.py} (56%) create mode 100644 test/blocking/test_search_v4_list_feed_return_value.py create mode 100644 vulncheck_sdk/aio/api/advisory_api.py delete mode 100644 vulncheck_sdk/aio/models/advisory_cvrf_reference.py delete mode 100644 vulncheck_sdk/aio/models/advisory_document_tracking.py delete mode 100644 vulncheck_sdk/aio/models/advisory_revision.py delete mode 100644 vulncheck_sdk/aio/models/advisory_score_set.py delete mode 100644 vulncheck_sdk/aio/models/advisory_status.py delete mode 100644 vulncheck_sdk/aio/models/advisory_threat.py delete mode 100644 vulncheck_sdk/aio/models/advisory_vulnerability.py delete mode 100644 vulncheck_sdk/aio/models/api_date_time.py rename vulncheck_sdk/aio/models/{advisory_updated.py => search_error_response.py} (77%) rename vulncheck_sdk/aio/models/{advisory_relationship.py => search_v4_advisory_meta.py} (66%) rename vulncheck_sdk/aio/models/{advisory_document_note.py => search_v4_advisory_return_value.py} (58%) rename vulncheck_sdk/{models/advisory_cwe_node.py => aio/models/search_v4_feed_item.py} (81%) rename vulncheck_sdk/{models/advisory_product_tree.py => aio/models/search_v4_list_feed_return_value.py} (69%) create mode 100644 vulncheck_sdk/api/advisory_api.py delete mode 100644 vulncheck_sdk/models/advisory_cvrf_reference.py delete mode 100644 vulncheck_sdk/models/advisory_date_time.py delete mode 100644 vulncheck_sdk/models/advisory_document_tracking.py delete mode 100644 vulncheck_sdk/models/advisory_issued.py delete mode 100644 vulncheck_sdk/models/advisory_relationship.py delete mode 100644 vulncheck_sdk/models/advisory_revision.py delete mode 100644 vulncheck_sdk/models/advisory_score_set.py delete mode 100644 vulncheck_sdk/models/advisory_status.py delete mode 100644 vulncheck_sdk/models/advisory_threat.py delete mode 100644 vulncheck_sdk/models/advisory_updated.py delete mode 100644 vulncheck_sdk/models/advisory_vulnerability.py delete mode 100644 vulncheck_sdk/models/api_date_time.py rename vulncheck_sdk/{aio/models/advisory_issued.py => models/search_error_response.py} (77%) rename vulncheck_sdk/models/{advisory_document_note.py => search_v4_advisory_meta.py} (66%) rename vulncheck_sdk/{aio/models/advisory_date_time.py => models/search_v4_advisory_return_value.py} (58%) rename vulncheck_sdk/{aio/models/advisory_cwe_node.py => models/search_v4_feed_item.py} (81%) rename vulncheck_sdk/{aio/models/advisory_product_tree.py => models/search_v4_list_feed_return_value.py} (69%) diff --git a/README.md b/README.md index 1f589ed2..1d30bb6b 100644 --- a/README.md +++ b/README.md @@ -46,17 +46,15 @@ pip install vulncheck-sdk ## Quickstart ```python +import urllib.request import vulncheck_sdk import os -import requests # First let's setup a few variables to help us -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] # Remember to store your token securely! # Now let's create a configuration object -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN # Pass that config object to our API client and now... @@ -81,11 +79,10 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: # Download a Backup index = "initial-access" api_response = endpoints_client.backup_index_get(index) - backup_url = requests.get(api_response.data[0].url) - file_path = f"{index}.zip" - with open(file_path, "wb") as file: - file.write(backup_url.content) + with urllib.request.urlopen(api_response.data[0].url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) ### IndicesApi has methods for each index indices_client = vulncheck_sdk.IndicesApi(api_client) @@ -106,11 +103,9 @@ import aiohttp import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN @@ -183,11 +178,9 @@ from vulncheck_sdk.models.v3controllers_purl_response_data import ( ) import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -213,11 +206,9 @@ from vulncheck_sdk.aio.models.v3controllers_purl_response_data import ( ) # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN @@ -261,11 +252,9 @@ Get all CPE's related to a CVE import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -288,11 +277,9 @@ import os import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN @@ -327,15 +314,13 @@ if __name__ == "__main__": Download the backup for an index ```python -import requests +import urllib.request import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -345,11 +330,10 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: api_response = endpoints_client.backup_index_get(index) - backup_url = requests.get(api_response.data[0].url) - file_path = f"{index}.zip" - with open(file_path, "wb") as file: - file.write(backup_url.content) + with urllib.request.urlopen(api_response.data[0].url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) ``` @@ -358,27 +342,24 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ```python import asyncio import os -import requests +import urllib.request import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN def download_sync(url, file_path): """ - Standard synchronous download using requests. + Standard synchronous download using urllib.request. This runs in a separate thread to avoid blocking the event loop. """ - response = requests.get(url) - response.raise_for_status() - with open(file_path, "wb") as file: - file.write(response.content) + with urllib.request.urlopen(url) as response: + with open(file_path, "wb") as file: + file.write(response.read()) async def main(): @@ -397,9 +378,9 @@ async def main(): download_url = api_response.data[0].url file_path = f"{index}.zip" - print(f"Downloading {index} via requests (offloaded to thread)...") + print(f"Downloading {index} via urllib (offloaded to thread)...") - # Use asyncio.to_thread to run the blocking requests call safely + # Use asyncio.to_thread to run the blocking call safely # 'await' the coroutine to get the actual response data await asyncio.to_thread(download_sync, download_url, file_path) @@ -421,11 +402,9 @@ Get all available indices import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -446,11 +425,9 @@ import os import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN @@ -488,11 +465,9 @@ Query VulnCheck-NVD2 for `CVE-2019-19781` import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -512,11 +487,9 @@ import os import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN @@ -553,11 +526,9 @@ Paginate over results for a query to VulnCheck-KEV using `cursor` import vulncheck_sdk import os -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ["VULNCHECK_API_TOKEN"] -configuration = vulncheck_sdk.Configuration(host=DEFAULT_API) +configuration = vulncheck_sdk.Configuration() configuration.api_key["Bearer"] = TOKEN with vulncheck_sdk.ApiClient(configuration) as api_client: @@ -587,11 +558,9 @@ import os import vulncheck_sdk.aio as vcaio # Configuration -DEFAULT_HOST = "https://api.vulncheck.com" -DEFAULT_API = DEFAULT_HOST + "/v3" TOKEN = os.environ.get("VULNCHECK_API_TOKEN") -configuration = vcaio.Configuration(host=DEFAULT_API) +configuration = vcaio.Configuration() configuration.api_key["Bearer"] = TOKEN diff --git a/docs/AdvisoryA10.md b/docs/AdvisoryA10.md index 7de47407..8809b561 100644 --- a/docs/AdvisoryA10.md +++ b/docs/AdvisoryA10.md @@ -1,5 +1,6 @@ # AdvisoryA10 +advisory.A10 ## Properties diff --git a/docs/AdvisoryABBAdvisory.md b/docs/AdvisoryABBAdvisory.md index 97d4ad9d..1462eddb 100644 --- a/docs/AdvisoryABBAdvisory.md +++ b/docs/AdvisoryABBAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryABBAdvisory +advisory.ABBAdvisory ## Properties diff --git a/docs/AdvisoryADP.md b/docs/AdvisoryADP.md index 25d51330..591b0e41 100644 --- a/docs/AdvisoryADP.md +++ b/docs/AdvisoryADP.md @@ -1,5 +1,6 @@ # AdvisoryADP +advisory.ADP ## Properties diff --git a/docs/AdvisoryADPContainer.md b/docs/AdvisoryADPContainer.md index 3609a8db..8cfaa264 100644 --- a/docs/AdvisoryADPContainer.md +++ b/docs/AdvisoryADPContainer.md @@ -1,5 +1,6 @@ # AdvisoryADPContainer +advisory.ADPContainer ## Properties @@ -11,7 +12,7 @@ Name | Type | Description | Notes **impacts** | [**List[AdvisoryImpact]**](AdvisoryImpact.md) | OK | [optional] **metrics** | [**List[AdvisoryMetric]**](AdvisoryMetric.md) | OK | [optional] **problem_types** | [**List[AdvisoryMProblemTypes]**](AdvisoryMProblemTypes.md) | OK | [optional] -**provider_metadata** | [**AdvisoryMProviderMetadata**](AdvisoryMProviderMetadata.md) | OK | [optional] +**provider_metadata** | [**AdvisoryMProviderMetadata**](AdvisoryMProviderMetadata.md) | | [optional] **references** | [**List[AdvisoryMReference]**](AdvisoryMReference.md) | | [optional] **tags** | **List[str]** | OK | [optional] **title** | **str** | OK | [optional] diff --git a/docs/AdvisoryAIX.md b/docs/AdvisoryAIX.md index df2cf898..a713f523 100644 --- a/docs/AdvisoryAIX.md +++ b/docs/AdvisoryAIX.md @@ -1,5 +1,6 @@ # AdvisoryAIX +advisory.AIX ## Properties diff --git a/docs/AdvisoryAMD.md b/docs/AdvisoryAMD.md index f5b4c7ab..3833b6ae 100644 --- a/docs/AdvisoryAMD.md +++ b/docs/AdvisoryAMD.md @@ -1,5 +1,6 @@ # AdvisoryAMD +advisory.AMD ## Properties diff --git a/docs/AdvisoryAMI.md b/docs/AdvisoryAMI.md index 1b9e59d9..529e16b7 100644 --- a/docs/AdvisoryAMI.md +++ b/docs/AdvisoryAMI.md @@ -1,5 +1,6 @@ # AdvisoryAMI +advisory.AMI ## Properties diff --git a/docs/AdvisoryASRG.md b/docs/AdvisoryASRG.md index c5904d90..b35292fc 100644 --- a/docs/AdvisoryASRG.md +++ b/docs/AdvisoryASRG.md @@ -1,5 +1,6 @@ # AdvisoryASRG +advisory.ASRG ## Properties diff --git a/docs/AdvisoryAVEVAAdvisory.md b/docs/AdvisoryAVEVAAdvisory.md index de09b082..9d99df38 100644 --- a/docs/AdvisoryAVEVAAdvisory.md +++ b/docs/AdvisoryAVEVAAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAVEVAAdvisory +advisory.AVEVAAdvisory ## Properties diff --git a/docs/AdvisoryAVIDMLAdvs.md b/docs/AdvisoryAVIDMLAdvs.md index 4f9f51b8..d5120b9d 100644 --- a/docs/AdvisoryAVIDMLAdvs.md +++ b/docs/AdvisoryAVIDMLAdvs.md @@ -1,5 +1,6 @@ # AdvisoryAVIDMLAdvs +advisory.AVIDMLAdvs ## Properties diff --git a/docs/AdvisoryAWS.md b/docs/AdvisoryAWS.md index ee9ba8ca..acb55ef8 100644 --- a/docs/AdvisoryAWS.md +++ b/docs/AdvisoryAWS.md @@ -1,5 +1,6 @@ # AdvisoryAWS +advisory.AWS ## Properties diff --git a/docs/AdvisoryAbbott.md b/docs/AdvisoryAbbott.md index 8bef67b3..bd036578 100644 --- a/docs/AdvisoryAbbott.md +++ b/docs/AdvisoryAbbott.md @@ -1,5 +1,6 @@ # AdvisoryAbbott +advisory.Abbott ## Properties diff --git a/docs/AdvisoryAbsolute.md b/docs/AdvisoryAbsolute.md index 02959d40..f8954098 100644 --- a/docs/AdvisoryAbsolute.md +++ b/docs/AdvisoryAbsolute.md @@ -1,5 +1,6 @@ # AdvisoryAbsolute +advisory.Absolute ## Properties diff --git a/docs/AdvisoryAcknowledgement.md b/docs/AdvisoryAcknowledgement.md index 914abe0c..7eea86f4 100644 --- a/docs/AdvisoryAcknowledgement.md +++ b/docs/AdvisoryAcknowledgement.md @@ -1,5 +1,6 @@ # AdvisoryAcknowledgement +advisory.Acknowledgement ## Properties diff --git a/docs/AdvisoryAcronis.md b/docs/AdvisoryAcronis.md index 18e7589e..7c2e95ba 100644 --- a/docs/AdvisoryAcronis.md +++ b/docs/AdvisoryAcronis.md @@ -1,5 +1,6 @@ # AdvisoryAcronis +advisory.Acronis ## Properties diff --git a/docs/AdvisoryAdobeAdvisory.md b/docs/AdvisoryAdobeAdvisory.md index a347f942..d56bbc2f 100644 --- a/docs/AdvisoryAdobeAdvisory.md +++ b/docs/AdvisoryAdobeAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAdobeAdvisory +advisory.AdobeAdvisory ## Properties diff --git a/docs/AdvisoryAdobeAffected.md b/docs/AdvisoryAdobeAffected.md index 46216f1e..83f523b7 100644 --- a/docs/AdvisoryAdobeAffected.md +++ b/docs/AdvisoryAdobeAffected.md @@ -1,5 +1,6 @@ # AdvisoryAdobeAffected +advisory.AdobeAffected ## Properties diff --git a/docs/AdvisoryAdobeCVE.md b/docs/AdvisoryAdobeCVE.md index 5a10e577..ca58507c 100644 --- a/docs/AdvisoryAdobeCVE.md +++ b/docs/AdvisoryAdobeCVE.md @@ -1,5 +1,6 @@ # AdvisoryAdobeCVE +advisory.AdobeCVE ## Properties diff --git a/docs/AdvisoryAdobeSolution.md b/docs/AdvisoryAdobeSolution.md index 71ba5e3c..cf6a0ccc 100644 --- a/docs/AdvisoryAdobeSolution.md +++ b/docs/AdvisoryAdobeSolution.md @@ -1,5 +1,6 @@ # AdvisoryAdobeSolution +advisory.AdobeSolution ## Properties diff --git a/docs/AdvisoryAdvantech.md b/docs/AdvisoryAdvantech.md index 253cd10d..99d42785 100644 --- a/docs/AdvisoryAdvantech.md +++ b/docs/AdvisoryAdvantech.md @@ -1,5 +1,6 @@ # AdvisoryAdvantech +advisory.Advantech ## Properties diff --git a/docs/AdvisoryAdvisory.md b/docs/AdvisoryAdvisory.md index 8eaa4293..59972621 100644 --- a/docs/AdvisoryAdvisory.md +++ b/docs/AdvisoryAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAdvisory +advisory.Advisory ## Properties diff --git a/docs/AdvisoryAdvisoryDetails.md b/docs/AdvisoryAdvisoryDetails.md index 0c0a106b..5c91664b 100644 --- a/docs/AdvisoryAdvisoryDetails.md +++ b/docs/AdvisoryAdvisoryDetails.md @@ -1,5 +1,6 @@ # AdvisoryAdvisoryDetails +advisory.AdvisoryDetails ## Properties @@ -7,9 +8,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **bugzilla** | [**AdvisoryBugzilla**](AdvisoryBugzilla.md) | | [optional] **cve** | [**AdvisoryOvalCVE**](AdvisoryOvalCVE.md) | | [optional] -**issued** | [**AdvisoryIssued**](AdvisoryIssued.md) | | [optional] +**issued** | **object** | advisory.Issued | [optional] **severity** | **str** | | [optional] -**updated** | [**AdvisoryUpdated**](AdvisoryUpdated.md) | | [optional] +**updated** | **object** | advisory.Updated | [optional] ## Example diff --git a/docs/AdvisoryAdvisoryRecord.md b/docs/AdvisoryAdvisoryRecord.md index 929064e6..02b001ae 100644 --- a/docs/AdvisoryAdvisoryRecord.md +++ b/docs/AdvisoryAdvisoryRecord.md @@ -1,5 +1,6 @@ # AdvisoryAdvisoryRecord +advisory.AdvisoryRecord ## Properties diff --git a/docs/AdvisoryAffected.md b/docs/AdvisoryAffected.md index 02baa52f..b1e80efc 100644 --- a/docs/AdvisoryAffected.md +++ b/docs/AdvisoryAffected.md @@ -1,12 +1,13 @@ # AdvisoryAffected +advisory.Affected ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**database_specific** | **object** | The meaning of the values within the object is entirely defined by the database | [optional] -**ecosystem_specific** | **object** | The meaning of the values within the object is entirely defined by the ecosystem | [optional] +**database_specific** | **object** | | [optional] +**ecosystem_specific** | **object** | | [optional] **package** | [**AdvisoryOSVPackage**](AdvisoryOSVPackage.md) | | [optional] **ranges** | [**List[AdvisoryRange]**](AdvisoryRange.md) | | [optional] **severity** | [**List[AdvisorySeverity]**](AdvisorySeverity.md) | | [optional] diff --git a/docs/AdvisoryAffectedChrome.md b/docs/AdvisoryAffectedChrome.md index dfb2c17a..063fd1ff 100644 --- a/docs/AdvisoryAffectedChrome.md +++ b/docs/AdvisoryAffectedChrome.md @@ -1,5 +1,6 @@ # AdvisoryAffectedChrome +advisory.AffectedChrome ## Properties diff --git a/docs/AdvisoryAffectedDebianPackage.md b/docs/AdvisoryAffectedDebianPackage.md index 64752392..373a7a34 100644 --- a/docs/AdvisoryAffectedDebianPackage.md +++ b/docs/AdvisoryAffectedDebianPackage.md @@ -1,5 +1,6 @@ # AdvisoryAffectedDebianPackage +advisory.AffectedDebianPackage ## Properties diff --git a/docs/AdvisoryAffectedDebianRelease.md b/docs/AdvisoryAffectedDebianRelease.md index 5d07a351..4594ce59 100644 --- a/docs/AdvisoryAffectedDebianRelease.md +++ b/docs/AdvisoryAffectedDebianRelease.md @@ -1,5 +1,6 @@ # AdvisoryAffectedDebianRelease +advisory.AffectedDebianRelease ## Properties diff --git a/docs/AdvisoryAffectedDebianRepository.md b/docs/AdvisoryAffectedDebianRepository.md index b48c2108..f11c3106 100644 --- a/docs/AdvisoryAffectedDebianRepository.md +++ b/docs/AdvisoryAffectedDebianRepository.md @@ -1,5 +1,6 @@ # AdvisoryAffectedDebianRepository +advisory.AffectedDebianRepository ## Properties diff --git a/docs/AdvisoryAffectedFile.md b/docs/AdvisoryAffectedFile.md index 41071bbc..2d24c39b 100644 --- a/docs/AdvisoryAffectedFile.md +++ b/docs/AdvisoryAffectedFile.md @@ -1,5 +1,6 @@ # AdvisoryAffectedFile +advisory.AffectedFile ## Properties diff --git a/docs/AdvisoryAffectedProduct.md b/docs/AdvisoryAffectedProduct.md index f9185b02..1559a605 100644 --- a/docs/AdvisoryAffectedProduct.md +++ b/docs/AdvisoryAffectedProduct.md @@ -1,5 +1,6 @@ # AdvisoryAffectedProduct +advisory.AffectedProduct ## Properties diff --git a/docs/AdvisoryAffectedRel.md b/docs/AdvisoryAffectedRel.md index bcfaa271..e2aa7e38 100644 --- a/docs/AdvisoryAffectedRel.md +++ b/docs/AdvisoryAffectedRel.md @@ -1,5 +1,6 @@ # AdvisoryAffectedRel +advisory.AffectedRel ## Properties diff --git a/docs/AdvisoryAffectedUbuntuPackage.md b/docs/AdvisoryAffectedUbuntuPackage.md index 624e02fe..fdbbc48c 100644 --- a/docs/AdvisoryAffectedUbuntuPackage.md +++ b/docs/AdvisoryAffectedUbuntuPackage.md @@ -1,5 +1,6 @@ # AdvisoryAffectedUbuntuPackage +advisory.AffectedUbuntuPackage ## Properties diff --git a/docs/AdvisoryAlephResearch.md b/docs/AdvisoryAlephResearch.md index ba2a1046..1c997c86 100644 --- a/docs/AdvisoryAlephResearch.md +++ b/docs/AdvisoryAlephResearch.md @@ -1,5 +1,6 @@ # AdvisoryAlephResearch +advisory.AlephResearch ## Properties diff --git a/docs/AdvisoryAlibaba.md b/docs/AdvisoryAlibaba.md index 19581410..23201a1a 100644 --- a/docs/AdvisoryAlibaba.md +++ b/docs/AdvisoryAlibaba.md @@ -1,5 +1,6 @@ # AdvisoryAlibaba +advisory.Alibaba ## Properties diff --git a/docs/AdvisoryAlmaDate.md b/docs/AdvisoryAlmaDate.md index f86c1b2b..893e3b99 100644 --- a/docs/AdvisoryAlmaDate.md +++ b/docs/AdvisoryAlmaDate.md @@ -1,5 +1,6 @@ # AdvisoryAlmaDate +advisory.AlmaDate ## Properties diff --git a/docs/AdvisoryAlmaLinuxUpdate.md b/docs/AdvisoryAlmaLinuxUpdate.md index 5f13291b..11545e9a 100644 --- a/docs/AdvisoryAlmaLinuxUpdate.md +++ b/docs/AdvisoryAlmaLinuxUpdate.md @@ -1,5 +1,6 @@ # AdvisoryAlmaLinuxUpdate +advisory.AlmaLinuxUpdate ## Properties diff --git a/docs/AdvisoryAlmaObjectID.md b/docs/AdvisoryAlmaObjectID.md index 099a1992..d937f199 100644 --- a/docs/AdvisoryAlmaObjectID.md +++ b/docs/AdvisoryAlmaObjectID.md @@ -1,5 +1,6 @@ # AdvisoryAlmaObjectID +advisory.AlmaObjectID ## Properties diff --git a/docs/AdvisoryAlmaPackage.md b/docs/AdvisoryAlmaPackage.md index 8cf6d024..c3cc1440 100644 --- a/docs/AdvisoryAlmaPackage.md +++ b/docs/AdvisoryAlmaPackage.md @@ -1,5 +1,6 @@ # AdvisoryAlmaPackage +advisory.AlmaPackage ## Properties diff --git a/docs/AdvisoryAlmaPackageList.md b/docs/AdvisoryAlmaPackageList.md index 1618ec67..f1ca47b2 100644 --- a/docs/AdvisoryAlmaPackageList.md +++ b/docs/AdvisoryAlmaPackageList.md @@ -1,5 +1,6 @@ # AdvisoryAlmaPackageList +advisory.AlmaPackageList ## Properties diff --git a/docs/AdvisoryAlmaReference.md b/docs/AdvisoryAlmaReference.md index f8709e5f..7e83647e 100644 --- a/docs/AdvisoryAlmaReference.md +++ b/docs/AdvisoryAlmaReference.md @@ -1,5 +1,6 @@ # AdvisoryAlmaReference +advisory.AlmaReference ## Properties diff --git a/docs/AdvisoryAlpineLinuxSecDB.md b/docs/AdvisoryAlpineLinuxSecDB.md index 6ee5f05e..b4981cac 100644 --- a/docs/AdvisoryAlpineLinuxSecDB.md +++ b/docs/AdvisoryAlpineLinuxSecDB.md @@ -1,5 +1,6 @@ # AdvisoryAlpineLinuxSecDB +advisory.AlpineLinuxSecDB ## Properties diff --git a/docs/AdvisoryAlpineLinuxSecDBPackage.md b/docs/AdvisoryAlpineLinuxSecDBPackage.md index 8d6f1415..2dfd8bf1 100644 --- a/docs/AdvisoryAlpineLinuxSecDBPackage.md +++ b/docs/AdvisoryAlpineLinuxSecDBPackage.md @@ -1,5 +1,6 @@ # AdvisoryAlpineLinuxSecDBPackage +advisory.AlpineLinuxSecDBPackage ## Properties diff --git a/docs/AdvisoryAlpineLinuxSecurityFix.md b/docs/AdvisoryAlpineLinuxSecurityFix.md index 3845ad05..ee904584 100644 --- a/docs/AdvisoryAlpineLinuxSecurityFix.md +++ b/docs/AdvisoryAlpineLinuxSecurityFix.md @@ -1,5 +1,6 @@ # AdvisoryAlpineLinuxSecurityFix +advisory.AlpineLinuxSecurityFix ## Properties diff --git a/docs/AdvisoryAmazonAffectedPackage.md b/docs/AdvisoryAmazonAffectedPackage.md index 9a22b7c6..b20c008a 100644 --- a/docs/AdvisoryAmazonAffectedPackage.md +++ b/docs/AdvisoryAmazonAffectedPackage.md @@ -1,5 +1,6 @@ # AdvisoryAmazonAffectedPackage +advisory.AmazonAffectedPackage ## Properties diff --git a/docs/AdvisoryAmazonCVE.md b/docs/AdvisoryAmazonCVE.md index 38372097..4c3f53a8 100644 --- a/docs/AdvisoryAmazonCVE.md +++ b/docs/AdvisoryAmazonCVE.md @@ -1,5 +1,6 @@ # AdvisoryAmazonCVE +advisory.AmazonCVE ## Properties diff --git a/docs/AdvisoryAnchoreNVDOverride.md b/docs/AdvisoryAnchoreNVDOverride.md index 01cf2160..69deb066 100644 --- a/docs/AdvisoryAnchoreNVDOverride.md +++ b/docs/AdvisoryAnchoreNVDOverride.md @@ -1,5 +1,6 @@ # AdvisoryAnchoreNVDOverride +advisory.AnchoreNVDOverride ## Properties diff --git a/docs/AdvisoryAndroidAdvisory.md b/docs/AdvisoryAndroidAdvisory.md index a6425b63..5b6b1d6f 100644 --- a/docs/AdvisoryAndroidAdvisory.md +++ b/docs/AdvisoryAndroidAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAndroidAdvisory +advisory.AndroidAdvisory ## Properties diff --git a/docs/AdvisoryAndroidAffected.md b/docs/AdvisoryAndroidAffected.md index 2add9beb..6d534fd3 100644 --- a/docs/AdvisoryAndroidAffected.md +++ b/docs/AdvisoryAndroidAffected.md @@ -1,5 +1,6 @@ # AdvisoryAndroidAffected +advisory.AndroidAffected ## Properties diff --git a/docs/AdvisoryAndroidEvent.md b/docs/AdvisoryAndroidEvent.md index d13ecd53..f6bd4329 100644 --- a/docs/AdvisoryAndroidEvent.md +++ b/docs/AdvisoryAndroidEvent.md @@ -1,5 +1,6 @@ # AdvisoryAndroidEvent +advisory.AndroidEvent ## Properties diff --git a/docs/AdvisoryAndroidPackage.md b/docs/AdvisoryAndroidPackage.md index 7da05f91..94e4058a 100644 --- a/docs/AdvisoryAndroidPackage.md +++ b/docs/AdvisoryAndroidPackage.md @@ -1,5 +1,6 @@ # AdvisoryAndroidPackage +advisory.AndroidPackage ## Properties diff --git a/docs/AdvisoryAndroidRange.md b/docs/AdvisoryAndroidRange.md index 365f62ed..56760386 100644 --- a/docs/AdvisoryAndroidRange.md +++ b/docs/AdvisoryAndroidRange.md @@ -1,5 +1,6 @@ # AdvisoryAndroidRange +advisory.AndroidRange ## Properties diff --git a/docs/AdvisoryAndroidReference.md b/docs/AdvisoryAndroidReference.md index eb184118..0d51d8b0 100644 --- a/docs/AdvisoryAndroidReference.md +++ b/docs/AdvisoryAndroidReference.md @@ -1,5 +1,6 @@ # AdvisoryAndroidReference +advisory.AndroidReference ## Properties diff --git a/docs/AdvisoryApacheActiveMQ.md b/docs/AdvisoryApacheActiveMQ.md index a85cc3bd..1b493f03 100644 --- a/docs/AdvisoryApacheActiveMQ.md +++ b/docs/AdvisoryApacheActiveMQ.md @@ -1,5 +1,6 @@ # AdvisoryApacheActiveMQ +advisory.ApacheActiveMQ ## Properties diff --git a/docs/AdvisoryApacheArchiva.md b/docs/AdvisoryApacheArchiva.md index 7bdbc354..d7d45169 100644 --- a/docs/AdvisoryApacheArchiva.md +++ b/docs/AdvisoryApacheArchiva.md @@ -1,5 +1,6 @@ # AdvisoryApacheArchiva +advisory.ApacheArchiva ## Properties diff --git a/docs/AdvisoryApacheArrow.md b/docs/AdvisoryApacheArrow.md index 3124a175..a3ebb0e0 100644 --- a/docs/AdvisoryApacheArrow.md +++ b/docs/AdvisoryApacheArrow.md @@ -1,5 +1,6 @@ # AdvisoryApacheArrow +advisory.ApacheArrow ## Properties diff --git a/docs/AdvisoryApacheCamel.md b/docs/AdvisoryApacheCamel.md index 87c71a76..390b5da0 100644 --- a/docs/AdvisoryApacheCamel.md +++ b/docs/AdvisoryApacheCamel.md @@ -1,5 +1,6 @@ # AdvisoryApacheCamel +advisory.ApacheCamel ## Properties diff --git a/docs/AdvisoryApacheCommons.md b/docs/AdvisoryApacheCommons.md index ccef7d8e..182c2b63 100644 --- a/docs/AdvisoryApacheCommons.md +++ b/docs/AdvisoryApacheCommons.md @@ -1,5 +1,6 @@ # AdvisoryApacheCommons +advisory.ApacheCommons ## Properties diff --git a/docs/AdvisoryApacheCouchDB.md b/docs/AdvisoryApacheCouchDB.md index 9cae64e3..b1ebfcc0 100644 --- a/docs/AdvisoryApacheCouchDB.md +++ b/docs/AdvisoryApacheCouchDB.md @@ -1,5 +1,6 @@ # AdvisoryApacheCouchDB +advisory.ApacheCouchDB ## Properties diff --git a/docs/AdvisoryApacheFlink.md b/docs/AdvisoryApacheFlink.md index 2d3670dd..4c17b7c3 100644 --- a/docs/AdvisoryApacheFlink.md +++ b/docs/AdvisoryApacheFlink.md @@ -1,5 +1,6 @@ # AdvisoryApacheFlink +advisory.ApacheFlink ## Properties diff --git a/docs/AdvisoryApacheGuacamole.md b/docs/AdvisoryApacheGuacamole.md index 9793eed2..028ea7c1 100644 --- a/docs/AdvisoryApacheGuacamole.md +++ b/docs/AdvisoryApacheGuacamole.md @@ -1,5 +1,6 @@ # AdvisoryApacheGuacamole +advisory.ApacheGuacamole ## Properties diff --git a/docs/AdvisoryApacheHTTP.md b/docs/AdvisoryApacheHTTP.md index 1783511a..376bb2a8 100644 --- a/docs/AdvisoryApacheHTTP.md +++ b/docs/AdvisoryApacheHTTP.md @@ -1,5 +1,6 @@ # AdvisoryApacheHTTP +advisory.ApacheHTTP ## Properties diff --git a/docs/AdvisoryApacheHadoop.md b/docs/AdvisoryApacheHadoop.md index b741c1c6..9b750bb2 100644 --- a/docs/AdvisoryApacheHadoop.md +++ b/docs/AdvisoryApacheHadoop.md @@ -1,5 +1,6 @@ # AdvisoryApacheHadoop +advisory.ApacheHadoop ## Properties diff --git a/docs/AdvisoryApacheJSPWiki.md b/docs/AdvisoryApacheJSPWiki.md index e0d59cab..bd0ccbbe 100644 --- a/docs/AdvisoryApacheJSPWiki.md +++ b/docs/AdvisoryApacheJSPWiki.md @@ -1,5 +1,6 @@ # AdvisoryApacheJSPWiki +advisory.ApacheJSPWiki ## Properties diff --git a/docs/AdvisoryApacheKafka.md b/docs/AdvisoryApacheKafka.md index d240e172..eb8cc8c9 100644 --- a/docs/AdvisoryApacheKafka.md +++ b/docs/AdvisoryApacheKafka.md @@ -1,5 +1,6 @@ # AdvisoryApacheKafka +advisory.ApacheKafka ## Properties diff --git a/docs/AdvisoryApacheLoggingServices.md b/docs/AdvisoryApacheLoggingServices.md index 2aee2e8a..7f0db887 100644 --- a/docs/AdvisoryApacheLoggingServices.md +++ b/docs/AdvisoryApacheLoggingServices.md @@ -1,5 +1,6 @@ # AdvisoryApacheLoggingServices +advisory.ApacheLoggingServices ## Properties diff --git a/docs/AdvisoryApacheNiFi.md b/docs/AdvisoryApacheNiFi.md index 0743f90c..eb4069aa 100644 --- a/docs/AdvisoryApacheNiFi.md +++ b/docs/AdvisoryApacheNiFi.md @@ -1,5 +1,6 @@ # AdvisoryApacheNiFi +advisory.ApacheNiFi ## Properties diff --git a/docs/AdvisoryApacheOFBiz.md b/docs/AdvisoryApacheOFBiz.md index 504884cc..aeb14513 100644 --- a/docs/AdvisoryApacheOFBiz.md +++ b/docs/AdvisoryApacheOFBiz.md @@ -1,5 +1,6 @@ # AdvisoryApacheOFBiz +advisory.ApacheOFBiz ## Properties diff --git a/docs/AdvisoryApacheOpenMeetings.md b/docs/AdvisoryApacheOpenMeetings.md index 5a79afea..8aee6077 100644 --- a/docs/AdvisoryApacheOpenMeetings.md +++ b/docs/AdvisoryApacheOpenMeetings.md @@ -1,5 +1,6 @@ # AdvisoryApacheOpenMeetings +advisory.ApacheOpenMeetings ## Properties diff --git a/docs/AdvisoryApacheOpenOffice.md b/docs/AdvisoryApacheOpenOffice.md index 79f1f0d9..d4b83721 100644 --- a/docs/AdvisoryApacheOpenOffice.md +++ b/docs/AdvisoryApacheOpenOffice.md @@ -1,5 +1,6 @@ # AdvisoryApacheOpenOffice +advisory.ApacheOpenOffice ## Properties diff --git a/docs/AdvisoryApachePulsar.md b/docs/AdvisoryApachePulsar.md index 7ea9316f..bb5914fc 100644 --- a/docs/AdvisoryApachePulsar.md +++ b/docs/AdvisoryApachePulsar.md @@ -1,5 +1,6 @@ # AdvisoryApachePulsar +advisory.ApachePulsar ## Properties diff --git a/docs/AdvisoryApacheShiro.md b/docs/AdvisoryApacheShiro.md index a711c17c..9babf5d6 100644 --- a/docs/AdvisoryApacheShiro.md +++ b/docs/AdvisoryApacheShiro.md @@ -1,5 +1,6 @@ # AdvisoryApacheShiro +advisory.ApacheShiro ## Properties diff --git a/docs/AdvisoryApacheSpark.md b/docs/AdvisoryApacheSpark.md index a37ffa3d..59854864 100644 --- a/docs/AdvisoryApacheSpark.md +++ b/docs/AdvisoryApacheSpark.md @@ -1,5 +1,6 @@ # AdvisoryApacheSpark +advisory.ApacheSpark ## Properties diff --git a/docs/AdvisoryApacheStruts.md b/docs/AdvisoryApacheStruts.md index 85dea568..377b1688 100644 --- a/docs/AdvisoryApacheStruts.md +++ b/docs/AdvisoryApacheStruts.md @@ -1,5 +1,6 @@ # AdvisoryApacheStruts +advisory.ApacheStruts ## Properties diff --git a/docs/AdvisoryApacheSubversion.md b/docs/AdvisoryApacheSubversion.md index 904848d3..bd9a166e 100644 --- a/docs/AdvisoryApacheSubversion.md +++ b/docs/AdvisoryApacheSubversion.md @@ -1,5 +1,6 @@ # AdvisoryApacheSubversion +advisory.ApacheSubversion ## Properties diff --git a/docs/AdvisoryApacheSuperset.md b/docs/AdvisoryApacheSuperset.md index a9432441..4ab36ca9 100644 --- a/docs/AdvisoryApacheSuperset.md +++ b/docs/AdvisoryApacheSuperset.md @@ -1,5 +1,6 @@ # AdvisoryApacheSuperset +advisory.ApacheSuperset ## Properties diff --git a/docs/AdvisoryApacheTomcat.md b/docs/AdvisoryApacheTomcat.md index 1c948f83..12cea30b 100644 --- a/docs/AdvisoryApacheTomcat.md +++ b/docs/AdvisoryApacheTomcat.md @@ -1,5 +1,6 @@ # AdvisoryApacheTomcat +advisory.ApacheTomcat ## Properties diff --git a/docs/AdvisoryApacheZooKeeper.md b/docs/AdvisoryApacheZooKeeper.md index 4e9d3c24..5ea4f2f1 100644 --- a/docs/AdvisoryApacheZooKeeper.md +++ b/docs/AdvisoryApacheZooKeeper.md @@ -1,5 +1,6 @@ # AdvisoryApacheZooKeeper +advisory.ApacheZooKeeper ## Properties diff --git a/docs/AdvisoryApi.md b/docs/AdvisoryApi.md new file mode 100644 index 00000000..7057ecb7 --- /dev/null +++ b/docs/AdvisoryApi.md @@ -0,0 +1,206 @@ +# vulncheck_sdk.AdvisoryApi + +All URIs are relative to *https://api.vulncheck.com/v3* + +Method | HTTP request | Description +------------- | ------------- | ------------- +[**advisory_get**](AdvisoryApi.md#advisory_get) | **GET** /advisory | Query advisories +[**advisory_list_get**](AdvisoryApi.md#advisory_list_get) | **GET** /advisory/list | List advisory feeds + + +# **advisory_get** +> SearchV4AdvisoryReturnValue advisory_get(name=name, cve_id=cve_id, vendor=vendor, product=product, platform=platform, version=version, cpe=cpe, package_name=package_name, purl=purl, reference_url=reference_url, reference_tag=reference_tag, description_lang=description_lang, updated_after=updated_after, updated_before=updated_before, page=page, limit=limit, start_cursor=start_cursor, cursor=cursor) + +Query advisories + +Query the VulnCheck v4 advisory index + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com/v3" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.AdvisoryApi(api_client) + name = 'name_example' # str | Filter by advisory feed name (e.g. 'vulncheck') (optional) + cve_id = 'cve_id_example' # str | Filter by CVE ID (e.g. 'CVE-2024-1234') (optional) + vendor = 'vendor_example' # str | Filter by vendor name (optional) + product = 'product_example' # str | Filter by product name (optional) + platform = 'platform_example' # str | Filter by OS/platform (optional) + version = 'version_example' # str | Filter by product version (semver-aware) (optional) + cpe = 'cpe_example' # str | Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') (optional) + package_name = 'package_name_example' # str | Filter by package name (optional) + purl = 'purl_example' # str | Filter by package URL (PURL) (optional) + reference_url = 'reference_url_example' # str | Filter by reference URL (optional) + reference_tag = 'reference_tag_example' # str | Filter by reference tag (e.g. 'patch', 'advisory') (optional) + description_lang = 'description_lang_example' # str | Filter by description language (e.g. 'en') (optional) + updated_after = 'updated_after_example' # str | Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') (optional) + updated_before = 'updated_before_example' # str | Return advisories updated before this date (RFC3339 or date-math) (optional) + page = 56 # int | Page number (default: 1) (optional) + limit = 56 # int | Results per page, max 100 (default: 10) (optional) + start_cursor = 'start_cursor_example' # str | Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) (optional) + cursor = 'cursor_example' # str | Cursor from previous response _meta.next_cursor to fetch the next page (optional) + + try: + # Query advisories + api_response = api_instance.advisory_get(name=name, cve_id=cve_id, vendor=vendor, product=product, platform=platform, version=version, cpe=cpe, package_name=package_name, purl=purl, reference_url=reference_url, reference_tag=reference_tag, description_lang=description_lang, updated_after=updated_after, updated_before=updated_before, page=page, limit=limit, start_cursor=start_cursor, cursor=cursor) + print("The response of AdvisoryApi->advisory_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling AdvisoryApi->advisory_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **str**| Filter by advisory feed name (e.g. 'vulncheck') | [optional] + **cve_id** | **str**| Filter by CVE ID (e.g. 'CVE-2024-1234') | [optional] + **vendor** | **str**| Filter by vendor name | [optional] + **product** | **str**| Filter by product name | [optional] + **platform** | **str**| Filter by OS/platform | [optional] + **version** | **str**| Filter by product version (semver-aware) | [optional] + **cpe** | **str**| Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') | [optional] + **package_name** | **str**| Filter by package name | [optional] + **purl** | **str**| Filter by package URL (PURL) | [optional] + **reference_url** | **str**| Filter by reference URL | [optional] + **reference_tag** | **str**| Filter by reference tag (e.g. 'patch', 'advisory') | [optional] + **description_lang** | **str**| Filter by description language (e.g. 'en') | [optional] + **updated_after** | **str**| Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') | [optional] + **updated_before** | **str**| Return advisories updated before this date (RFC3339 or date-math) | [optional] + **page** | **int**| Page number (default: 1) | [optional] + **limit** | **int**| Results per page, max 100 (default: 10) | [optional] + **start_cursor** | **str**| Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) | [optional] + **cursor** | **str**| Cursor from previous response _meta.next_cursor to fetch the next page | [optional] + +### Return type + +[**SearchV4AdvisoryReturnValue**](SearchV4AdvisoryReturnValue.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**400** | Bad Request | - | +**401** | Unauthorized | - | +**402** | Payment Required | - | +**503** | Service Unavailable | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **advisory_list_get** +> SearchV4ListFeedReturnValue advisory_list_get() + +List advisory feeds + +Return a list of available advisory feed names + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com/v3" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.AdvisoryApi(api_client) + + try: + # List advisory feeds + api_response = api_instance.advisory_list_get() + print("The response of AdvisoryApi->advisory_list_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling AdvisoryApi->advisory_list_get: %s\n" % e) +``` + + + +### Parameters + +This endpoint does not need any parameter. + +### Return type + +[**SearchV4ListFeedReturnValue**](SearchV4ListFeedReturnValue.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**400** | Bad Request | - | +**401** | Unauthorized | - | +**402** | Payment Required | - | +**503** | Service Unavailable | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + diff --git a/docs/AdvisoryAppCheck.md b/docs/AdvisoryAppCheck.md index 0749ebeb..7ab26b3a 100644 --- a/docs/AdvisoryAppCheck.md +++ b/docs/AdvisoryAppCheck.md @@ -1,5 +1,6 @@ # AdvisoryAppCheck +advisory.AppCheck ## Properties diff --git a/docs/AdvisoryAppgate.md b/docs/AdvisoryAppgate.md index 7db634ed..4768c5b8 100644 --- a/docs/AdvisoryAppgate.md +++ b/docs/AdvisoryAppgate.md @@ -1,5 +1,6 @@ # AdvisoryAppgate +advisory.Appgate ## Properties diff --git a/docs/AdvisoryAppleAdvisory.md b/docs/AdvisoryAppleAdvisory.md index 1faedf56..b03b37f5 100644 --- a/docs/AdvisoryAppleAdvisory.md +++ b/docs/AdvisoryAppleAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAppleAdvisory +advisory.AppleAdvisory ## Properties diff --git a/docs/AdvisoryAppleComponent.md b/docs/AdvisoryAppleComponent.md index 9daf6af6..6d86d02d 100644 --- a/docs/AdvisoryAppleComponent.md +++ b/docs/AdvisoryAppleComponent.md @@ -1,5 +1,6 @@ # AdvisoryAppleComponent +advisory.AppleComponent ## Properties diff --git a/docs/AdvisoryArchIssue.md b/docs/AdvisoryArchIssue.md index aca99604..c6243d4d 100644 --- a/docs/AdvisoryArchIssue.md +++ b/docs/AdvisoryArchIssue.md @@ -1,5 +1,6 @@ # AdvisoryArchIssue +advisory.ArchIssue ## Properties diff --git a/docs/AdvisoryArista.md b/docs/AdvisoryArista.md index 52ed8007..4c665a04 100644 --- a/docs/AdvisoryArista.md +++ b/docs/AdvisoryArista.md @@ -1,5 +1,6 @@ # AdvisoryArista +advisory.Arista ## Properties diff --git a/docs/AdvisoryAruba.md b/docs/AdvisoryAruba.md index 334992e6..ad314615 100644 --- a/docs/AdvisoryAruba.md +++ b/docs/AdvisoryAruba.md @@ -1,5 +1,6 @@ # AdvisoryAruba +advisory.Aruba ## Properties diff --git a/docs/AdvisoryAssetNote.md b/docs/AdvisoryAssetNote.md index 78a19c2f..23076360 100644 --- a/docs/AdvisoryAssetNote.md +++ b/docs/AdvisoryAssetNote.md @@ -1,5 +1,6 @@ # AdvisoryAssetNote +advisory.AssetNote ## Properties diff --git a/docs/AdvisoryAsterisk.md b/docs/AdvisoryAsterisk.md index bb6e280b..a4e026e2 100644 --- a/docs/AdvisoryAsterisk.md +++ b/docs/AdvisoryAsterisk.md @@ -1,5 +1,6 @@ # AdvisoryAsterisk +advisory.Asterisk ## Properties diff --git a/docs/AdvisoryAstra.md b/docs/AdvisoryAstra.md index f8e04d54..8e45f148 100644 --- a/docs/AdvisoryAstra.md +++ b/docs/AdvisoryAstra.md @@ -1,5 +1,6 @@ # AdvisoryAstra +advisory.Astra ## Properties diff --git a/docs/AdvisoryAsus.md b/docs/AdvisoryAsus.md index def0d019..45f64b17 100644 --- a/docs/AdvisoryAsus.md +++ b/docs/AdvisoryAsus.md @@ -1,5 +1,6 @@ # AdvisoryAsus +advisory.Asus ## Properties diff --git a/docs/AdvisoryAtlassianAdvisory.md b/docs/AdvisoryAtlassianAdvisory.md index 0e745e48..0cb80240 100644 --- a/docs/AdvisoryAtlassianAdvisory.md +++ b/docs/AdvisoryAtlassianAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryAtlassianAdvisory +advisory.AtlassianAdvisory ## Properties diff --git a/docs/AdvisoryAtlassianProducts.md b/docs/AdvisoryAtlassianProducts.md index c170a0d4..abd96509 100644 --- a/docs/AdvisoryAtlassianProducts.md +++ b/docs/AdvisoryAtlassianProducts.md @@ -1,5 +1,6 @@ # AdvisoryAtlassianProducts +advisory.AtlassianProducts ## Properties diff --git a/docs/AdvisoryAtlassianVuln.md b/docs/AdvisoryAtlassianVuln.md index 3064cbc9..a675d3ca 100644 --- a/docs/AdvisoryAtlassianVuln.md +++ b/docs/AdvisoryAtlassianVuln.md @@ -1,5 +1,6 @@ # AdvisoryAtlassianVuln +advisory.AtlassianVuln ## Properties diff --git a/docs/AdvisoryAtredis.md b/docs/AdvisoryAtredis.md index 3e4d1027..036281c4 100644 --- a/docs/AdvisoryAtredis.md +++ b/docs/AdvisoryAtredis.md @@ -1,5 +1,6 @@ # AdvisoryAtredis +advisory.Atredis ## Properties diff --git a/docs/AdvisoryAudiocodes.md b/docs/AdvisoryAudiocodes.md index b281e381..7e950fb8 100644 --- a/docs/AdvisoryAudiocodes.md +++ b/docs/AdvisoryAudiocodes.md @@ -1,5 +1,6 @@ # AdvisoryAudiocodes +advisory.Audiocodes ## Properties diff --git a/docs/AdvisoryAusCert.md b/docs/AdvisoryAusCert.md index 669150a8..bef1813a 100644 --- a/docs/AdvisoryAusCert.md +++ b/docs/AdvisoryAusCert.md @@ -1,5 +1,6 @@ # AdvisoryAusCert +advisory.AusCert ## Properties diff --git a/docs/AdvisoryAutodesk.md b/docs/AdvisoryAutodesk.md index 8085985a..636478aa 100644 --- a/docs/AdvisoryAutodesk.md +++ b/docs/AdvisoryAutodesk.md @@ -1,5 +1,6 @@ # AdvisoryAutodesk +advisory.Autodesk ## Properties diff --git a/docs/AdvisoryAvaya.md b/docs/AdvisoryAvaya.md index 6236d446..68e2d5a5 100644 --- a/docs/AdvisoryAvaya.md +++ b/docs/AdvisoryAvaya.md @@ -1,5 +1,6 @@ # AdvisoryAvaya +advisory.Avaya ## Properties diff --git a/docs/AdvisoryAvigilon.md b/docs/AdvisoryAvigilon.md index 649b7854..0a435c90 100644 --- a/docs/AdvisoryAvigilon.md +++ b/docs/AdvisoryAvigilon.md @@ -1,5 +1,6 @@ # AdvisoryAvigilon +advisory.Avigilon ## Properties diff --git a/docs/AdvisoryAward.md b/docs/AdvisoryAward.md index f76e85ba..416d929c 100644 --- a/docs/AdvisoryAward.md +++ b/docs/AdvisoryAward.md @@ -1,5 +1,6 @@ # AdvisoryAward +advisory.Award ## Properties diff --git a/docs/AdvisoryAxis.md b/docs/AdvisoryAxis.md index 4f247918..fcc85a69 100644 --- a/docs/AdvisoryAxis.md +++ b/docs/AdvisoryAxis.md @@ -1,5 +1,6 @@ # AdvisoryAxis +advisory.Axis ## Properties diff --git a/docs/AdvisoryAzul.md b/docs/AdvisoryAzul.md index b24e7fea..540d6b37 100644 --- a/docs/AdvisoryAzul.md +++ b/docs/AdvisoryAzul.md @@ -1,5 +1,6 @@ # AdvisoryAzul +advisory.Azul ## Properties diff --git a/docs/AdvisoryBBraunAdvisory.md b/docs/AdvisoryBBraunAdvisory.md index 56a06204..7d9ce757 100644 --- a/docs/AdvisoryBBraunAdvisory.md +++ b/docs/AdvisoryBBraunAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBBraunAdvisory +advisory.BBraunAdvisory ## Properties diff --git a/docs/AdvisoryBDUAdvisory.md b/docs/AdvisoryBDUAdvisory.md index 89244cec..3477bd7a 100644 --- a/docs/AdvisoryBDUAdvisory.md +++ b/docs/AdvisoryBDUAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBDUAdvisory +advisory.BDUAdvisory ## Properties diff --git a/docs/AdvisoryBDUCvss.md b/docs/AdvisoryBDUCvss.md index 480e6409..9ca2b1cb 100644 --- a/docs/AdvisoryBDUCvss.md +++ b/docs/AdvisoryBDUCvss.md @@ -1,5 +1,6 @@ # AdvisoryBDUCvss +advisory.BDUCvss ## Properties diff --git a/docs/AdvisoryBDUCvss3.md b/docs/AdvisoryBDUCvss3.md index 3ae39fb3..5e3609af 100644 --- a/docs/AdvisoryBDUCvss3.md +++ b/docs/AdvisoryBDUCvss3.md @@ -1,5 +1,6 @@ # AdvisoryBDUCvss3 +advisory.BDUCvss3 ## Properties diff --git a/docs/AdvisoryBDUEnvironment.md b/docs/AdvisoryBDUEnvironment.md index 33f58da9..d19996b0 100644 --- a/docs/AdvisoryBDUEnvironment.md +++ b/docs/AdvisoryBDUEnvironment.md @@ -1,5 +1,6 @@ # AdvisoryBDUEnvironment +advisory.BDUEnvironment ## Properties diff --git a/docs/AdvisoryBDUOs.md b/docs/AdvisoryBDUOs.md index bacd0c24..46cb3b17 100644 --- a/docs/AdvisoryBDUOs.md +++ b/docs/AdvisoryBDUOs.md @@ -1,5 +1,6 @@ # AdvisoryBDUOs +advisory.BDUOs ## Properties diff --git a/docs/AdvisoryBDUSoft.md b/docs/AdvisoryBDUSoft.md index 8fb63645..31f2d8f6 100644 --- a/docs/AdvisoryBDUSoft.md +++ b/docs/AdvisoryBDUSoft.md @@ -1,5 +1,6 @@ # AdvisoryBDUSoft +advisory.BDUSoft ## Properties diff --git a/docs/AdvisoryBDUTypes.md b/docs/AdvisoryBDUTypes.md index 940a58bb..a756db80 100644 --- a/docs/AdvisoryBDUTypes.md +++ b/docs/AdvisoryBDUTypes.md @@ -1,5 +1,6 @@ # AdvisoryBDUTypes +advisory.BDUTypes ## Properties diff --git a/docs/AdvisoryBDUVector.md b/docs/AdvisoryBDUVector.md index 838c6067..0a2fa887 100644 --- a/docs/AdvisoryBDUVector.md +++ b/docs/AdvisoryBDUVector.md @@ -1,5 +1,6 @@ # AdvisoryBDUVector +advisory.BDUVector ## Properties diff --git a/docs/AdvisoryBDUVulnerableSoftware.md b/docs/AdvisoryBDUVulnerableSoftware.md index cc5bb9f2..374ad6cb 100644 --- a/docs/AdvisoryBDUVulnerableSoftware.md +++ b/docs/AdvisoryBDUVulnerableSoftware.md @@ -1,5 +1,6 @@ # AdvisoryBDUVulnerableSoftware +advisory.BDUVulnerableSoftware ## Properties diff --git a/docs/AdvisoryBLS.md b/docs/AdvisoryBLS.md index bcd9dffe..f6124882 100644 --- a/docs/AdvisoryBLS.md +++ b/docs/AdvisoryBLS.md @@ -1,5 +1,6 @@ # AdvisoryBLS +advisory.BLS ## Properties diff --git a/docs/AdvisoryBandr.md b/docs/AdvisoryBandr.md index c197067c..3378edc9 100644 --- a/docs/AdvisoryBandr.md +++ b/docs/AdvisoryBandr.md @@ -1,5 +1,6 @@ # AdvisoryBandr +advisory.Bandr ## Properties diff --git a/docs/AdvisoryBaxterAdvisory.md b/docs/AdvisoryBaxterAdvisory.md index 3f14b4bf..a73d7db6 100644 --- a/docs/AdvisoryBaxterAdvisory.md +++ b/docs/AdvisoryBaxterAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBaxterAdvisory +advisory.BaxterAdvisory ## Properties diff --git a/docs/AdvisoryBeckhoffAdvisory.md b/docs/AdvisoryBeckhoffAdvisory.md index f0d5f73d..0683ec4b 100644 --- a/docs/AdvisoryBeckhoffAdvisory.md +++ b/docs/AdvisoryBeckhoffAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBeckhoffAdvisory +advisory.BeckhoffAdvisory ## Properties diff --git a/docs/AdvisoryBeckmanCoulter.md b/docs/AdvisoryBeckmanCoulter.md index f725f739..f9fd6423 100644 --- a/docs/AdvisoryBeckmanCoulter.md +++ b/docs/AdvisoryBeckmanCoulter.md @@ -1,5 +1,6 @@ # AdvisoryBeckmanCoulter +advisory.BeckmanCoulter ## Properties diff --git a/docs/AdvisoryBectonDickinsonAdvisory.md b/docs/AdvisoryBectonDickinsonAdvisory.md index b6a7f735..27afc210 100644 --- a/docs/AdvisoryBectonDickinsonAdvisory.md +++ b/docs/AdvisoryBectonDickinsonAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBectonDickinsonAdvisory +advisory.BectonDickinsonAdvisory ## Properties diff --git a/docs/AdvisoryBeldenAdvisory.md b/docs/AdvisoryBeldenAdvisory.md index 9507cce9..151ca85d 100644 --- a/docs/AdvisoryBeldenAdvisory.md +++ b/docs/AdvisoryBeldenAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBeldenAdvisory +advisory.BeldenAdvisory ## Properties diff --git a/docs/AdvisoryBeyondTrust.md b/docs/AdvisoryBeyondTrust.md index c3bea2b5..878bbd2a 100644 --- a/docs/AdvisoryBeyondTrust.md +++ b/docs/AdvisoryBeyondTrust.md @@ -1,5 +1,6 @@ # AdvisoryBeyondTrust +advisory.BeyondTrust ## Properties diff --git a/docs/AdvisoryBinarly.md b/docs/AdvisoryBinarly.md index 9e61352d..f571a5ec 100644 --- a/docs/AdvisoryBinarly.md +++ b/docs/AdvisoryBinarly.md @@ -1,5 +1,6 @@ # AdvisoryBinarly +advisory.Binarly ## Properties diff --git a/docs/AdvisoryBitDefender.md b/docs/AdvisoryBitDefender.md index 8664199d..b4549816 100644 --- a/docs/AdvisoryBitDefender.md +++ b/docs/AdvisoryBitDefender.md @@ -1,5 +1,6 @@ # AdvisoryBitDefender +advisory.BitDefender ## Properties diff --git a/docs/AdvisoryBlackBerry.md b/docs/AdvisoryBlackBerry.md index 43945726..c29405ae 100644 --- a/docs/AdvisoryBlackBerry.md +++ b/docs/AdvisoryBlackBerry.md @@ -1,5 +1,6 @@ # AdvisoryBlackBerry +advisory.BlackBerry ## Properties diff --git a/docs/AdvisoryBoschAdvisory.md b/docs/AdvisoryBoschAdvisory.md index 47983597..54b73ee5 100644 --- a/docs/AdvisoryBoschAdvisory.md +++ b/docs/AdvisoryBoschAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBoschAdvisory +advisory.BoschAdvisory ## Properties diff --git a/docs/AdvisoryBostonScientificAdvisory.md b/docs/AdvisoryBostonScientificAdvisory.md index a27e30b8..035d48cc 100644 --- a/docs/AdvisoryBostonScientificAdvisory.md +++ b/docs/AdvisoryBostonScientificAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryBostonScientificAdvisory +advisory.BostonScientificAdvisory ## Properties diff --git a/docs/AdvisoryBotnet.md b/docs/AdvisoryBotnet.md index 5b801790..e1712f77 100644 --- a/docs/AdvisoryBotnet.md +++ b/docs/AdvisoryBotnet.md @@ -1,5 +1,6 @@ # AdvisoryBotnet +advisory.Botnet ## Properties diff --git a/docs/AdvisoryBugzilla.md b/docs/AdvisoryBugzilla.md index b3a6413b..fba6fd9c 100644 --- a/docs/AdvisoryBugzilla.md +++ b/docs/AdvisoryBugzilla.md @@ -1,5 +1,6 @@ # AdvisoryBugzilla +advisory.Bugzilla ## Properties diff --git a/docs/AdvisoryCACyberCentreAdvisory.md b/docs/AdvisoryCACyberCentreAdvisory.md index cd7d141f..982a3a33 100644 --- a/docs/AdvisoryCACyberCentreAdvisory.md +++ b/docs/AdvisoryCACyberCentreAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCACyberCentreAdvisory +advisory.CACyberCentreAdvisory ## Properties diff --git a/docs/AdvisoryCBLMariner.md b/docs/AdvisoryCBLMariner.md index 5c487f16..985a3a2e 100644 --- a/docs/AdvisoryCBLMariner.md +++ b/docs/AdvisoryCBLMariner.md @@ -1,5 +1,6 @@ # AdvisoryCBLMariner +advisory.CBLMariner ## Properties diff --git a/docs/AdvisoryCERTEUAdvisory.md b/docs/AdvisoryCERTEUAdvisory.md index d2c092ad..1ee03920 100644 --- a/docs/AdvisoryCERTEUAdvisory.md +++ b/docs/AdvisoryCERTEUAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCERTEUAdvisory +advisory.CERTEUAdvisory ## Properties diff --git a/docs/AdvisoryCESA.md b/docs/AdvisoryCESA.md index 558211b1..3a3d9eaf 100644 --- a/docs/AdvisoryCESA.md +++ b/docs/AdvisoryCESA.md @@ -1,5 +1,6 @@ # AdvisoryCESA +advisory.CESA ## Properties diff --git a/docs/AdvisoryCISAAlert.md b/docs/AdvisoryCISAAlert.md index b4c258f9..b9f40a69 100644 --- a/docs/AdvisoryCISAAlert.md +++ b/docs/AdvisoryCISAAlert.md @@ -1,5 +1,6 @@ # AdvisoryCISAAlert +advisory.CISAAlert ## Properties diff --git a/docs/AdvisoryCISControl.md b/docs/AdvisoryCISControl.md index f54d5e2f..7e1a8069 100644 --- a/docs/AdvisoryCISControl.md +++ b/docs/AdvisoryCISControl.md @@ -1,5 +1,6 @@ # AdvisoryCISControl +advisory.CISControl ## Properties diff --git a/docs/AdvisoryCNNVDEntryJSON.md b/docs/AdvisoryCNNVDEntryJSON.md index 23f36eb3..b5e95221 100644 --- a/docs/AdvisoryCNNVDEntryJSON.md +++ b/docs/AdvisoryCNNVDEntryJSON.md @@ -1,5 +1,6 @@ # AdvisoryCNNVDEntryJSON +advisory.CNNVDEntryJSON ## Properties diff --git a/docs/AdvisoryCNVDBulletin.md b/docs/AdvisoryCNVDBulletin.md index 05c6103a..76a07d59 100644 --- a/docs/AdvisoryCNVDBulletin.md +++ b/docs/AdvisoryCNVDBulletin.md @@ -1,5 +1,6 @@ # AdvisoryCNVDBulletin +advisory.CNVDBulletin ## Properties diff --git a/docs/AdvisoryCNVDFlaw.md b/docs/AdvisoryCNVDFlaw.md index fe0d518d..11026604 100644 --- a/docs/AdvisoryCNVDFlaw.md +++ b/docs/AdvisoryCNVDFlaw.md @@ -1,5 +1,6 @@ # AdvisoryCNVDFlaw +advisory.CNVDFlaw ## Properties diff --git a/docs/AdvisoryCOSUpdate.md b/docs/AdvisoryCOSUpdate.md index 4b22eac9..51ef00f5 100644 --- a/docs/AdvisoryCOSUpdate.md +++ b/docs/AdvisoryCOSUpdate.md @@ -1,5 +1,6 @@ # AdvisoryCOSUpdate +advisory.COSUpdate ## Properties diff --git a/docs/AdvisoryCPEMatch.md b/docs/AdvisoryCPEMatch.md index 7298a5b2..344802a5 100644 --- a/docs/AdvisoryCPEMatch.md +++ b/docs/AdvisoryCPEMatch.md @@ -1,5 +1,6 @@ # AdvisoryCPEMatch +advisory.CPEMatch ## Properties diff --git a/docs/AdvisoryCPENode.md b/docs/AdvisoryCPENode.md index a52b50ef..57dd8ba2 100644 --- a/docs/AdvisoryCPENode.md +++ b/docs/AdvisoryCPENode.md @@ -1,5 +1,6 @@ # AdvisoryCPENode +advisory.CPENode ## Properties diff --git a/docs/AdvisoryCSAF.md b/docs/AdvisoryCSAF.md index 14bd5959..85ac6843 100644 --- a/docs/AdvisoryCSAF.md +++ b/docs/AdvisoryCSAF.md @@ -1,13 +1,14 @@ # AdvisoryCSAF +advisory.CSAF ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**document** | [**AdvisoryDocumentMetadata**](AdvisoryDocumentMetadata.md) | Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property | [optional] +**document** | [**AdvisoryDocumentMetadata**](AdvisoryDocumentMetadata.md) | | [optional] **notes** | [**List[AdvisoryCSAFNote]**](AdvisoryCSAFNote.md) | Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes | [optional] -**product_tree** | [**AdvisoryProductBranch**](AdvisoryProductBranch.md) | ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property | [optional] +**product_tree** | [**AdvisoryProductBranch**](AdvisoryProductBranch.md) | | [optional] **vulnerabilities** | [**List[AdvisoryCSAFVulnerability]**](AdvisoryCSAFVulnerability.md) | Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property | [optional] ## Example diff --git a/docs/AdvisoryCSAFNote.md b/docs/AdvisoryCSAFNote.md index b13d078a..6cace4ba 100644 --- a/docs/AdvisoryCSAFNote.md +++ b/docs/AdvisoryCSAFNote.md @@ -1,5 +1,6 @@ # AdvisoryCSAFNote +advisory.CSAFNote ## Properties diff --git a/docs/AdvisoryCSAFReference.md b/docs/AdvisoryCSAFReference.md index 0d392712..ff2c23e6 100644 --- a/docs/AdvisoryCSAFReference.md +++ b/docs/AdvisoryCSAFReference.md @@ -1,5 +1,6 @@ # AdvisoryCSAFReference +advisory.CSAFReference ## Properties diff --git a/docs/AdvisoryCSAFRelationship.md b/docs/AdvisoryCSAFRelationship.md index 43a2b7e5..5e8383c4 100644 --- a/docs/AdvisoryCSAFRelationship.md +++ b/docs/AdvisoryCSAFRelationship.md @@ -1,5 +1,6 @@ # AdvisoryCSAFRelationship +advisory.CSAFRelationship ## Properties diff --git a/docs/AdvisoryCSAFScore.md b/docs/AdvisoryCSAFScore.md index ffb1d35f..a7ee7a2a 100644 --- a/docs/AdvisoryCSAFScore.md +++ b/docs/AdvisoryCSAFScore.md @@ -1,5 +1,6 @@ # AdvisoryCSAFScore +advisory.CSAFScore ## Properties diff --git a/docs/AdvisoryCSAFVulnerability.md b/docs/AdvisoryCSAFVulnerability.md index 31c4aee7..6b4f10d4 100644 --- a/docs/AdvisoryCSAFVulnerability.md +++ b/docs/AdvisoryCSAFVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryCSAFVulnerability +advisory.CSAFVulnerability ## Properties diff --git a/docs/AdvisoryCVEDetail.md b/docs/AdvisoryCVEDetail.md index d681173d..cd277bb1 100644 --- a/docs/AdvisoryCVEDetail.md +++ b/docs/AdvisoryCVEDetail.md @@ -1,5 +1,6 @@ # AdvisoryCVEDetail +advisory.CVEDetail ## Properties diff --git a/docs/AdvisoryCVEDetailsLink.md b/docs/AdvisoryCVEDetailsLink.md index 336a4ced..bc827e71 100644 --- a/docs/AdvisoryCVEDetailsLink.md +++ b/docs/AdvisoryCVEDetailsLink.md @@ -1,5 +1,6 @@ # AdvisoryCVEDetailsLink +advisory.CVEDetailsLink ## Properties diff --git a/docs/AdvisoryCVEReference.md b/docs/AdvisoryCVEReference.md index 6c8ad6f8..612cbb21 100644 --- a/docs/AdvisoryCVEReference.md +++ b/docs/AdvisoryCVEReference.md @@ -1,5 +1,6 @@ # AdvisoryCVEReference +advisory.CVEReference ## Properties diff --git a/docs/AdvisoryCVRFReference.md b/docs/AdvisoryCVRFReference.md deleted file mode 100644 index aeb3231c..00000000 --- a/docs/AdvisoryCVRFReference.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryCVRFReference - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**description** | **str** | | [optional] -**url** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryCVRFReference from a JSON string -advisory_cvrf_reference_instance = AdvisoryCVRFReference.from_json(json) -# print the JSON string representation of the object -print(AdvisoryCVRFReference.to_json()) - -# convert the object into a dict -advisory_cvrf_reference_dict = advisory_cvrf_reference_instance.to_dict() -# create an instance of AdvisoryCVRFReference from a dict -advisory_cvrf_reference_from_dict = AdvisoryCVRFReference.from_dict(advisory_cvrf_reference_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryCVSS.md b/docs/AdvisoryCVSS.md index 36108e42..37a39fd1 100644 --- a/docs/AdvisoryCVSS.md +++ b/docs/AdvisoryCVSS.md @@ -1,5 +1,6 @@ # AdvisoryCVSS +advisory.CVSS ## Properties diff --git a/docs/AdvisoryCVSSV2.md b/docs/AdvisoryCVSSV2.md index 3046c09b..55e4b923 100644 --- a/docs/AdvisoryCVSSV2.md +++ b/docs/AdvisoryCVSSV2.md @@ -1,5 +1,6 @@ # AdvisoryCVSSV2 +advisory.CVSSV2 ## Properties diff --git a/docs/AdvisoryCVSSV3.md b/docs/AdvisoryCVSSV3.md index c399fc93..1c5f8192 100644 --- a/docs/AdvisoryCVSSV3.md +++ b/docs/AdvisoryCVSSV3.md @@ -1,5 +1,6 @@ # AdvisoryCVSSV3 +advisory.CVSSV3 ## Properties diff --git a/docs/AdvisoryCVSSV40.md b/docs/AdvisoryCVSSV40.md index dc571aed..31783ba9 100644 --- a/docs/AdvisoryCVSSV40.md +++ b/docs/AdvisoryCVSSV40.md @@ -1,5 +1,6 @@ # AdvisoryCVSSV40 +this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics ## Properties diff --git a/docs/AdvisoryCVSSV40Threat.md b/docs/AdvisoryCVSSV40Threat.md index bf03e93f..6abc8a8d 100644 --- a/docs/AdvisoryCVSSV40Threat.md +++ b/docs/AdvisoryCVSSV40Threat.md @@ -1,5 +1,6 @@ # AdvisoryCVSSV40Threat +advisory.CVSSV40Threat ## Properties diff --git a/docs/AdvisoryCanvasExploit.md b/docs/AdvisoryCanvasExploit.md index 30403659..a62fdf4e 100644 --- a/docs/AdvisoryCanvasExploit.md +++ b/docs/AdvisoryCanvasExploit.md @@ -1,5 +1,6 @@ # AdvisoryCanvasExploit +advisory.CanvasExploit ## Properties diff --git a/docs/AdvisoryCapec.md b/docs/AdvisoryCapec.md index 95b2eec2..317df3c2 100644 --- a/docs/AdvisoryCapec.md +++ b/docs/AdvisoryCapec.md @@ -1,5 +1,6 @@ # AdvisoryCapec +advisory.Capec ## Properties diff --git a/docs/AdvisoryCarestreamAdvisory.md b/docs/AdvisoryCarestreamAdvisory.md index b25a9464..c324a0ef 100644 --- a/docs/AdvisoryCarestreamAdvisory.md +++ b/docs/AdvisoryCarestreamAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCarestreamAdvisory +advisory.CarestreamAdvisory ## Properties diff --git a/docs/AdvisoryCarrier.md b/docs/AdvisoryCarrier.md index ddfd301a..22e1b37b 100644 --- a/docs/AdvisoryCarrier.md +++ b/docs/AdvisoryCarrier.md @@ -1,5 +1,6 @@ # AdvisoryCarrier +advisory.Carrier ## Properties diff --git a/docs/AdvisoryCentosPackage.md b/docs/AdvisoryCentosPackage.md index e358322f..fd9d5333 100644 --- a/docs/AdvisoryCentosPackage.md +++ b/docs/AdvisoryCentosPackage.md @@ -1,5 +1,6 @@ # AdvisoryCentosPackage +advisory.CentosPackage ## Properties diff --git a/docs/AdvisoryCertBE.md b/docs/AdvisoryCertBE.md index 93d9c1d6..7031e37f 100644 --- a/docs/AdvisoryCertBE.md +++ b/docs/AdvisoryCertBE.md @@ -1,5 +1,6 @@ # AdvisoryCertBE +advisory.CertBE ## Properties diff --git a/docs/AdvisoryCertFRAdvisory.md b/docs/AdvisoryCertFRAdvisory.md index eb042d91..0c855a4d 100644 --- a/docs/AdvisoryCertFRAdvisory.md +++ b/docs/AdvisoryCertFRAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCertFRAdvisory +advisory.CertFRAdvisory ## Properties diff --git a/docs/AdvisoryCertIN.md b/docs/AdvisoryCertIN.md index 4eca9148..b2ca3cd5 100644 --- a/docs/AdvisoryCertIN.md +++ b/docs/AdvisoryCertIN.md @@ -1,5 +1,6 @@ # AdvisoryCertIN +advisory.CertIN ## Properties diff --git a/docs/AdvisoryCertIRSecurityAlert.md b/docs/AdvisoryCertIRSecurityAlert.md index 2730e625..46efa3ce 100644 --- a/docs/AdvisoryCertIRSecurityAlert.md +++ b/docs/AdvisoryCertIRSecurityAlert.md @@ -1,5 +1,6 @@ # AdvisoryCertIRSecurityAlert +advisory.CertIRSecurityAlert ## Properties diff --git a/docs/AdvisoryCertSE.md b/docs/AdvisoryCertSE.md index 0cb7aa28..8a0121f5 100644 --- a/docs/AdvisoryCertSE.md +++ b/docs/AdvisoryCertSE.md @@ -1,5 +1,6 @@ # AdvisoryCertSE +advisory.CertSE ## Properties diff --git a/docs/AdvisoryCertUA.md b/docs/AdvisoryCertUA.md index d39418e5..7d5bdc8a 100644 --- a/docs/AdvisoryCertUA.md +++ b/docs/AdvisoryCertUA.md @@ -1,5 +1,6 @@ # AdvisoryCertUA +advisory.CertUA ## Properties diff --git a/docs/AdvisoryChainGuard.md b/docs/AdvisoryChainGuard.md index e5e807a8..2f7d00d8 100644 --- a/docs/AdvisoryChainGuard.md +++ b/docs/AdvisoryChainGuard.md @@ -1,5 +1,6 @@ # AdvisoryChainGuard +advisory.ChainGuard ## Properties diff --git a/docs/AdvisoryChainGuardPackage.md b/docs/AdvisoryChainGuardPackage.md index 813ced7a..4d5d5918 100644 --- a/docs/AdvisoryChainGuardPackage.md +++ b/docs/AdvisoryChainGuardPackage.md @@ -1,5 +1,6 @@ # AdvisoryChainGuardPackage +advisory.ChainGuardPackage ## Properties diff --git a/docs/AdvisoryChainGuardSecFix.md b/docs/AdvisoryChainGuardSecFix.md index 9c2bbf71..b8030c40 100644 --- a/docs/AdvisoryChainGuardSecFix.md +++ b/docs/AdvisoryChainGuardSecFix.md @@ -1,5 +1,6 @@ # AdvisoryChainGuardSecFix +advisory.ChainGuardSecFix ## Properties diff --git a/docs/AdvisoryCheckPoint.md b/docs/AdvisoryCheckPoint.md index fdf34941..e46d603c 100644 --- a/docs/AdvisoryCheckPoint.md +++ b/docs/AdvisoryCheckPoint.md @@ -1,5 +1,6 @@ # AdvisoryCheckPoint +advisory.CheckPoint ## Properties diff --git a/docs/AdvisoryChrome.md b/docs/AdvisoryChrome.md index 044ebb48..47092d4e 100644 --- a/docs/AdvisoryChrome.md +++ b/docs/AdvisoryChrome.md @@ -1,5 +1,6 @@ # AdvisoryChrome +advisory.Chrome ## Properties diff --git a/docs/AdvisoryCiena.md b/docs/AdvisoryCiena.md index da3423de..bb5eeedb 100644 --- a/docs/AdvisoryCiena.md +++ b/docs/AdvisoryCiena.md @@ -1,5 +1,6 @@ # AdvisoryCiena +advisory.Ciena ## Properties diff --git a/docs/AdvisoryCisaCsafAdv.md b/docs/AdvisoryCisaCsafAdv.md index 8abcb9ce..437806aa 100644 --- a/docs/AdvisoryCisaCsafAdv.md +++ b/docs/AdvisoryCisaCsafAdv.md @@ -1,5 +1,6 @@ # AdvisoryCisaCsafAdv +advisory.CisaCsafAdv ## Properties diff --git a/docs/AdvisoryCiscoAdvisory.md b/docs/AdvisoryCiscoAdvisory.md index 1f20b5bc..ecd2c9bf 100644 --- a/docs/AdvisoryCiscoAdvisory.md +++ b/docs/AdvisoryCiscoAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCiscoAdvisory +advisory.CiscoAdvisory ## Properties diff --git a/docs/AdvisoryCiscoCSAF.md b/docs/AdvisoryCiscoCSAF.md index f4a164ec..21be5646 100644 --- a/docs/AdvisoryCiscoCSAF.md +++ b/docs/AdvisoryCiscoCSAF.md @@ -1,5 +1,6 @@ # AdvisoryCiscoCSAF +advisory.CiscoCSAF ## Properties diff --git a/docs/AdvisoryCiscoKnownGoodValue.md b/docs/AdvisoryCiscoKnownGoodValue.md index 4a3b2ad2..e5b58aef 100644 --- a/docs/AdvisoryCiscoKnownGoodValue.md +++ b/docs/AdvisoryCiscoKnownGoodValue.md @@ -1,5 +1,6 @@ # AdvisoryCiscoKnownGoodValue +advisory.CiscoKnownGoodValue ## Properties diff --git a/docs/AdvisoryCitrixAdvisory.md b/docs/AdvisoryCitrixAdvisory.md index 6207d029..b1893d50 100644 --- a/docs/AdvisoryCitrixAdvisory.md +++ b/docs/AdvisoryCitrixAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCitrixAdvisory +advisory.CitrixAdvisory ## Properties diff --git a/docs/AdvisoryClarotyVulnerability.md b/docs/AdvisoryClarotyVulnerability.md index 6ab8fc78..0dc0db9e 100644 --- a/docs/AdvisoryClarotyVulnerability.md +++ b/docs/AdvisoryClarotyVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryClarotyVulnerability +advisory.ClarotyVulnerability ## Properties diff --git a/docs/AdvisoryCloudBees.md b/docs/AdvisoryCloudBees.md index 595df63d..8b213017 100644 --- a/docs/AdvisoryCloudBees.md +++ b/docs/AdvisoryCloudBees.md @@ -1,5 +1,6 @@ # AdvisoryCloudBees +advisory.CloudBees ## Properties diff --git a/docs/AdvisoryCloudVulnDBAdvisory.md b/docs/AdvisoryCloudVulnDBAdvisory.md index 5aa7b366..19252613 100644 --- a/docs/AdvisoryCloudVulnDBAdvisory.md +++ b/docs/AdvisoryCloudVulnDBAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCloudVulnDBAdvisory +advisory.CloudVulnDBAdvisory ## Properties diff --git a/docs/AdvisoryCodesysAdvisory.md b/docs/AdvisoryCodesysAdvisory.md index cdfd1efe..1ebc7232 100644 --- a/docs/AdvisoryCodesysAdvisory.md +++ b/docs/AdvisoryCodesysAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryCodesysAdvisory +advisory.CodesysAdvisory ## Properties diff --git a/docs/AdvisoryCommVault.md b/docs/AdvisoryCommVault.md index c0ca0ea5..2ba0404e 100644 --- a/docs/AdvisoryCommVault.md +++ b/docs/AdvisoryCommVault.md @@ -1,5 +1,6 @@ # AdvisoryCommVault +advisory.CommVault ## Properties diff --git a/docs/AdvisoryCommVaultCVEDetails.md b/docs/AdvisoryCommVaultCVEDetails.md index 846aefad..6d4baab4 100644 --- a/docs/AdvisoryCommVaultCVEDetails.md +++ b/docs/AdvisoryCommVaultCVEDetails.md @@ -1,5 +1,6 @@ # AdvisoryCommVaultCVEDetails +advisory.CommVaultCVEDetails ## Properties diff --git a/docs/AdvisoryCommVaultImpactedProduct.md b/docs/AdvisoryCommVaultImpactedProduct.md index 91329774..be510a00 100644 --- a/docs/AdvisoryCommVaultImpactedProduct.md +++ b/docs/AdvisoryCommVaultImpactedProduct.md @@ -1,5 +1,6 @@ # AdvisoryCommVaultImpactedProduct +advisory.CommVaultImpactedProduct ## Properties diff --git a/docs/AdvisoryCommVaultImpactedProductDetails.md b/docs/AdvisoryCommVaultImpactedProductDetails.md index bef550ef..6d246010 100644 --- a/docs/AdvisoryCommVaultImpactedProductDetails.md +++ b/docs/AdvisoryCommVaultImpactedProductDetails.md @@ -1,5 +1,6 @@ # AdvisoryCommVaultImpactedProductDetails +advisory.CommVaultImpactedProductDetails ## Properties diff --git a/docs/AdvisoryCommVaultResolution.md b/docs/AdvisoryCommVaultResolution.md index 7cc5e52a..570e60c0 100644 --- a/docs/AdvisoryCommVaultResolution.md +++ b/docs/AdvisoryCommVaultResolution.md @@ -1,5 +1,6 @@ # AdvisoryCommVaultResolution +advisory.CommVaultResolution ## Properties diff --git a/docs/AdvisoryCommVaultResolutionDetails.md b/docs/AdvisoryCommVaultResolutionDetails.md index fcb1bdba..985ab5d6 100644 --- a/docs/AdvisoryCommVaultResolutionDetails.md +++ b/docs/AdvisoryCommVaultResolutionDetails.md @@ -1,5 +1,6 @@ # AdvisoryCommVaultResolutionDetails +advisory.CommVaultResolutionDetails ## Properties diff --git a/docs/AdvisoryCompassSecurity.md b/docs/AdvisoryCompassSecurity.md index 3781c622..42c9bfe9 100644 --- a/docs/AdvisoryCompassSecurity.md +++ b/docs/AdvisoryCompassSecurity.md @@ -1,5 +1,6 @@ # AdvisoryCompassSecurity +advisory.CompassSecurity ## Properties diff --git a/docs/AdvisoryContainerOS.md b/docs/AdvisoryContainerOS.md index 34247fa2..00aab0c1 100644 --- a/docs/AdvisoryContainerOS.md +++ b/docs/AdvisoryContainerOS.md @@ -1,5 +1,6 @@ # AdvisoryContainerOS +advisory.ContainerOS ## Properties diff --git a/docs/AdvisoryCoreImpactExploit.md b/docs/AdvisoryCoreImpactExploit.md index 304d2fd7..e53b7a39 100644 --- a/docs/AdvisoryCoreImpactExploit.md +++ b/docs/AdvisoryCoreImpactExploit.md @@ -1,5 +1,6 @@ # AdvisoryCoreImpactExploit +advisory.CoreImpactExploit ## Properties diff --git a/docs/AdvisoryCorrection.md b/docs/AdvisoryCorrection.md index 14d75926..07e2914a 100644 --- a/docs/AdvisoryCorrection.md +++ b/docs/AdvisoryCorrection.md @@ -1,5 +1,6 @@ # AdvisoryCorrection +advisory.Correction ## Properties diff --git a/docs/AdvisoryCredit.md b/docs/AdvisoryCredit.md index db52e833..848fa40f 100644 --- a/docs/AdvisoryCredit.md +++ b/docs/AdvisoryCredit.md @@ -1,5 +1,6 @@ # AdvisoryCredit +advisory.Credit ## Properties diff --git a/docs/AdvisoryCrestron.md b/docs/AdvisoryCrestron.md index 48023a47..98ef6401 100644 --- a/docs/AdvisoryCrestron.md +++ b/docs/AdvisoryCrestron.md @@ -1,5 +1,6 @@ # AdvisoryCrestron +advisory.Crestron ## Properties diff --git a/docs/AdvisoryCrowdSec.md b/docs/AdvisoryCrowdSec.md index 62079e2e..beea3245 100644 --- a/docs/AdvisoryCrowdSec.md +++ b/docs/AdvisoryCrowdSec.md @@ -1,5 +1,6 @@ # AdvisoryCrowdSec +advisory.CrowdSec ## Properties diff --git a/docs/AdvisoryCurl.md b/docs/AdvisoryCurl.md index 5f266d52..8270a4ba 100644 --- a/docs/AdvisoryCurl.md +++ b/docs/AdvisoryCurl.md @@ -1,5 +1,6 @@ # AdvisoryCurl +advisory.Curl ## Properties diff --git a/docs/AdvisoryCurlAffected.md b/docs/AdvisoryCurlAffected.md index a77504a3..4c5960b6 100644 --- a/docs/AdvisoryCurlAffected.md +++ b/docs/AdvisoryCurlAffected.md @@ -1,5 +1,6 @@ # AdvisoryCurlAffected +advisory.CurlAffected ## Properties diff --git a/docs/AdvisoryCurlCWE.md b/docs/AdvisoryCurlCWE.md index c8b1c145..e93cb0c0 100644 --- a/docs/AdvisoryCurlCWE.md +++ b/docs/AdvisoryCurlCWE.md @@ -1,5 +1,6 @@ # AdvisoryCurlCWE +advisory.CurlCWE ## Properties diff --git a/docs/AdvisoryCurlCredit.md b/docs/AdvisoryCurlCredit.md index e2b5512a..7b02ca06 100644 --- a/docs/AdvisoryCurlCredit.md +++ b/docs/AdvisoryCurlCredit.md @@ -1,5 +1,6 @@ # AdvisoryCurlCredit +advisory.CurlCredit ## Properties diff --git a/docs/AdvisoryCurlRange.md b/docs/AdvisoryCurlRange.md index edb8bcd5..f658f105 100644 --- a/docs/AdvisoryCurlRange.md +++ b/docs/AdvisoryCurlRange.md @@ -1,5 +1,6 @@ # AdvisoryCurlRange +advisory.CurlRange ## Properties diff --git a/docs/AdvisoryCvrf.md b/docs/AdvisoryCvrf.md index dda9a5a3..3b052adf 100644 --- a/docs/AdvisoryCvrf.md +++ b/docs/AdvisoryCvrf.md @@ -1,17 +1,12 @@ # AdvisoryCvrf +advisory.Cvrf ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cve** | **List[str]** | | [optional] -**notes** | [**List[AdvisoryDocumentNote]**](AdvisoryDocumentNote.md) | | [optional] -**product_tree** | [**AdvisoryProductTree**](AdvisoryProductTree.md) | | [optional] -**references** | [**List[AdvisoryCVRFReference]**](AdvisoryCVRFReference.md) | | [optional] -**title** | **str** | | [optional] -**tracking** | [**AdvisoryDocumentTracking**](AdvisoryDocumentTracking.md) | | [optional] -**vulnerabilities** | [**List[AdvisoryVulnerability]**](AdvisoryVulnerability.md) | | [optional] ## Example diff --git a/docs/AdvisoryCvsssV23.md b/docs/AdvisoryCvsssV23.md index 1f937159..2a71f454 100644 --- a/docs/AdvisoryCvsssV23.md +++ b/docs/AdvisoryCvsssV23.md @@ -1,5 +1,6 @@ # AdvisoryCvsssV23 +advisory.CvsssV2_3 ## Properties diff --git a/docs/AdvisoryCwe.md b/docs/AdvisoryCwe.md index c2d9a7ec..9404b175 100644 --- a/docs/AdvisoryCwe.md +++ b/docs/AdvisoryCwe.md @@ -1,5 +1,6 @@ # AdvisoryCwe +advisory.Cwe ## Properties diff --git a/docs/AdvisoryCweAcceptanceLevel.md b/docs/AdvisoryCweAcceptanceLevel.md index 4cae74ce..0f18c23b 100644 --- a/docs/AdvisoryCweAcceptanceLevel.md +++ b/docs/AdvisoryCweAcceptanceLevel.md @@ -1,5 +1,6 @@ # AdvisoryCweAcceptanceLevel +advisory.CweAcceptanceLevel ## Properties diff --git a/docs/AdvisoryCweData.md b/docs/AdvisoryCweData.md index 56de2898..b7cbca83 100644 --- a/docs/AdvisoryCweData.md +++ b/docs/AdvisoryCweData.md @@ -1,5 +1,6 @@ # AdvisoryCweData +advisory.CweData ## Properties diff --git a/docs/AdvisoryCwes.md b/docs/AdvisoryCwes.md index 0e550e43..8df07468 100644 --- a/docs/AdvisoryCwes.md +++ b/docs/AdvisoryCwes.md @@ -1,12 +1,12 @@ # AdvisoryCwes +advisory.Cwes ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**nodes** | [**List[AdvisoryCWENode]**](AdvisoryCWENode.md) | | [optional] -**total_count** | **int** | | [optional] +**nodes** | **List[object]** | | [optional] ## Example diff --git a/docs/AdvisoryCycle.md b/docs/AdvisoryCycle.md index d1d72756..d5494444 100644 --- a/docs/AdvisoryCycle.md +++ b/docs/AdvisoryCycle.md @@ -1,5 +1,6 @@ # AdvisoryCycle +advisory.Cycle ## Properties diff --git a/docs/AdvisoryDBSpecific.md b/docs/AdvisoryDBSpecific.md index b3e0bcde..fd15277b 100644 --- a/docs/AdvisoryDBSpecific.md +++ b/docs/AdvisoryDBSpecific.md @@ -1,5 +1,6 @@ # AdvisoryDBSpecific +advisory.DBSpecific ## Properties diff --git a/docs/AdvisoryDFNCert.md b/docs/AdvisoryDFNCert.md index de6384a1..3dd64cc9 100644 --- a/docs/AdvisoryDFNCert.md +++ b/docs/AdvisoryDFNCert.md @@ -1,5 +1,6 @@ # AdvisoryDFNCert +advisory.DFNCert ## Properties diff --git a/docs/AdvisoryDLink.md b/docs/AdvisoryDLink.md index 9bef1b19..0e75963a 100644 --- a/docs/AdvisoryDLink.md +++ b/docs/AdvisoryDLink.md @@ -1,5 +1,6 @@ # AdvisoryDLink +advisory.DLink ## Properties diff --git a/docs/AdvisoryDNN.md b/docs/AdvisoryDNN.md index 43c11b59..7f07d2e0 100644 --- a/docs/AdvisoryDNN.md +++ b/docs/AdvisoryDNN.md @@ -1,5 +1,6 @@ # AdvisoryDNN +advisory.DNN ## Properties diff --git a/docs/AdvisoryDahua.md b/docs/AdvisoryDahua.md index 81a0a6e6..ba040adc 100644 --- a/docs/AdvisoryDahua.md +++ b/docs/AdvisoryDahua.md @@ -1,5 +1,6 @@ # AdvisoryDahua +advisory.Dahua ## Properties diff --git a/docs/AdvisoryDanFossCVEDetails.md b/docs/AdvisoryDanFossCVEDetails.md index 6d73ebec..8fdd2b60 100644 --- a/docs/AdvisoryDanFossCVEDetails.md +++ b/docs/AdvisoryDanFossCVEDetails.md @@ -1,5 +1,6 @@ # AdvisoryDanFossCVEDetails +advisory.DanFossCVEDetails ## Properties diff --git a/docs/AdvisoryDanfoss.md b/docs/AdvisoryDanfoss.md index ade0593c..bc3a677c 100644 --- a/docs/AdvisoryDanfoss.md +++ b/docs/AdvisoryDanfoss.md @@ -1,5 +1,6 @@ # AdvisoryDanfoss +advisory.Danfoss ## Properties diff --git a/docs/AdvisoryDassault.md b/docs/AdvisoryDassault.md index 72139790..118cf23b 100644 --- a/docs/AdvisoryDassault.md +++ b/docs/AdvisoryDassault.md @@ -1,5 +1,6 @@ # AdvisoryDassault +advisory.Dassault ## Properties diff --git a/docs/AdvisoryDateTime.md b/docs/AdvisoryDateTime.md deleted file mode 100644 index 59f961f8..00000000 --- a/docs/AdvisoryDateTime.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryDateTime - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDateTime from a JSON string -advisory_date_time_instance = AdvisoryDateTime.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDateTime.to_json()) - -# convert the object into a dict -advisory_date_time_dict = advisory_date_time_instance.to_dict() -# create an instance of AdvisoryDateTime from a dict -advisory_date_time_from_dict = AdvisoryDateTime.from_dict(advisory_date_time_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryDebianCVE.md b/docs/AdvisoryDebianCVE.md index ffd5f3f2..acec7dd8 100644 --- a/docs/AdvisoryDebianCVE.md +++ b/docs/AdvisoryDebianCVE.md @@ -1,5 +1,6 @@ # AdvisoryDebianCVE +advisory.DebianCVE ## Properties diff --git a/docs/AdvisoryDebianSecurityAdvisory.md b/docs/AdvisoryDebianSecurityAdvisory.md index c5bf5253..1ac8a0d8 100644 --- a/docs/AdvisoryDebianSecurityAdvisory.md +++ b/docs/AdvisoryDebianSecurityAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryDebianSecurityAdvisory +advisory.DebianSecurityAdvisory ## Properties diff --git a/docs/AdvisoryDell.md b/docs/AdvisoryDell.md index 7d408bc7..f5ab8b0f 100644 --- a/docs/AdvisoryDell.md +++ b/docs/AdvisoryDell.md @@ -1,5 +1,6 @@ # AdvisoryDell +advisory.Dell ## Properties diff --git a/docs/AdvisoryDellCVE.md b/docs/AdvisoryDellCVE.md index 6e0d44f3..55dd770b 100644 --- a/docs/AdvisoryDellCVE.md +++ b/docs/AdvisoryDellCVE.md @@ -1,5 +1,6 @@ # AdvisoryDellCVE +advisory.DellCVE ## Properties diff --git a/docs/AdvisoryDeltaAdvisory.md b/docs/AdvisoryDeltaAdvisory.md index 02e7be25..75027081 100644 --- a/docs/AdvisoryDeltaAdvisory.md +++ b/docs/AdvisoryDeltaAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryDeltaAdvisory +advisory.DeltaAdvisory ## Properties diff --git a/docs/AdvisoryDistroPackage.md b/docs/AdvisoryDistroPackage.md index 11e350e0..acc235c7 100644 --- a/docs/AdvisoryDistroPackage.md +++ b/docs/AdvisoryDistroPackage.md @@ -1,5 +1,6 @@ # AdvisoryDistroPackage +advisory.DistroPackage ## Properties diff --git a/docs/AdvisoryDistroVersion.md b/docs/AdvisoryDistroVersion.md index c2a12cd1..c8278851 100644 --- a/docs/AdvisoryDistroVersion.md +++ b/docs/AdvisoryDistroVersion.md @@ -1,5 +1,6 @@ # AdvisoryDistroVersion +advisory.DistroVersion ## Properties diff --git a/docs/AdvisoryDjango.md b/docs/AdvisoryDjango.md index 651480c2..1c5919b8 100644 --- a/docs/AdvisoryDjango.md +++ b/docs/AdvisoryDjango.md @@ -1,5 +1,6 @@ # AdvisoryDjango +advisory.Django ## Properties diff --git a/docs/AdvisoryDocumentMetadata.md b/docs/AdvisoryDocumentMetadata.md index e7013d51..430e5316 100644 --- a/docs/AdvisoryDocumentMetadata.md +++ b/docs/AdvisoryDocumentMetadata.md @@ -1,5 +1,6 @@ # AdvisoryDocumentMetadata +Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property ## Properties @@ -7,7 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **category** | **str** | | [optional] **csaf_version** | **str** | | [optional] -**distribution** | **object** | | [optional] +**distribution** | **object** | advisory.CSAFDistribution | [optional] **lang** | **str** | | [optional] **notes** | [**List[AdvisoryCSAFNote]**](AdvisoryCSAFNote.md) | used by ncsc | [optional] **publisher** | [**AdvisoryPublisher**](AdvisoryPublisher.md) | | [optional] diff --git a/docs/AdvisoryDocumentNote.md b/docs/AdvisoryDocumentNote.md deleted file mode 100644 index 2a9e51f2..00000000 --- a/docs/AdvisoryDocumentNote.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryDocumentNote - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**text** | **str** | | [optional] -**title** | **str** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDocumentNote from a JSON string -advisory_document_note_instance = AdvisoryDocumentNote.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDocumentNote.to_json()) - -# convert the object into a dict -advisory_document_note_dict = advisory_document_note_instance.to_dict() -# create an instance of AdvisoryDocumentNote from a dict -advisory_document_note_from_dict = AdvisoryDocumentNote.from_dict(advisory_document_note_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryDocumentPublisher.md b/docs/AdvisoryDocumentPublisher.md index 31f5ca9e..bfdb85e2 100644 --- a/docs/AdvisoryDocumentPublisher.md +++ b/docs/AdvisoryDocumentPublisher.md @@ -1,5 +1,6 @@ # AdvisoryDocumentPublisher +advisory.DocumentPublisher ## Properties diff --git a/docs/AdvisoryDocumentTracking.md b/docs/AdvisoryDocumentTracking.md deleted file mode 100644 index 9afd35ce..00000000 --- a/docs/AdvisoryDocumentTracking.md +++ /dev/null @@ -1,34 +0,0 @@ -# AdvisoryDocumentTracking - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**current_release_date** | **str** | | [optional] -**id** | **str** | | [optional] -**initial_release_date** | **str** | | [optional] -**revision_history** | [**List[AdvisoryRevision]**](AdvisoryRevision.md) | | [optional] -**status** | **str** | | [optional] -**version** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDocumentTracking from a JSON string -advisory_document_tracking_instance = AdvisoryDocumentTracking.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDocumentTracking.to_json()) - -# convert the object into a dict -advisory_document_tracking_dict = advisory_document_tracking_instance.to_dict() -# create an instance of AdvisoryDocumentTracking from a dict -advisory_document_tracking_from_dict = AdvisoryDocumentTracking.from_dict(advisory_document_tracking_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryDotCMS.md b/docs/AdvisoryDotCMS.md index 8bb76769..ef613972 100644 --- a/docs/AdvisoryDotCMS.md +++ b/docs/AdvisoryDotCMS.md @@ -1,5 +1,6 @@ # AdvisoryDotCMS +advisory.DotCMS ## Properties diff --git a/docs/AdvisoryDragosAdvisory.md b/docs/AdvisoryDragosAdvisory.md index bc76097e..9069d9b1 100644 --- a/docs/AdvisoryDragosAdvisory.md +++ b/docs/AdvisoryDragosAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryDragosAdvisory +advisory.DragosAdvisory ## Properties diff --git a/docs/AdvisoryDraytek.md b/docs/AdvisoryDraytek.md index 9d8adf50..01a48a3c 100644 --- a/docs/AdvisoryDraytek.md +++ b/docs/AdvisoryDraytek.md @@ -1,5 +1,6 @@ # AdvisoryDraytek +advisory.Draytek ## Properties diff --git a/docs/AdvisoryDrupal.md b/docs/AdvisoryDrupal.md index b1f33c02..b3ff4db1 100644 --- a/docs/AdvisoryDrupal.md +++ b/docs/AdvisoryDrupal.md @@ -1,5 +1,6 @@ # AdvisoryDrupal +advisory.Drupal ## Properties diff --git a/docs/AdvisoryEOLAlibaba.md b/docs/AdvisoryEOLAlibaba.md index 29205f0e..5ae63643 100644 --- a/docs/AdvisoryEOLAlibaba.md +++ b/docs/AdvisoryEOLAlibaba.md @@ -1,5 +1,6 @@ # AdvisoryEOLAlibaba +advisory.EOLAlibaba ## Properties diff --git a/docs/AdvisoryEOLMicrosoft.md b/docs/AdvisoryEOLMicrosoft.md index 1b3e79f3..f9b701b5 100644 --- a/docs/AdvisoryEOLMicrosoft.md +++ b/docs/AdvisoryEOLMicrosoft.md @@ -1,5 +1,6 @@ # AdvisoryEOLMicrosoft +advisory.EOLMicrosoft ## Properties diff --git a/docs/AdvisoryEOLReleaseData.md b/docs/AdvisoryEOLReleaseData.md index 6822b6fb..bb1ba6ec 100644 --- a/docs/AdvisoryEOLReleaseData.md +++ b/docs/AdvisoryEOLReleaseData.md @@ -1,5 +1,6 @@ # AdvisoryEOLReleaseData +advisory.EOLReleaseData ## Properties diff --git a/docs/AdvisoryEUVD.md b/docs/AdvisoryEUVD.md index c433e75a..f01994b4 100644 --- a/docs/AdvisoryEUVD.md +++ b/docs/AdvisoryEUVD.md @@ -1,5 +1,6 @@ # AdvisoryEUVD +advisory.EUVD ## Properties diff --git a/docs/AdvisoryEatonAdvisory.md b/docs/AdvisoryEatonAdvisory.md index f1820b3a..044c8940 100644 --- a/docs/AdvisoryEatonAdvisory.md +++ b/docs/AdvisoryEatonAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryEatonAdvisory +advisory.EatonAdvisory ## Properties diff --git a/docs/AdvisoryEcoSystem.md b/docs/AdvisoryEcoSystem.md index 0a2f7b25..695dd465 100644 --- a/docs/AdvisoryEcoSystem.md +++ b/docs/AdvisoryEcoSystem.md @@ -1,5 +1,6 @@ # AdvisoryEcoSystem +advisory.EcoSystem ## Properties diff --git a/docs/AdvisoryElastic.md b/docs/AdvisoryElastic.md index 6968b322..62fedd94 100644 --- a/docs/AdvisoryElastic.md +++ b/docs/AdvisoryElastic.md @@ -1,5 +1,6 @@ # AdvisoryElastic +advisory.Elastic ## Properties diff --git a/docs/AdvisoryElspec.md b/docs/AdvisoryElspec.md index 74cac039..5b1f827c 100644 --- a/docs/AdvisoryElspec.md +++ b/docs/AdvisoryElspec.md @@ -1,5 +1,6 @@ # AdvisoryElspec +advisory.Elspec ## Properties diff --git a/docs/AdvisoryEmergingThreatsSnort.md b/docs/AdvisoryEmergingThreatsSnort.md index 358aa340..a9e20888 100644 --- a/docs/AdvisoryEmergingThreatsSnort.md +++ b/docs/AdvisoryEmergingThreatsSnort.md @@ -1,5 +1,6 @@ # AdvisoryEmergingThreatsSnort +advisory.EmergingThreatsSnort ## Properties diff --git a/docs/AdvisoryEmersonAdvisory.md b/docs/AdvisoryEmersonAdvisory.md index 8aecc481..3c245aaf 100644 --- a/docs/AdvisoryEmersonAdvisory.md +++ b/docs/AdvisoryEmersonAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryEmersonAdvisory +advisory.EmersonAdvisory ## Properties diff --git a/docs/AdvisoryEndOfLife.md b/docs/AdvisoryEndOfLife.md index 9f7c924a..200b64cb 100644 --- a/docs/AdvisoryEndOfLife.md +++ b/docs/AdvisoryEndOfLife.md @@ -1,5 +1,6 @@ # AdvisoryEndOfLife +advisory.EndOfLife ## Properties diff --git a/docs/AdvisoryEndress.md b/docs/AdvisoryEndress.md index b861ec0a..b03d74ac 100644 --- a/docs/AdvisoryEndress.md +++ b/docs/AdvisoryEndress.md @@ -1,5 +1,6 @@ # AdvisoryEndress +advisory.Endress ## Properties diff --git a/docs/AdvisoryEnisaIDProduct.md b/docs/AdvisoryEnisaIDProduct.md index 01a28103..a2dd04b3 100644 --- a/docs/AdvisoryEnisaIDProduct.md +++ b/docs/AdvisoryEnisaIDProduct.md @@ -1,5 +1,6 @@ # AdvisoryEnisaIDProduct +advisory.EnisaIDProduct ## Properties diff --git a/docs/AdvisoryEnisaIDVendor.md b/docs/AdvisoryEnisaIDVendor.md index 43433187..d17fd3e5 100644 --- a/docs/AdvisoryEnisaIDVendor.md +++ b/docs/AdvisoryEnisaIDVendor.md @@ -1,5 +1,6 @@ # AdvisoryEnisaIDVendor +advisory.EnisaIDVendor ## Properties diff --git a/docs/AdvisoryEvent.md b/docs/AdvisoryEvent.md index 90396d51..8733aa81 100644 --- a/docs/AdvisoryEvent.md +++ b/docs/AdvisoryEvent.md @@ -1,5 +1,6 @@ # AdvisoryEvent +advisory.Event ## Properties diff --git a/docs/AdvisoryExodusIntel.md b/docs/AdvisoryExodusIntel.md index cd7780fd..8ab679c6 100644 --- a/docs/AdvisoryExodusIntel.md +++ b/docs/AdvisoryExodusIntel.md @@ -1,5 +1,6 @@ # AdvisoryExodusIntel +advisory.ExodusIntel ## Properties diff --git a/docs/AdvisoryExploitDBExploitv2.md b/docs/AdvisoryExploitDBExploitv2.md index 7c122873..44a72c2e 100644 --- a/docs/AdvisoryExploitDBExploitv2.md +++ b/docs/AdvisoryExploitDBExploitv2.md @@ -1,5 +1,6 @@ # AdvisoryExploitDBExploitv2 +advisory.ExploitDBExploitv2 ## Properties diff --git a/docs/AdvisoryExternalReferences.md b/docs/AdvisoryExternalReferences.md index 931b9d86..3f1c6069 100644 --- a/docs/AdvisoryExternalReferences.md +++ b/docs/AdvisoryExternalReferences.md @@ -1,5 +1,6 @@ # AdvisoryExternalReferences +advisory.ExternalReferences ## Properties diff --git a/docs/AdvisoryF5.md b/docs/AdvisoryF5.md index 49b7ff93..469f2116 100644 --- a/docs/AdvisoryF5.md +++ b/docs/AdvisoryF5.md @@ -1,5 +1,6 @@ # AdvisoryF5 +advisory.F5 ## Properties diff --git a/docs/AdvisoryFSecure.md b/docs/AdvisoryFSecure.md index 55a46adf..426429a2 100644 --- a/docs/AdvisoryFSecure.md +++ b/docs/AdvisoryFSecure.md @@ -1,5 +1,6 @@ # AdvisoryFSecure +advisory.FSecure ## Properties diff --git a/docs/AdvisoryFanuc.md b/docs/AdvisoryFanuc.md index bd673d35..1eccd12a 100644 --- a/docs/AdvisoryFanuc.md +++ b/docs/AdvisoryFanuc.md @@ -1,5 +1,6 @@ # AdvisoryFanuc +advisory.Fanuc ## Properties diff --git a/docs/AdvisoryFastly.md b/docs/AdvisoryFastly.md index 2f3ba365..129e3073 100644 --- a/docs/AdvisoryFastly.md +++ b/docs/AdvisoryFastly.md @@ -1,5 +1,6 @@ # AdvisoryFastly +advisory.Fastly ## Properties diff --git a/docs/AdvisoryFesto.md b/docs/AdvisoryFesto.md index 364151ef..3a00a0d2 100644 --- a/docs/AdvisoryFesto.md +++ b/docs/AdvisoryFesto.md @@ -1,5 +1,6 @@ # AdvisoryFesto +advisory.Festo ## Properties diff --git a/docs/AdvisoryFileCloud.md b/docs/AdvisoryFileCloud.md index d1480ca4..40225ccc 100644 --- a/docs/AdvisoryFileCloud.md +++ b/docs/AdvisoryFileCloud.md @@ -1,5 +1,6 @@ # AdvisoryFileCloud +advisory.FileCloud ## Properties diff --git a/docs/AdvisoryFileZilla.md b/docs/AdvisoryFileZilla.md index ff32a7b2..1952e3bf 100644 --- a/docs/AdvisoryFileZilla.md +++ b/docs/AdvisoryFileZilla.md @@ -1,5 +1,6 @@ # AdvisoryFileZilla +advisory.FileZilla ## Properties diff --git a/docs/AdvisoryFixAff.md b/docs/AdvisoryFixAff.md index d57d4745..d7d27854 100644 --- a/docs/AdvisoryFixAff.md +++ b/docs/AdvisoryFixAff.md @@ -1,5 +1,6 @@ # AdvisoryFixAff +advisory.FixAff ## Properties diff --git a/docs/AdvisoryFlag.md b/docs/AdvisoryFlag.md index 09c29d01..2ece6542 100644 --- a/docs/AdvisoryFlag.md +++ b/docs/AdvisoryFlag.md @@ -1,5 +1,6 @@ # AdvisoryFlag +advisory.Flag ## Properties diff --git a/docs/AdvisoryFlattSecurity.md b/docs/AdvisoryFlattSecurity.md index ed8f39cc..f2d8eb55 100644 --- a/docs/AdvisoryFlattSecurity.md +++ b/docs/AdvisoryFlattSecurity.md @@ -1,5 +1,6 @@ # AdvisoryFlattSecurity +advisory.FlattSecurity ## Properties diff --git a/docs/AdvisoryForgeRock.md b/docs/AdvisoryForgeRock.md index 11730afc..5b9c5d64 100644 --- a/docs/AdvisoryForgeRock.md +++ b/docs/AdvisoryForgeRock.md @@ -1,5 +1,6 @@ # AdvisoryForgeRock +advisory.ForgeRock ## Properties diff --git a/docs/AdvisoryFortinetAdvisory.md b/docs/AdvisoryFortinetAdvisory.md index be995a69..2dee108f 100644 --- a/docs/AdvisoryFortinetAdvisory.md +++ b/docs/AdvisoryFortinetAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryFortinetAdvisory +advisory.FortinetAdvisory ## Properties diff --git a/docs/AdvisoryFortinetIPS.md b/docs/AdvisoryFortinetIPS.md index bbae3483..d7281549 100644 --- a/docs/AdvisoryFortinetIPS.md +++ b/docs/AdvisoryFortinetIPS.md @@ -1,5 +1,6 @@ # AdvisoryFortinetIPS +advisory.FortinetIPS ## Properties diff --git a/docs/AdvisoryFoxit.md b/docs/AdvisoryFoxit.md index e9dd9ce6..c8fb2410 100644 --- a/docs/AdvisoryFoxit.md +++ b/docs/AdvisoryFoxit.md @@ -1,5 +1,6 @@ # AdvisoryFoxit +advisory.Foxit ## Properties diff --git a/docs/AdvisoryFoxitAffected.md b/docs/AdvisoryFoxitAffected.md index b93668ad..168103eb 100644 --- a/docs/AdvisoryFoxitAffected.md +++ b/docs/AdvisoryFoxitAffected.md @@ -1,5 +1,6 @@ # AdvisoryFoxitAffected +advisory.FoxitAffected ## Properties diff --git a/docs/AdvisoryFresenius.md b/docs/AdvisoryFresenius.md index 6374cbc1..d7f898f8 100644 --- a/docs/AdvisoryFresenius.md +++ b/docs/AdvisoryFresenius.md @@ -1,5 +1,6 @@ # AdvisoryFresenius +advisory.Fresenius ## Properties diff --git a/docs/AdvisoryGCP.md b/docs/AdvisoryGCP.md index 084a51d0..2fdf7cd6 100644 --- a/docs/AdvisoryGCP.md +++ b/docs/AdvisoryGCP.md @@ -1,5 +1,6 @@ # AdvisoryGCP +advisory.GCP ## Properties diff --git a/docs/AdvisoryGEGas.md b/docs/AdvisoryGEGas.md index c55d3a90..0894ae29 100644 --- a/docs/AdvisoryGEGas.md +++ b/docs/AdvisoryGEGas.md @@ -1,5 +1,6 @@ # AdvisoryGEGas +advisory.GEGas ## Properties diff --git a/docs/AdvisoryGEHealthcareAdvisory.md b/docs/AdvisoryGEHealthcareAdvisory.md index 35a6d6b1..07cfc80d 100644 --- a/docs/AdvisoryGEHealthcareAdvisory.md +++ b/docs/AdvisoryGEHealthcareAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryGEHealthcareAdvisory +advisory.GEHealthcareAdvisory ## Properties diff --git a/docs/AdvisoryGHAdvisoryJSONLean.md b/docs/AdvisoryGHAdvisoryJSONLean.md index a3d19de3..03cbc553 100644 --- a/docs/AdvisoryGHAdvisoryJSONLean.md +++ b/docs/AdvisoryGHAdvisoryJSONLean.md @@ -1,5 +1,6 @@ # AdvisoryGHAdvisoryJSONLean +advisory.GHAdvisoryJSONLean ## Properties diff --git a/docs/AdvisoryGHCvss.md b/docs/AdvisoryGHCvss.md index 1062175a..5f578329 100644 --- a/docs/AdvisoryGHCvss.md +++ b/docs/AdvisoryGHCvss.md @@ -1,5 +1,6 @@ # AdvisoryGHCvss +advisory.GHCvss ## Properties diff --git a/docs/AdvisoryGHIdentifier.md b/docs/AdvisoryGHIdentifier.md index f3693cc1..118badc5 100644 --- a/docs/AdvisoryGHIdentifier.md +++ b/docs/AdvisoryGHIdentifier.md @@ -1,5 +1,6 @@ # AdvisoryGHIdentifier +advisory.GHIdentifier ## Properties diff --git a/docs/AdvisoryGHNode.md b/docs/AdvisoryGHNode.md index 4caa3786..112884a5 100644 --- a/docs/AdvisoryGHNode.md +++ b/docs/AdvisoryGHNode.md @@ -1,5 +1,6 @@ # AdvisoryGHNode +advisory.GHNode ## Properties diff --git a/docs/AdvisoryGHPackage.md b/docs/AdvisoryGHPackage.md index 486a360c..dbba2078 100644 --- a/docs/AdvisoryGHPackage.md +++ b/docs/AdvisoryGHPackage.md @@ -1,5 +1,6 @@ # AdvisoryGHPackage +advisory.GHPackage ## Properties diff --git a/docs/AdvisoryGHReference.md b/docs/AdvisoryGHReference.md index dc7a996d..a4652d35 100644 --- a/docs/AdvisoryGHReference.md +++ b/docs/AdvisoryGHReference.md @@ -1,5 +1,6 @@ # AdvisoryGHReference +advisory.GHReference ## Properties diff --git a/docs/AdvisoryGHSA.md b/docs/AdvisoryGHSA.md index ec6ec4c5..efe94a65 100644 --- a/docs/AdvisoryGHSA.md +++ b/docs/AdvisoryGHSA.md @@ -1,5 +1,6 @@ # AdvisoryGHSA +advisory.GHSA ## Properties diff --git a/docs/AdvisoryGHSAAffected.md b/docs/AdvisoryGHSAAffected.md index b451dec5..783daaea 100644 --- a/docs/AdvisoryGHSAAffected.md +++ b/docs/AdvisoryGHSAAffected.md @@ -1,5 +1,6 @@ # AdvisoryGHSAAffected +advisory.GHSAAffected ## Properties diff --git a/docs/AdvisoryGHSADatabaseSpecific.md b/docs/AdvisoryGHSADatabaseSpecific.md index 8067917d..9d74809f 100644 --- a/docs/AdvisoryGHSADatabaseSpecific.md +++ b/docs/AdvisoryGHSADatabaseSpecific.md @@ -1,5 +1,6 @@ # AdvisoryGHSADatabaseSpecific +advisory.GHSADatabaseSpecific ## Properties diff --git a/docs/AdvisoryGHSAEcoSystemSpecific.md b/docs/AdvisoryGHSAEcoSystemSpecific.md index 9cf8a53b..1e330448 100644 --- a/docs/AdvisoryGHSAEcoSystemSpecific.md +++ b/docs/AdvisoryGHSAEcoSystemSpecific.md @@ -1,5 +1,6 @@ # AdvisoryGHSAEcoSystemSpecific +advisory.GHSAEcoSystemSpecific ## Properties diff --git a/docs/AdvisoryGHSAEvent.md b/docs/AdvisoryGHSAEvent.md index c220c433..8f520983 100644 --- a/docs/AdvisoryGHSAEvent.md +++ b/docs/AdvisoryGHSAEvent.md @@ -1,5 +1,6 @@ # AdvisoryGHSAEvent +advisory.GHSAEvent ## Properties diff --git a/docs/AdvisoryGHSAPackage.md b/docs/AdvisoryGHSAPackage.md index c8d7ec34..ce6bd352 100644 --- a/docs/AdvisoryGHSAPackage.md +++ b/docs/AdvisoryGHSAPackage.md @@ -1,5 +1,6 @@ # AdvisoryGHSAPackage +advisory.GHSAPackage ## Properties diff --git a/docs/AdvisoryGHSARange.md b/docs/AdvisoryGHSARange.md index 013a2478..8d253f30 100644 --- a/docs/AdvisoryGHSARange.md +++ b/docs/AdvisoryGHSARange.md @@ -1,5 +1,6 @@ # AdvisoryGHSARange +advisory.GHSARange ## Properties diff --git a/docs/AdvisoryGHSAReference.md b/docs/AdvisoryGHSAReference.md index e0e0e6a8..2b595a82 100644 --- a/docs/AdvisoryGHSAReference.md +++ b/docs/AdvisoryGHSAReference.md @@ -1,5 +1,6 @@ # AdvisoryGHSAReference +advisory.GHSAReference ## Properties diff --git a/docs/AdvisoryGHSASeverity.md b/docs/AdvisoryGHSASeverity.md index d8ccc139..36cd1d51 100644 --- a/docs/AdvisoryGHSASeverity.md +++ b/docs/AdvisoryGHSASeverity.md @@ -1,5 +1,6 @@ # AdvisoryGHSASeverity +advisory.GHSASeverity ## Properties diff --git a/docs/AdvisoryGHVulnerabilities.md b/docs/AdvisoryGHVulnerabilities.md index 068e4ab4..d071e280 100644 --- a/docs/AdvisoryGHVulnerabilities.md +++ b/docs/AdvisoryGHVulnerabilities.md @@ -1,5 +1,6 @@ # AdvisoryGHVulnerabilities +advisory.GHVulnerabilities ## Properties diff --git a/docs/AdvisoryGMOCyberSecurity.md b/docs/AdvisoryGMOCyberSecurity.md index 335d49b9..3fdc18ac 100644 --- a/docs/AdvisoryGMOCyberSecurity.md +++ b/docs/AdvisoryGMOCyberSecurity.md @@ -1,5 +1,6 @@ # AdvisoryGMOCyberSecurity +advisory.GMOCyberSecurity ## Properties diff --git a/docs/AdvisoryGallagher.md b/docs/AdvisoryGallagher.md index 22de0ae7..30e89ca9 100644 --- a/docs/AdvisoryGallagher.md +++ b/docs/AdvisoryGallagher.md @@ -1,5 +1,6 @@ # AdvisoryGallagher +advisory.Gallagher ## Properties diff --git a/docs/AdvisoryGen.md b/docs/AdvisoryGen.md index f4354553..599e238c 100644 --- a/docs/AdvisoryGen.md +++ b/docs/AdvisoryGen.md @@ -1,5 +1,6 @@ # AdvisoryGen +advisory.Gen ## Properties diff --git a/docs/AdvisoryGenetec.md b/docs/AdvisoryGenetec.md index ab51b3eb..42715854 100644 --- a/docs/AdvisoryGenetec.md +++ b/docs/AdvisoryGenetec.md @@ -1,5 +1,6 @@ # AdvisoryGenetec +advisory.Genetec ## Properties diff --git a/docs/AdvisoryGigabyte.md b/docs/AdvisoryGigabyte.md index 22248eec..d76b9655 100644 --- a/docs/AdvisoryGigabyte.md +++ b/docs/AdvisoryGigabyte.md @@ -1,5 +1,6 @@ # AdvisoryGigabyte +advisory.Gigabyte ## Properties diff --git a/docs/AdvisoryGitHubExploit.md b/docs/AdvisoryGitHubExploit.md index 4b63556d..ed78d3b4 100644 --- a/docs/AdvisoryGitHubExploit.md +++ b/docs/AdvisoryGitHubExploit.md @@ -1,5 +1,6 @@ # AdvisoryGitHubExploit +advisory.GitHubExploit ## Properties diff --git a/docs/AdvisoryGitLabExploit.md b/docs/AdvisoryGitLabExploit.md index aa1412e7..be15b8e8 100644 --- a/docs/AdvisoryGitLabExploit.md +++ b/docs/AdvisoryGitLabExploit.md @@ -1,5 +1,6 @@ # AdvisoryGitLabExploit +advisory.GitLabExploit ## Properties diff --git a/docs/AdvisoryGiteeExploit.md b/docs/AdvisoryGiteeExploit.md index 1c9ed41a..8ae38ee6 100644 --- a/docs/AdvisoryGiteeExploit.md +++ b/docs/AdvisoryGiteeExploit.md @@ -1,5 +1,6 @@ # AdvisoryGiteeExploit +advisory.GiteeExploit ## Properties diff --git a/docs/AdvisoryGitlabAdvisory.md b/docs/AdvisoryGitlabAdvisory.md index eb335f01..ca151db2 100644 --- a/docs/AdvisoryGitlabAdvisory.md +++ b/docs/AdvisoryGitlabAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryGitlabAdvisory +advisory.GitlabAdvisory ## Properties diff --git a/docs/AdvisoryGlibc.md b/docs/AdvisoryGlibc.md index 52cf2f1c..7ae6e1fd 100644 --- a/docs/AdvisoryGlibc.md +++ b/docs/AdvisoryGlibc.md @@ -1,5 +1,6 @@ # AdvisoryGlibc +advisory.Glibc ## Properties diff --git a/docs/AdvisoryGnuTLS.md b/docs/AdvisoryGnuTLS.md index 34643c1c..73f450b4 100644 --- a/docs/AdvisoryGnuTLS.md +++ b/docs/AdvisoryGnuTLS.md @@ -1,5 +1,6 @@ # AdvisoryGnuTLS +advisory.GnuTLS ## Properties diff --git a/docs/AdvisoryGoCredits.md b/docs/AdvisoryGoCredits.md index c0057615..92e0adce 100644 --- a/docs/AdvisoryGoCredits.md +++ b/docs/AdvisoryGoCredits.md @@ -1,5 +1,6 @@ # AdvisoryGoCredits +advisory.GoCredits ## Properties diff --git a/docs/AdvisoryGoEvent.md b/docs/AdvisoryGoEvent.md index d9c0c099..1e9141e7 100644 --- a/docs/AdvisoryGoEvent.md +++ b/docs/AdvisoryGoEvent.md @@ -1,5 +1,6 @@ # AdvisoryGoEvent +advisory.GoEvent ## Properties diff --git a/docs/AdvisoryGoVulnAffected.md b/docs/AdvisoryGoVulnAffected.md index e90c07db..31780c87 100644 --- a/docs/AdvisoryGoVulnAffected.md +++ b/docs/AdvisoryGoVulnAffected.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnAffected +advisory.GoVulnAffected ## Properties diff --git a/docs/AdvisoryGoVulnDatabaseSpecific.md b/docs/AdvisoryGoVulnDatabaseSpecific.md index 8ac97568..d2e1e6b8 100644 --- a/docs/AdvisoryGoVulnDatabaseSpecific.md +++ b/docs/AdvisoryGoVulnDatabaseSpecific.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnDatabaseSpecific +advisory.GoVulnDatabaseSpecific ## Properties diff --git a/docs/AdvisoryGoVulnEcosystemSpecific.md b/docs/AdvisoryGoVulnEcosystemSpecific.md index c90131f6..0e0029b9 100644 --- a/docs/AdvisoryGoVulnEcosystemSpecific.md +++ b/docs/AdvisoryGoVulnEcosystemSpecific.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnEcosystemSpecific +advisory.GoVulnEcosystemSpecific ## Properties diff --git a/docs/AdvisoryGoVulnImport.md b/docs/AdvisoryGoVulnImport.md index b6ceb900..d61a0005 100644 --- a/docs/AdvisoryGoVulnImport.md +++ b/docs/AdvisoryGoVulnImport.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnImport +advisory.GoVulnImport ## Properties diff --git a/docs/AdvisoryGoVulnJSON.md b/docs/AdvisoryGoVulnJSON.md index 011c9702..0344f31c 100644 --- a/docs/AdvisoryGoVulnJSON.md +++ b/docs/AdvisoryGoVulnJSON.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnJSON +advisory.GoVulnJSON ## Properties diff --git a/docs/AdvisoryGoVulnPackage.md b/docs/AdvisoryGoVulnPackage.md index b71448d6..78ec015a 100644 --- a/docs/AdvisoryGoVulnPackage.md +++ b/docs/AdvisoryGoVulnPackage.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnPackage +advisory.GoVulnPackage ## Properties diff --git a/docs/AdvisoryGoVulnRanges.md b/docs/AdvisoryGoVulnRanges.md index 693d4809..d2683748 100644 --- a/docs/AdvisoryGoVulnRanges.md +++ b/docs/AdvisoryGoVulnRanges.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnRanges +advisory.GoVulnRanges ## Properties diff --git a/docs/AdvisoryGoVulnReference.md b/docs/AdvisoryGoVulnReference.md index 0ea44ced..a159e7ff 100644 --- a/docs/AdvisoryGoVulnReference.md +++ b/docs/AdvisoryGoVulnReference.md @@ -1,5 +1,6 @@ # AdvisoryGoVulnReference +advisory.GoVulnReference ## Properties diff --git a/docs/AdvisoryGrafana.md b/docs/AdvisoryGrafana.md index 486e31cf..266be022 100644 --- a/docs/AdvisoryGrafana.md +++ b/docs/AdvisoryGrafana.md @@ -1,5 +1,6 @@ # AdvisoryGrafana +advisory.Grafana ## Properties diff --git a/docs/AdvisoryGreyNoiseDetection.md b/docs/AdvisoryGreyNoiseDetection.md index 402d87bb..39994418 100644 --- a/docs/AdvisoryGreyNoiseDetection.md +++ b/docs/AdvisoryGreyNoiseDetection.md @@ -1,5 +1,6 @@ # AdvisoryGreyNoiseDetection +advisory.GreyNoiseDetection ## Properties diff --git a/docs/AdvisoryGreyNoiseTags.md b/docs/AdvisoryGreyNoiseTags.md index f0daba1c..9d8bb913 100644 --- a/docs/AdvisoryGreyNoiseTags.md +++ b/docs/AdvisoryGreyNoiseTags.md @@ -1,5 +1,6 @@ # AdvisoryGreyNoiseTags +advisory.GreyNoiseTags ## Properties diff --git a/docs/AdvisoryHCL.md b/docs/AdvisoryHCL.md index 15d24492..9f72712b 100644 --- a/docs/AdvisoryHCL.md +++ b/docs/AdvisoryHCL.md @@ -1,5 +1,6 @@ # AdvisoryHCL +advisory.HCL ## Properties diff --git a/docs/AdvisoryHIKVision.md b/docs/AdvisoryHIKVision.md index 0fe9cede..f4bcedb7 100644 --- a/docs/AdvisoryHIKVision.md +++ b/docs/AdvisoryHIKVision.md @@ -1,5 +1,6 @@ # AdvisoryHIKVision +advisory.HIKVision ## Properties diff --git a/docs/AdvisoryHKCert.md b/docs/AdvisoryHKCert.md index 4c365d62..34e21442 100644 --- a/docs/AdvisoryHKCert.md +++ b/docs/AdvisoryHKCert.md @@ -1,5 +1,6 @@ # AdvisoryHKCert +advisory.HKCert ## Properties diff --git a/docs/AdvisoryHMS.md b/docs/AdvisoryHMS.md index 3d29f442..e5788f9e 100644 --- a/docs/AdvisoryHMS.md +++ b/docs/AdvisoryHMS.md @@ -1,5 +1,6 @@ # AdvisoryHMS +advisory.HMS ## Properties diff --git a/docs/AdvisoryHP.md b/docs/AdvisoryHP.md index af973e5b..4e609c9f 100644 --- a/docs/AdvisoryHP.md +++ b/docs/AdvisoryHP.md @@ -1,5 +1,6 @@ # AdvisoryHP +advisory.HP ## Properties diff --git a/docs/AdvisoryHPE.md b/docs/AdvisoryHPE.md index 388d3867..39cc8afa 100644 --- a/docs/AdvisoryHPE.md +++ b/docs/AdvisoryHPE.md @@ -1,5 +1,6 @@ # AdvisoryHPE +advisory.HPE ## Properties diff --git a/docs/AdvisoryHacktivity.md b/docs/AdvisoryHacktivity.md index ebfa6c3c..ce3e650e 100644 --- a/docs/AdvisoryHacktivity.md +++ b/docs/AdvisoryHacktivity.md @@ -1,5 +1,6 @@ # AdvisoryHacktivity +advisory.Hacktivity ## Properties diff --git a/docs/AdvisoryHardwareUpdate.md b/docs/AdvisoryHardwareUpdate.md index af179220..33409afb 100644 --- a/docs/AdvisoryHardwareUpdate.md +++ b/docs/AdvisoryHardwareUpdate.md @@ -1,5 +1,6 @@ # AdvisoryHardwareUpdate +advisory.HardwareUpdate ## Properties diff --git a/docs/AdvisoryHarmonyOS.md b/docs/AdvisoryHarmonyOS.md index 657800f3..a7da7e29 100644 --- a/docs/AdvisoryHarmonyOS.md +++ b/docs/AdvisoryHarmonyOS.md @@ -1,5 +1,6 @@ # AdvisoryHarmonyOS +advisory.HarmonyOS ## Properties diff --git a/docs/AdvisoryHashiCorp.md b/docs/AdvisoryHashiCorp.md index 9fffd1d5..9b103867 100644 --- a/docs/AdvisoryHashiCorp.md +++ b/docs/AdvisoryHashiCorp.md @@ -1,5 +1,6 @@ # AdvisoryHashiCorp +advisory.HashiCorp ## Properties diff --git a/docs/AdvisoryHaskellAffected.md b/docs/AdvisoryHaskellAffected.md index 2771bac2..f1e28fa4 100644 --- a/docs/AdvisoryHaskellAffected.md +++ b/docs/AdvisoryHaskellAffected.md @@ -1,5 +1,6 @@ # AdvisoryHaskellAffected +advisory.HaskellAffected ## Properties diff --git a/docs/AdvisoryHaskellSADBAdvisory.md b/docs/AdvisoryHaskellSADBAdvisory.md index 8371bea1..a7bcee22 100644 --- a/docs/AdvisoryHaskellSADBAdvisory.md +++ b/docs/AdvisoryHaskellSADBAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryHaskellSADBAdvisory +advisory.HaskellSADBAdvisory ## Properties diff --git a/docs/AdvisoryHaskellVersion.md b/docs/AdvisoryHaskellVersion.md index 48fdc690..80ded5b0 100644 --- a/docs/AdvisoryHaskellVersion.md +++ b/docs/AdvisoryHaskellVersion.md @@ -1,5 +1,6 @@ # AdvisoryHaskellVersion +advisory.HaskellVersion ## Properties diff --git a/docs/AdvisoryHillromAdvisory.md b/docs/AdvisoryHillromAdvisory.md index 091eb905..dc483c1c 100644 --- a/docs/AdvisoryHillromAdvisory.md +++ b/docs/AdvisoryHillromAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryHillromAdvisory +advisory.HillromAdvisory ## Properties diff --git a/docs/AdvisoryHitachi.md b/docs/AdvisoryHitachi.md index eab061f9..b13068d9 100644 --- a/docs/AdvisoryHitachi.md +++ b/docs/AdvisoryHitachi.md @@ -1,5 +1,6 @@ # AdvisoryHitachi +advisory.Hitachi ## Properties diff --git a/docs/AdvisoryHitachiEnergy.md b/docs/AdvisoryHitachiEnergy.md index e805ec72..3a959cbf 100644 --- a/docs/AdvisoryHitachiEnergy.md +++ b/docs/AdvisoryHitachiEnergy.md @@ -1,5 +1,6 @@ # AdvisoryHitachiEnergy +advisory.HitachiEnergy ## Properties diff --git a/docs/AdvisoryHoneywell.md b/docs/AdvisoryHoneywell.md index ddd537b8..3a6fa303 100644 --- a/docs/AdvisoryHoneywell.md +++ b/docs/AdvisoryHoneywell.md @@ -1,5 +1,6 @@ # AdvisoryHoneywell +advisory.Honeywell ## Properties diff --git a/docs/AdvisoryHuawei.md b/docs/AdvisoryHuawei.md index f76759a8..080272b0 100644 --- a/docs/AdvisoryHuawei.md +++ b/docs/AdvisoryHuawei.md @@ -1,5 +1,6 @@ # AdvisoryHuawei +advisory.Huawei ## Properties diff --git a/docs/AdvisoryHuaweiEulerOS.md b/docs/AdvisoryHuaweiEulerOS.md index f23e6a15..4f64039e 100644 --- a/docs/AdvisoryHuaweiEulerOS.md +++ b/docs/AdvisoryHuaweiEulerOS.md @@ -1,5 +1,6 @@ # AdvisoryHuaweiEulerOS +advisory.HuaweiEulerOS ## Properties diff --git a/docs/AdvisoryHuaweiIPS.md b/docs/AdvisoryHuaweiIPS.md index 9d33a201..d191a372 100644 --- a/docs/AdvisoryHuaweiIPS.md +++ b/docs/AdvisoryHuaweiIPS.md @@ -1,5 +1,6 @@ # AdvisoryHuaweiIPS +advisory.HuaweiIPS ## Properties diff --git a/docs/AdvisoryIAVA.md b/docs/AdvisoryIAVA.md index 12d43e05..c4f4bc86 100644 --- a/docs/AdvisoryIAVA.md +++ b/docs/AdvisoryIAVA.md @@ -1,5 +1,6 @@ # AdvisoryIAVA +advisory.IAVA ## Properties diff --git a/docs/AdvisoryIBM.md b/docs/AdvisoryIBM.md index 4630afb2..f4179c2e 100644 --- a/docs/AdvisoryIBM.md +++ b/docs/AdvisoryIBM.md @@ -1,5 +1,6 @@ # AdvisoryIBM +advisory.IBM ## Properties diff --git a/docs/AdvisoryITW.md b/docs/AdvisoryITW.md index 7b625397..243dd279 100644 --- a/docs/AdvisoryITW.md +++ b/docs/AdvisoryITW.md @@ -1,5 +1,6 @@ # AdvisoryITW +advisory.ITW ## Properties diff --git a/docs/AdvisoryITWExploit.md b/docs/AdvisoryITWExploit.md index 670cf722..88dd3cde 100644 --- a/docs/AdvisoryITWExploit.md +++ b/docs/AdvisoryITWExploit.md @@ -1,5 +1,6 @@ # AdvisoryITWExploit +advisory.ITWExploit ## Properties diff --git a/docs/AdvisoryIVal.md b/docs/AdvisoryIVal.md index ae3991fa..532910af 100644 --- a/docs/AdvisoryIVal.md +++ b/docs/AdvisoryIVal.md @@ -1,5 +1,6 @@ # AdvisoryIVal +advisory.IVal ## Properties diff --git a/docs/AdvisoryIdemia.md b/docs/AdvisoryIdemia.md index 5f5880a6..79cb3d86 100644 --- a/docs/AdvisoryIdemia.md +++ b/docs/AdvisoryIdemia.md @@ -1,5 +1,6 @@ # AdvisoryIdemia +advisory.Idemia ## Properties diff --git a/docs/AdvisoryIgel.md b/docs/AdvisoryIgel.md index 740bd453..8fc52cb3 100644 --- a/docs/AdvisoryIgel.md +++ b/docs/AdvisoryIgel.md @@ -1,5 +1,6 @@ # AdvisoryIgel +advisory.Igel ## Properties diff --git a/docs/AdvisoryImpact.md b/docs/AdvisoryImpact.md index bf6df803..61877985 100644 --- a/docs/AdvisoryImpact.md +++ b/docs/AdvisoryImpact.md @@ -1,5 +1,6 @@ # AdvisoryImpact +advisory.Impact ## Properties diff --git a/docs/AdvisoryIncibeAdvisory.md b/docs/AdvisoryIncibeAdvisory.md index 3d0ade42..d765877c 100644 --- a/docs/AdvisoryIncibeAdvisory.md +++ b/docs/AdvisoryIncibeAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryIncibeAdvisory +advisory.IncibeAdvisory ## Properties diff --git a/docs/AdvisoryIntel.md b/docs/AdvisoryIntel.md index aa2a6fa6..16ffd751 100644 --- a/docs/AdvisoryIntel.md +++ b/docs/AdvisoryIntel.md @@ -1,5 +1,6 @@ # AdvisoryIntel +advisory.Intel ## Properties diff --git a/docs/AdvisoryIpIntelRecord.md b/docs/AdvisoryIpIntelRecord.md index 41f02edb..8fcb8588 100644 --- a/docs/AdvisoryIpIntelRecord.md +++ b/docs/AdvisoryIpIntelRecord.md @@ -1,5 +1,6 @@ # AdvisoryIpIntelRecord +advisory.IpIntelRecord ## Properties diff --git a/docs/AdvisoryIsraeliAlert.md b/docs/AdvisoryIsraeliAlert.md index db270bc1..c7c75c18 100644 --- a/docs/AdvisoryIsraeliAlert.md +++ b/docs/AdvisoryIsraeliAlert.md @@ -1,5 +1,6 @@ # AdvisoryIsraeliAlert +advisory.IsraeliAlert ## Properties diff --git a/docs/AdvisoryIsraeliVulnerability.md b/docs/AdvisoryIsraeliVulnerability.md index 31875ad7..7ee3dfc1 100644 --- a/docs/AdvisoryIsraeliVulnerability.md +++ b/docs/AdvisoryIsraeliVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryIsraeliVulnerability +advisory.IsraeliVulnerability ## Properties diff --git a/docs/AdvisoryIssued.md b/docs/AdvisoryIssued.md deleted file mode 100644 index e37cf3a2..00000000 --- a/docs/AdvisoryIssued.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryIssued - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryIssued from a JSON string -advisory_issued_instance = AdvisoryIssued.from_json(json) -# print the JSON string representation of the object -print(AdvisoryIssued.to_json()) - -# convert the object into a dict -advisory_issued_dict = advisory_issued_instance.to_dict() -# create an instance of AdvisoryIssued from a dict -advisory_issued_from_dict = AdvisoryIssued.from_dict(advisory_issued_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryIstio.md b/docs/AdvisoryIstio.md index a085f5eb..695e2ff4 100644 --- a/docs/AdvisoryIstio.md +++ b/docs/AdvisoryIstio.md @@ -1,5 +1,6 @@ # AdvisoryIstio +advisory.Istio ## Properties diff --git a/docs/AdvisoryIvanti.md b/docs/AdvisoryIvanti.md index 20e39d29..c9f76533 100644 --- a/docs/AdvisoryIvanti.md +++ b/docs/AdvisoryIvanti.md @@ -1,5 +1,6 @@ # AdvisoryIvanti +advisory.Ivanti ## Properties diff --git a/docs/AdvisoryIvantiRSS.md b/docs/AdvisoryIvantiRSS.md index cb4fc058..bfb57f2a 100644 --- a/docs/AdvisoryIvantiRSS.md +++ b/docs/AdvisoryIvantiRSS.md @@ -1,5 +1,6 @@ # AdvisoryIvantiRSS +advisory.IvantiRSS ## Properties diff --git a/docs/AdvisoryJFrog.md b/docs/AdvisoryJFrog.md index 381603db..92eb606d 100644 --- a/docs/AdvisoryJFrog.md +++ b/docs/AdvisoryJFrog.md @@ -1,5 +1,6 @@ # AdvisoryJFrog +advisory.JFrog ## Properties diff --git a/docs/AdvisoryJNJAdvisory.md b/docs/AdvisoryJNJAdvisory.md index b6c41c38..f286dcfe 100644 --- a/docs/AdvisoryJNJAdvisory.md +++ b/docs/AdvisoryJNJAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryJNJAdvisory +advisory.JNJAdvisory ## Properties diff --git a/docs/AdvisoryJVN.md b/docs/AdvisoryJVN.md index be4354b7..51358d8b 100644 --- a/docs/AdvisoryJVN.md +++ b/docs/AdvisoryJVN.md @@ -1,5 +1,6 @@ # AdvisoryJVN +advisory.JVN ## Properties diff --git a/docs/AdvisoryJVNAdvisoryItem.md b/docs/AdvisoryJVNAdvisoryItem.md index 5a3b40bb..02b0879b 100644 --- a/docs/AdvisoryJVNAdvisoryItem.md +++ b/docs/AdvisoryJVNAdvisoryItem.md @@ -1,5 +1,6 @@ # AdvisoryJVNAdvisoryItem +advisory.JVNAdvisoryItem ## Properties diff --git a/docs/AdvisoryJVNCPE.md b/docs/AdvisoryJVNCPE.md index 54717209..0a029891 100644 --- a/docs/AdvisoryJVNCPE.md +++ b/docs/AdvisoryJVNCPE.md @@ -1,5 +1,6 @@ # AdvisoryJVNCPE +advisory.JVNCPE ## Properties diff --git a/docs/AdvisoryJVNReference.md b/docs/AdvisoryJVNReference.md index 036a4f2e..8b9ab52b 100644 --- a/docs/AdvisoryJVNReference.md +++ b/docs/AdvisoryJVNReference.md @@ -1,5 +1,6 @@ # AdvisoryJVNReference +advisory.JVNReference ## Properties diff --git a/docs/AdvisoryJenkins.md b/docs/AdvisoryJenkins.md index 5fd0dd0a..8bcf519c 100644 --- a/docs/AdvisoryJenkins.md +++ b/docs/AdvisoryJenkins.md @@ -1,5 +1,6 @@ # AdvisoryJenkins +advisory.Jenkins ## Properties diff --git a/docs/AdvisoryJetBrains.md b/docs/AdvisoryJetBrains.md index 32be3ef1..58d689dd 100644 --- a/docs/AdvisoryJetBrains.md +++ b/docs/AdvisoryJetBrains.md @@ -1,5 +1,6 @@ # AdvisoryJetBrains +advisory.JetBrains ## Properties diff --git a/docs/AdvisoryJohnsonControls.md b/docs/AdvisoryJohnsonControls.md index de97f423..10e38aa9 100644 --- a/docs/AdvisoryJohnsonControls.md +++ b/docs/AdvisoryJohnsonControls.md @@ -1,5 +1,6 @@ # AdvisoryJohnsonControls +advisory.JohnsonControls ## Properties diff --git a/docs/AdvisoryJuniper.md b/docs/AdvisoryJuniper.md index 7b6f8760..11ccb888 100644 --- a/docs/AdvisoryJuniper.md +++ b/docs/AdvisoryJuniper.md @@ -1,5 +1,6 @@ # AdvisoryJuniper +advisory.Juniper ## Properties diff --git a/docs/AdvisoryK8S.md b/docs/AdvisoryK8S.md index 06ba47bb..64be2f2b 100644 --- a/docs/AdvisoryK8S.md +++ b/docs/AdvisoryK8S.md @@ -1,5 +1,6 @@ # AdvisoryK8S +advisory.K8S ## Properties diff --git a/docs/AdvisoryKEVCatalogVulnerability.md b/docs/AdvisoryKEVCatalogVulnerability.md index 84429d30..695afb37 100644 --- a/docs/AdvisoryKEVCatalogVulnerability.md +++ b/docs/AdvisoryKEVCatalogVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryKEVCatalogVulnerability +advisory.KEVCatalogVulnerability ## Properties diff --git a/docs/AdvisoryKRCertAdvisory.md b/docs/AdvisoryKRCertAdvisory.md index ae3b1645..df749e85 100644 --- a/docs/AdvisoryKRCertAdvisory.md +++ b/docs/AdvisoryKRCertAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryKRCertAdvisory +advisory.KRCertAdvisory ## Properties diff --git a/docs/AdvisoryKasperskyICSCERTAdvisory.md b/docs/AdvisoryKasperskyICSCERTAdvisory.md index a0462208..836915fa 100644 --- a/docs/AdvisoryKasperskyICSCERTAdvisory.md +++ b/docs/AdvisoryKasperskyICSCERTAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryKasperskyICSCERTAdvisory +advisory.KasperskyICSCERTAdvisory ## Properties diff --git a/docs/AdvisoryKb.md b/docs/AdvisoryKb.md index e66a1add..2cdd79ef 100644 --- a/docs/AdvisoryKb.md +++ b/docs/AdvisoryKb.md @@ -1,5 +1,6 @@ # AdvisoryKb +advisory.Kb ## Properties diff --git a/docs/AdvisoryKbThreatDescription.md b/docs/AdvisoryKbThreatDescription.md index 91ff0ea6..945042d5 100644 --- a/docs/AdvisoryKbThreatDescription.md +++ b/docs/AdvisoryKbThreatDescription.md @@ -1,5 +1,6 @@ # AdvisoryKbThreatDescription +advisory.KbThreatDescription ## Properties diff --git a/docs/AdvisoryKoreLogic.md b/docs/AdvisoryKoreLogic.md index 296ea70a..e4a7169e 100644 --- a/docs/AdvisoryKoreLogic.md +++ b/docs/AdvisoryKoreLogic.md @@ -1,5 +1,6 @@ # AdvisoryKoreLogic +advisory.KoreLogic ## Properties diff --git a/docs/AdvisoryKunbus.md b/docs/AdvisoryKunbus.md index 196413e4..47c05312 100644 --- a/docs/AdvisoryKunbus.md +++ b/docs/AdvisoryKunbus.md @@ -1,5 +1,6 @@ # AdvisoryKunbus +advisory.Kunbus ## Properties diff --git a/docs/AdvisoryLG.md b/docs/AdvisoryLG.md index 90aaf467..5281f589 100644 --- a/docs/AdvisoryLG.md +++ b/docs/AdvisoryLG.md @@ -1,5 +1,6 @@ # AdvisoryLG +advisory.LG ## Properties diff --git a/docs/AdvisoryLantronix.md b/docs/AdvisoryLantronix.md index cfcf6002..2150b8c4 100644 --- a/docs/AdvisoryLantronix.md +++ b/docs/AdvisoryLantronix.md @@ -1,5 +1,6 @@ # AdvisoryLantronix +advisory.Lantronix ## Properties diff --git a/docs/AdvisoryLenovo.md b/docs/AdvisoryLenovo.md index b15561f3..bacebeec 100644 --- a/docs/AdvisoryLenovo.md +++ b/docs/AdvisoryLenovo.md @@ -1,5 +1,6 @@ # AdvisoryLenovo +advisory.Lenovo ## Properties diff --git a/docs/AdvisoryLexmarkAdvisory.md b/docs/AdvisoryLexmarkAdvisory.md index b743d671..f10430ba 100644 --- a/docs/AdvisoryLexmarkAdvisory.md +++ b/docs/AdvisoryLexmarkAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryLexmarkAdvisory +advisory.LexmarkAdvisory ## Properties diff --git a/docs/AdvisoryLibreOffice.md b/docs/AdvisoryLibreOffice.md index 04a586c3..78d5047d 100644 --- a/docs/AdvisoryLibreOffice.md +++ b/docs/AdvisoryLibreOffice.md @@ -1,5 +1,6 @@ # AdvisoryLibreOffice +advisory.LibreOffice ## Properties diff --git a/docs/AdvisoryLinux.md b/docs/AdvisoryLinux.md index 426301a8..dfc758d4 100644 --- a/docs/AdvisoryLinux.md +++ b/docs/AdvisoryLinux.md @@ -1,5 +1,6 @@ # AdvisoryLinux +advisory.Linux ## Properties diff --git a/docs/AdvisoryLogSource.md b/docs/AdvisoryLogSource.md index a907d0c5..e62acce1 100644 --- a/docs/AdvisoryLogSource.md +++ b/docs/AdvisoryLogSource.md @@ -1,5 +1,6 @@ # AdvisoryLogSource +advisory.LogSource ## Properties diff --git a/docs/AdvisoryLolAdvs.md b/docs/AdvisoryLolAdvs.md index d5d03ac0..181390b1 100644 --- a/docs/AdvisoryLolAdvs.md +++ b/docs/AdvisoryLolAdvs.md @@ -1,5 +1,6 @@ # AdvisoryLolAdvs +advisory.LolAdvs ## Properties diff --git a/docs/AdvisoryMACert.md b/docs/AdvisoryMACert.md index e9542246..c60ebea7 100644 --- a/docs/AdvisoryMACert.md +++ b/docs/AdvisoryMACert.md @@ -1,5 +1,6 @@ # AdvisoryMACert +advisory.MACert ## Properties diff --git a/docs/AdvisoryMAffected.md b/docs/AdvisoryMAffected.md index 7566b3e4..ea8bb3b0 100644 --- a/docs/AdvisoryMAffected.md +++ b/docs/AdvisoryMAffected.md @@ -1,5 +1,6 @@ # AdvisoryMAffected +advisory.MAffected ## Properties diff --git a/docs/AdvisoryMBranch.md b/docs/AdvisoryMBranch.md index 1ad02ed8..ffe8ecff 100644 --- a/docs/AdvisoryMBranch.md +++ b/docs/AdvisoryMBranch.md @@ -1,5 +1,6 @@ # AdvisoryMBranch +advisory.MBranch ## Properties diff --git a/docs/AdvisoryMCPEApplicability.md b/docs/AdvisoryMCPEApplicability.md index 12978945..0e80bafa 100644 --- a/docs/AdvisoryMCPEApplicability.md +++ b/docs/AdvisoryMCPEApplicability.md @@ -1,5 +1,6 @@ # AdvisoryMCPEApplicability +advisory.MCPEApplicability ## Properties diff --git a/docs/AdvisoryMCPEMatch.md b/docs/AdvisoryMCPEMatch.md index 1b4f5383..bdf2ee9e 100644 --- a/docs/AdvisoryMCPEMatch.md +++ b/docs/AdvisoryMCPEMatch.md @@ -1,5 +1,6 @@ # AdvisoryMCPEMatch +advisory.MCPEMatch ## Properties diff --git a/docs/AdvisoryMCna.md b/docs/AdvisoryMCna.md index 4f2ebff6..b8ca9229 100644 --- a/docs/AdvisoryMCna.md +++ b/docs/AdvisoryMCna.md @@ -1,5 +1,6 @@ # AdvisoryMCna +advisory.MCna ## Properties diff --git a/docs/AdvisoryMContainers.md b/docs/AdvisoryMContainers.md index 5d8b95c8..7d7b0831 100644 --- a/docs/AdvisoryMContainers.md +++ b/docs/AdvisoryMContainers.md @@ -1,5 +1,6 @@ # AdvisoryMContainers +advisory.MContainers ## Properties diff --git a/docs/AdvisoryMCveMetadata.md b/docs/AdvisoryMCveMetadata.md index 00984c5f..8cfc008a 100644 --- a/docs/AdvisoryMCveMetadata.md +++ b/docs/AdvisoryMCveMetadata.md @@ -1,5 +1,6 @@ # AdvisoryMCveMetadata +advisory.MCveMetadata ## Properties diff --git a/docs/AdvisoryMCvssV20.md b/docs/AdvisoryMCvssV20.md index fa00b17a..6ab8d04c 100644 --- a/docs/AdvisoryMCvssV20.md +++ b/docs/AdvisoryMCvssV20.md @@ -1,5 +1,6 @@ # AdvisoryMCvssV20 +advisory.MCvssV20 ## Properties diff --git a/docs/AdvisoryMCvssV30.md b/docs/AdvisoryMCvssV30.md index 49875a43..7906068e 100644 --- a/docs/AdvisoryMCvssV30.md +++ b/docs/AdvisoryMCvssV30.md @@ -1,5 +1,6 @@ # AdvisoryMCvssV30 +advisory.MCvssV30 ## Properties diff --git a/docs/AdvisoryMCvssV31.md b/docs/AdvisoryMCvssV31.md index a1a14dbe..ad9e6871 100644 --- a/docs/AdvisoryMCvssV31.md +++ b/docs/AdvisoryMCvssV31.md @@ -1,5 +1,6 @@ # AdvisoryMCvssV31 +advisory.MCvssV31 ## Properties diff --git a/docs/AdvisoryMCvssV40.md b/docs/AdvisoryMCvssV40.md index c9131b06..6f609621 100644 --- a/docs/AdvisoryMCvssV40.md +++ b/docs/AdvisoryMCvssV40.md @@ -1,5 +1,6 @@ # AdvisoryMCvssV40 +advisory.MCvssV40 ## Properties diff --git a/docs/AdvisoryMDescriptions.md b/docs/AdvisoryMDescriptions.md index 4dedcaf3..d8d7aa2c 100644 --- a/docs/AdvisoryMDescriptions.md +++ b/docs/AdvisoryMDescriptions.md @@ -1,5 +1,6 @@ # AdvisoryMDescriptions +advisory.MDescriptions ## Properties diff --git a/docs/AdvisoryMDocumentTracking.md b/docs/AdvisoryMDocumentTracking.md index 99535179..3dd63331 100644 --- a/docs/AdvisoryMDocumentTracking.md +++ b/docs/AdvisoryMDocumentTracking.md @@ -1,5 +1,6 @@ # AdvisoryMDocumentTracking +advisory.MDocumentTracking ## Properties diff --git a/docs/AdvisoryMEProduct.md b/docs/AdvisoryMEProduct.md index d516cabc..85d9640f 100644 --- a/docs/AdvisoryMEProduct.md +++ b/docs/AdvisoryMEProduct.md @@ -1,5 +1,6 @@ # AdvisoryMEProduct +advisory.MEProduct ## Properties diff --git a/docs/AdvisoryMFiles.md b/docs/AdvisoryMFiles.md index 98a03ea0..0c098808 100644 --- a/docs/AdvisoryMFiles.md +++ b/docs/AdvisoryMFiles.md @@ -1,5 +1,6 @@ # AdvisoryMFiles +advisory.MFiles ## Properties diff --git a/docs/AdvisoryMFullProductName.md b/docs/AdvisoryMFullProductName.md index 2c278821..fa5504f4 100644 --- a/docs/AdvisoryMFullProductName.md +++ b/docs/AdvisoryMFullProductName.md @@ -1,5 +1,6 @@ # AdvisoryMFullProductName +advisory.MFullProductName ## Properties diff --git a/docs/AdvisoryMISPValueNoID.md b/docs/AdvisoryMISPValueNoID.md index 4b22577d..ed33e14e 100644 --- a/docs/AdvisoryMISPValueNoID.md +++ b/docs/AdvisoryMISPValueNoID.md @@ -1,5 +1,6 @@ # AdvisoryMISPValueNoID +advisory.MISPValueNoID ## Properties diff --git a/docs/AdvisoryMITREAttackGroupNoID.md b/docs/AdvisoryMITREAttackGroupNoID.md index 9661c3b5..de81ad2f 100644 --- a/docs/AdvisoryMITREAttackGroupNoID.md +++ b/docs/AdvisoryMITREAttackGroupNoID.md @@ -1,5 +1,6 @@ # AdvisoryMITREAttackGroupNoID +advisory.MITREAttackGroupNoID ## Properties diff --git a/docs/AdvisoryMIdentification.md b/docs/AdvisoryMIdentification.md index a8bd1cc9..8e2afaff 100644 --- a/docs/AdvisoryMIdentification.md +++ b/docs/AdvisoryMIdentification.md @@ -1,5 +1,6 @@ # AdvisoryMIdentification +advisory.MIdentification ## Properties diff --git a/docs/AdvisoryMItem.md b/docs/AdvisoryMItem.md index a359ae8d..b688470c 100644 --- a/docs/AdvisoryMItem.md +++ b/docs/AdvisoryMItem.md @@ -1,5 +1,6 @@ # AdvisoryMItem +advisory.MItem ## Properties diff --git a/docs/AdvisoryMNodes.md b/docs/AdvisoryMNodes.md index d2fd206a..10946a29 100644 --- a/docs/AdvisoryMNodes.md +++ b/docs/AdvisoryMNodes.md @@ -1,5 +1,6 @@ # AdvisoryMNodes +advisory.MNodes ## Properties diff --git a/docs/AdvisoryMProblemTypes.md b/docs/AdvisoryMProblemTypes.md index f034b280..fbd56fff 100644 --- a/docs/AdvisoryMProblemTypes.md +++ b/docs/AdvisoryMProblemTypes.md @@ -1,5 +1,6 @@ # AdvisoryMProblemTypes +advisory.MProblemTypes ## Properties diff --git a/docs/AdvisoryMProductStatus.md b/docs/AdvisoryMProductStatus.md index 36c20055..d7e5f141 100644 --- a/docs/AdvisoryMProductStatus.md +++ b/docs/AdvisoryMProductStatus.md @@ -1,5 +1,6 @@ # AdvisoryMProductStatus +advisory.MProductStatus ## Properties diff --git a/docs/AdvisoryMProductTree.md b/docs/AdvisoryMProductTree.md index b221356d..5682c5a5 100644 --- a/docs/AdvisoryMProductTree.md +++ b/docs/AdvisoryMProductTree.md @@ -1,5 +1,6 @@ # AdvisoryMProductTree +advisory.MProductTree ## Properties diff --git a/docs/AdvisoryMProviderMetadata.md b/docs/AdvisoryMProviderMetadata.md index 0d8161bd..80633f95 100644 --- a/docs/AdvisoryMProviderMetadata.md +++ b/docs/AdvisoryMProviderMetadata.md @@ -1,5 +1,6 @@ # AdvisoryMProviderMetadata +OK ## Properties diff --git a/docs/AdvisoryMReference.md b/docs/AdvisoryMReference.md index 1b934463..b016daf9 100644 --- a/docs/AdvisoryMReference.md +++ b/docs/AdvisoryMReference.md @@ -1,5 +1,6 @@ # AdvisoryMReference +advisory.MReference ## Properties diff --git a/docs/AdvisoryMRemediation.md b/docs/AdvisoryMRemediation.md index c0238d54..7b4f8c4c 100644 --- a/docs/AdvisoryMRemediation.md +++ b/docs/AdvisoryMRemediation.md @@ -1,5 +1,6 @@ # AdvisoryMRemediation +advisory.MRemediation ## Properties diff --git a/docs/AdvisoryMSCVRF.md b/docs/AdvisoryMSCVRF.md index fb78ebb5..021ec8f0 100644 --- a/docs/AdvisoryMSCVRF.md +++ b/docs/AdvisoryMSCVRF.md @@ -1,5 +1,6 @@ # AdvisoryMSCVRF +advisory.MSCVRF ## Properties diff --git a/docs/AdvisoryMSDocumentTitle.md b/docs/AdvisoryMSDocumentTitle.md index 93f38b88..a21b7219 100644 --- a/docs/AdvisoryMSDocumentTitle.md +++ b/docs/AdvisoryMSDocumentTitle.md @@ -1,5 +1,6 @@ # AdvisoryMSDocumentTitle +advisory.MSDocumentTitle ## Properties diff --git a/docs/AdvisoryMVersion.md b/docs/AdvisoryMVersion.md index a1709241..e1c18d16 100644 --- a/docs/AdvisoryMVersion.md +++ b/docs/AdvisoryMVersion.md @@ -1,5 +1,6 @@ # AdvisoryMVersion +advisory.MVersion ## Properties diff --git a/docs/AdvisoryMVulnerability.md b/docs/AdvisoryMVulnerability.md index c6ce8ada..0d7b7863 100644 --- a/docs/AdvisoryMVulnerability.md +++ b/docs/AdvisoryMVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryMVulnerability +advisory.MVulnerability ## Properties diff --git a/docs/AdvisoryMaliciousPackage.md b/docs/AdvisoryMaliciousPackage.md index 3bd3aab6..09dafa74 100644 --- a/docs/AdvisoryMaliciousPackage.md +++ b/docs/AdvisoryMaliciousPackage.md @@ -1,5 +1,6 @@ # AdvisoryMaliciousPackage +advisory.MaliciousPackage ## Properties diff --git a/docs/AdvisoryManageEngine.md b/docs/AdvisoryManageEngine.md index 20f3c916..95f3d81a 100644 --- a/docs/AdvisoryManageEngine.md +++ b/docs/AdvisoryManageEngine.md @@ -1,5 +1,6 @@ # AdvisoryManageEngine +advisory.ManageEngine ## Properties diff --git a/docs/AdvisoryManageEngineAdvisory.md b/docs/AdvisoryManageEngineAdvisory.md index 8f166661..b5e0d7c7 100644 --- a/docs/AdvisoryManageEngineAdvisory.md +++ b/docs/AdvisoryManageEngineAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryManageEngineAdvisory +advisory.ManageEngineAdvisory ## Properties diff --git a/docs/AdvisoryMbedTLS.md b/docs/AdvisoryMbedTLS.md index c774feff..8fefa7a2 100644 --- a/docs/AdvisoryMbedTLS.md +++ b/docs/AdvisoryMbedTLS.md @@ -1,5 +1,6 @@ # AdvisoryMbedTLS +advisory.MbedTLS ## Properties diff --git a/docs/AdvisoryMcAfee.md b/docs/AdvisoryMcAfee.md index a24a63c0..fd2be013 100644 --- a/docs/AdvisoryMcAfee.md +++ b/docs/AdvisoryMcAfee.md @@ -1,5 +1,6 @@ # AdvisoryMcAfee +advisory.McAfee ## Properties diff --git a/docs/AdvisoryMcAfeeScore.md b/docs/AdvisoryMcAfeeScore.md index 26211ef1..e3d1aae4 100644 --- a/docs/AdvisoryMcAfeeScore.md +++ b/docs/AdvisoryMcAfeeScore.md @@ -1,5 +1,6 @@ # AdvisoryMcAfeeScore +advisory.McAfeeScore ## Properties diff --git a/docs/AdvisoryMediatek.md b/docs/AdvisoryMediatek.md index 0a15b8f5..f3a31019 100644 --- a/docs/AdvisoryMediatek.md +++ b/docs/AdvisoryMediatek.md @@ -1,5 +1,6 @@ # AdvisoryMediatek +advisory.Mediatek ## Properties diff --git a/docs/AdvisoryMedtronicAdvisory.md b/docs/AdvisoryMedtronicAdvisory.md index a207d89f..fa32171a 100644 --- a/docs/AdvisoryMedtronicAdvisory.md +++ b/docs/AdvisoryMedtronicAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryMedtronicAdvisory +advisory.MedtronicAdvisory ## Properties diff --git a/docs/AdvisoryMendix.md b/docs/AdvisoryMendix.md index 8a4a6e1e..7130e4ea 100644 --- a/docs/AdvisoryMendix.md +++ b/docs/AdvisoryMendix.md @@ -1,5 +1,6 @@ # AdvisoryMendix +advisory.Mendix ## Properties diff --git a/docs/AdvisoryMetaAdvisories.md b/docs/AdvisoryMetaAdvisories.md index 239a6d10..68bcd28f 100644 --- a/docs/AdvisoryMetaAdvisories.md +++ b/docs/AdvisoryMetaAdvisories.md @@ -1,5 +1,6 @@ # AdvisoryMetaAdvisories +advisory.MetaAdvisories ## Properties diff --git a/docs/AdvisoryMetaData.md b/docs/AdvisoryMetaData.md index ce39925f..0379313c 100644 --- a/docs/AdvisoryMetaData.md +++ b/docs/AdvisoryMetaData.md @@ -1,5 +1,6 @@ # AdvisoryMetaData +advisory.MetaData ## Properties diff --git a/docs/AdvisoryMetasploitExploit.md b/docs/AdvisoryMetasploitExploit.md index b9d3c4bc..72fdb793 100644 --- a/docs/AdvisoryMetasploitExploit.md +++ b/docs/AdvisoryMetasploitExploit.md @@ -1,5 +1,6 @@ # AdvisoryMetasploitExploit +advisory.MetasploitExploit ## Properties diff --git a/docs/AdvisoryMetric.md b/docs/AdvisoryMetric.md index 2e66e162..c29c4486 100644 --- a/docs/AdvisoryMetric.md +++ b/docs/AdvisoryMetric.md @@ -1,5 +1,6 @@ # AdvisoryMetric +advisory.Metric ## Properties diff --git a/docs/AdvisoryMetricScenario.md b/docs/AdvisoryMetricScenario.md index 549d47a8..e2926c64 100644 --- a/docs/AdvisoryMetricScenario.md +++ b/docs/AdvisoryMetricScenario.md @@ -1,5 +1,6 @@ # AdvisoryMetricScenario +advisory.MetricScenario ## Properties diff --git a/docs/AdvisoryMetricsOther.md b/docs/AdvisoryMetricsOther.md index 0d3e92b3..cd8a2641 100644 --- a/docs/AdvisoryMetricsOther.md +++ b/docs/AdvisoryMetricsOther.md @@ -1,5 +1,6 @@ # AdvisoryMetricsOther +advisory.MetricsOther ## Properties diff --git a/docs/AdvisoryMicrosoftCSAF.md b/docs/AdvisoryMicrosoftCSAF.md index eac90b7c..55cea0a1 100644 --- a/docs/AdvisoryMicrosoftCSAF.md +++ b/docs/AdvisoryMicrosoftCSAF.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftCSAF +advisory.MicrosoftCSAF ## Properties diff --git a/docs/AdvisoryMicrosoftCVRF.md b/docs/AdvisoryMicrosoftCVRF.md index 8e3b16c5..0dd11cc9 100644 --- a/docs/AdvisoryMicrosoftCVRF.md +++ b/docs/AdvisoryMicrosoftCVRF.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftCVRF +advisory.MicrosoftCVRF ## Properties diff --git a/docs/AdvisoryMicrosoftDriverBlockList.md b/docs/AdvisoryMicrosoftDriverBlockList.md index 1edda679..a9a94db6 100644 --- a/docs/AdvisoryMicrosoftDriverBlockList.md +++ b/docs/AdvisoryMicrosoftDriverBlockList.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftDriverBlockList +advisory.MicrosoftDriverBlockList ## Properties @@ -7,7 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **date_added** | **str** | | [optional] **file_id** | **str** | From FileAttrib or Deny | [optional] -**file_metadata** | [**AdvisoryMicrosoftFileMetadata**](AdvisoryMicrosoftFileMetadata.md) | File-level metadata | [optional] +**file_metadata** | [**AdvisoryMicrosoftFileMetadata**](AdvisoryMicrosoftFileMetadata.md) | | [optional] ## Example diff --git a/docs/AdvisoryMicrosoftFileMetadata.md b/docs/AdvisoryMicrosoftFileMetadata.md index 538a720b..924fb0d6 100644 --- a/docs/AdvisoryMicrosoftFileMetadata.md +++ b/docs/AdvisoryMicrosoftFileMetadata.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftFileMetadata +File-level metadata ## Properties diff --git a/docs/AdvisoryMicrosoftKb.md b/docs/AdvisoryMicrosoftKb.md index dc216386..c9b81776 100644 --- a/docs/AdvisoryMicrosoftKb.md +++ b/docs/AdvisoryMicrosoftKb.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftKb +advisory.MicrosoftKb ## Properties diff --git a/docs/AdvisoryMikrotik.md b/docs/AdvisoryMikrotik.md index b9f7b15a..b9532ed4 100644 --- a/docs/AdvisoryMikrotik.md +++ b/docs/AdvisoryMikrotik.md @@ -1,5 +1,6 @@ # AdvisoryMikrotik +advisory.Mikrotik ## Properties diff --git a/docs/AdvisoryMindray.md b/docs/AdvisoryMindray.md index de125115..3115eb7e 100644 --- a/docs/AdvisoryMindray.md +++ b/docs/AdvisoryMindray.md @@ -1,5 +1,6 @@ # AdvisoryMindray +advisory.Mindray ## Properties diff --git a/docs/AdvisoryMispMeta.md b/docs/AdvisoryMispMeta.md index 62cf3cd0..436b0431 100644 --- a/docs/AdvisoryMispMeta.md +++ b/docs/AdvisoryMispMeta.md @@ -1,5 +1,6 @@ # AdvisoryMispMeta +advisory.MispMeta ## Properties diff --git a/docs/AdvisoryMispRelatedItem.md b/docs/AdvisoryMispRelatedItem.md index 356fc808..eab40ed6 100644 --- a/docs/AdvisoryMispRelatedItem.md +++ b/docs/AdvisoryMispRelatedItem.md @@ -1,5 +1,6 @@ # AdvisoryMispRelatedItem +advisory.MispRelatedItem ## Properties diff --git a/docs/AdvisoryMispValue.md b/docs/AdvisoryMispValue.md index d97686cc..d75f0e62 100644 --- a/docs/AdvisoryMispValue.md +++ b/docs/AdvisoryMispValue.md @@ -1,5 +1,6 @@ # AdvisoryMispValue +advisory.MispValue ## Properties diff --git a/docs/AdvisoryMitel.md b/docs/AdvisoryMitel.md index 009f1c1c..ed4184ee 100644 --- a/docs/AdvisoryMitel.md +++ b/docs/AdvisoryMitel.md @@ -1,5 +1,6 @@ # AdvisoryMitel +advisory.Mitel ## Properties diff --git a/docs/AdvisoryMitreAttackRef.md b/docs/AdvisoryMitreAttackRef.md index ad1923ed..4cdbe5dd 100644 --- a/docs/AdvisoryMitreAttackRef.md +++ b/docs/AdvisoryMitreAttackRef.md @@ -1,5 +1,6 @@ # AdvisoryMitreAttackRef +advisory.MitreAttackRef ## Properties diff --git a/docs/AdvisoryMitreAttackTechWithRefs.md b/docs/AdvisoryMitreAttackTechWithRefs.md index 9068c391..bdae4cf1 100644 --- a/docs/AdvisoryMitreAttackTechWithRefs.md +++ b/docs/AdvisoryMitreAttackTechWithRefs.md @@ -1,5 +1,6 @@ # AdvisoryMitreAttackTechWithRefs +advisory.MitreAttackTechWithRefs ## Properties diff --git a/docs/AdvisoryMitreAttackTechnique.md b/docs/AdvisoryMitreAttackTechnique.md index 701fb682..85066d4d 100644 --- a/docs/AdvisoryMitreAttackTechnique.md +++ b/docs/AdvisoryMitreAttackTechnique.md @@ -1,5 +1,6 @@ # AdvisoryMitreAttackTechnique +advisory.MitreAttackTechnique ## Properties diff --git a/docs/AdvisoryMitreCVEListV5.md b/docs/AdvisoryMitreCVEListV5.md index ad067ed6..0700df25 100644 --- a/docs/AdvisoryMitreCVEListV5.md +++ b/docs/AdvisoryMitreCVEListV5.md @@ -1,5 +1,6 @@ # AdvisoryMitreCVEListV5 +advisory.MitreCVEListV5 ## Properties diff --git a/docs/AdvisoryMitreCVEListV5Ref.md b/docs/AdvisoryMitreCVEListV5Ref.md index b242e7e0..ad94ef80 100644 --- a/docs/AdvisoryMitreCVEListV5Ref.md +++ b/docs/AdvisoryMitreCVEListV5Ref.md @@ -1,5 +1,6 @@ # AdvisoryMitreCVEListV5Ref +advisory.MitreCVEListV5Ref ## Properties diff --git a/docs/AdvisoryMitreGroupCTI.md b/docs/AdvisoryMitreGroupCTI.md index 9ef386cb..491acdd2 100644 --- a/docs/AdvisoryMitreGroupCTI.md +++ b/docs/AdvisoryMitreGroupCTI.md @@ -1,5 +1,6 @@ # AdvisoryMitreGroupCTI +advisory.MitreGroupCTI ## Properties diff --git a/docs/AdvisoryMitsubishiElectricAdvisory.md b/docs/AdvisoryMitsubishiElectricAdvisory.md index 9e9f4b8e..9aef82af 100644 --- a/docs/AdvisoryMitsubishiElectricAdvisory.md +++ b/docs/AdvisoryMitsubishiElectricAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryMitsubishiElectricAdvisory +advisory.MitsubishiElectricAdvisory ## Properties diff --git a/docs/AdvisoryMongoDB.md b/docs/AdvisoryMongoDB.md index ce9d18ee..b6b19209 100644 --- a/docs/AdvisoryMongoDB.md +++ b/docs/AdvisoryMongoDB.md @@ -1,5 +1,6 @@ # AdvisoryMongoDB +advisory.MongoDB ## Properties diff --git a/docs/AdvisoryMoxaAdvisory.md b/docs/AdvisoryMoxaAdvisory.md index dc890502..be729d26 100644 --- a/docs/AdvisoryMoxaAdvisory.md +++ b/docs/AdvisoryMoxaAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryMoxaAdvisory +advisory.MoxaAdvisory ## Properties diff --git a/docs/AdvisoryMozillaAdvisory.md b/docs/AdvisoryMozillaAdvisory.md index 8077f560..a9d16bb4 100644 --- a/docs/AdvisoryMozillaAdvisory.md +++ b/docs/AdvisoryMozillaAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryMozillaAdvisory +advisory.MozillaAdvisory ## Properties diff --git a/docs/AdvisoryMozillaComponent.md b/docs/AdvisoryMozillaComponent.md index 9e908ea8..cef92060 100644 --- a/docs/AdvisoryMozillaComponent.md +++ b/docs/AdvisoryMozillaComponent.md @@ -1,5 +1,6 @@ # AdvisoryMozillaComponent +advisory.MozillaComponent ## Properties diff --git a/docs/AdvisoryNCSC.md b/docs/AdvisoryNCSC.md index 92cd2165..6fcba554 100644 --- a/docs/AdvisoryNCSC.md +++ b/docs/AdvisoryNCSC.md @@ -1,5 +1,6 @@ # AdvisoryNCSC +advisory.NCSC ## Properties diff --git a/docs/AdvisoryNCSCCVE.md b/docs/AdvisoryNCSCCVE.md index 709bbbc0..48260a00 100644 --- a/docs/AdvisoryNCSCCVE.md +++ b/docs/AdvisoryNCSCCVE.md @@ -1,5 +1,6 @@ # AdvisoryNCSCCVE +advisory.NCSCCVE ## Properties diff --git a/docs/AdvisoryNEC.md b/docs/AdvisoryNEC.md index 9a7f3c17..d70bb785 100644 --- a/docs/AdvisoryNEC.md +++ b/docs/AdvisoryNEC.md @@ -1,5 +1,6 @@ # AdvisoryNEC +advisory.NEC ## Properties diff --git a/docs/AdvisoryNHS.md b/docs/AdvisoryNHS.md index 49889c45..2a3ff71b 100644 --- a/docs/AdvisoryNHS.md +++ b/docs/AdvisoryNHS.md @@ -1,5 +1,6 @@ # AdvisoryNHS +advisory.NHS ## Properties diff --git a/docs/AdvisoryNI.md b/docs/AdvisoryNI.md index f5edb582..c2eb2780 100644 --- a/docs/AdvisoryNI.md +++ b/docs/AdvisoryNI.md @@ -1,5 +1,6 @@ # AdvisoryNI +advisory.NI ## Properties diff --git a/docs/AdvisoryNISTControl.md b/docs/AdvisoryNISTControl.md index e281ea9b..745a3712 100644 --- a/docs/AdvisoryNISTControl.md +++ b/docs/AdvisoryNISTControl.md @@ -1,5 +1,6 @@ # AdvisoryNISTControl +advisory.NISTControl ## Properties diff --git a/docs/AdvisoryNTP.md b/docs/AdvisoryNTP.md index 119f870d..f3e45f52 100644 --- a/docs/AdvisoryNTP.md +++ b/docs/AdvisoryNTP.md @@ -1,5 +1,6 @@ # AdvisoryNTP +advisory.NTP ## Properties diff --git a/docs/AdvisoryNVD20CVECPEMatch.md b/docs/AdvisoryNVD20CVECPEMatch.md index 65ab5a73..0c0586b7 100644 --- a/docs/AdvisoryNVD20CVECPEMatch.md +++ b/docs/AdvisoryNVD20CVECPEMatch.md @@ -1,5 +1,6 @@ # AdvisoryNVD20CVECPEMatch +advisory.NVD20CVECPEMatch ## Properties diff --git a/docs/AdvisoryNVD20Configuration.md b/docs/AdvisoryNVD20Configuration.md index ba89e9d2..f6049190 100644 --- a/docs/AdvisoryNVD20Configuration.md +++ b/docs/AdvisoryNVD20Configuration.md @@ -1,5 +1,6 @@ # AdvisoryNVD20Configuration +advisory.NVD20Configuration ## Properties diff --git a/docs/AdvisoryNVD20Node.md b/docs/AdvisoryNVD20Node.md index 1b896eb1..06f8b5d5 100644 --- a/docs/AdvisoryNVD20Node.md +++ b/docs/AdvisoryNVD20Node.md @@ -1,5 +1,6 @@ # AdvisoryNVD20Node +advisory.NVD20Node ## Properties diff --git a/docs/AdvisoryNVD20Source.md b/docs/AdvisoryNVD20Source.md index d99048e0..65a30dd9 100644 --- a/docs/AdvisoryNVD20Source.md +++ b/docs/AdvisoryNVD20Source.md @@ -1,5 +1,6 @@ # AdvisoryNVD20Source +advisory.NVD20Source ## Properties diff --git a/docs/AdvisoryNVDCPEDictionary.md b/docs/AdvisoryNVDCPEDictionary.md index f53f5109..60a1cd94 100644 --- a/docs/AdvisoryNVDCPEDictionary.md +++ b/docs/AdvisoryNVDCPEDictionary.md @@ -1,5 +1,6 @@ # AdvisoryNVDCPEDictionary +advisory.NVDCPEDictionary ## Properties diff --git a/docs/AdvisoryNZAdvisory.md b/docs/AdvisoryNZAdvisory.md index af45108f..865d4c67 100644 --- a/docs/AdvisoryNZAdvisory.md +++ b/docs/AdvisoryNZAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryNZAdvisory +advisory.NZAdvisory ## Properties diff --git a/docs/AdvisoryNaver.md b/docs/AdvisoryNaver.md index 9df47408..dd033b8f 100644 --- a/docs/AdvisoryNaver.md +++ b/docs/AdvisoryNaver.md @@ -1,5 +1,6 @@ # AdvisoryNaver +advisory.Naver ## Properties diff --git a/docs/AdvisoryNessus.md b/docs/AdvisoryNessus.md index 19119ca0..0c46a145 100644 --- a/docs/AdvisoryNessus.md +++ b/docs/AdvisoryNessus.md @@ -1,5 +1,6 @@ # AdvisoryNessus +advisory.Nessus ## Properties diff --git a/docs/AdvisoryNetApp.md b/docs/AdvisoryNetApp.md index c1793988..c10b845b 100644 --- a/docs/AdvisoryNetApp.md +++ b/docs/AdvisoryNetApp.md @@ -1,5 +1,6 @@ # AdvisoryNetApp +advisory.NetApp ## Properties diff --git a/docs/AdvisoryNetatalk.md b/docs/AdvisoryNetatalk.md index d1228cd7..77de688e 100644 --- a/docs/AdvisoryNetatalk.md +++ b/docs/AdvisoryNetatalk.md @@ -1,5 +1,6 @@ # AdvisoryNetatalk +advisory.Netatalk ## Properties diff --git a/docs/AdvisoryNetgate.md b/docs/AdvisoryNetgate.md index 0e775f3d..7a0bae5e 100644 --- a/docs/AdvisoryNetgate.md +++ b/docs/AdvisoryNetgate.md @@ -1,5 +1,6 @@ # AdvisoryNetgate +advisory.Netgate ## Properties diff --git a/docs/AdvisoryNetgear.md b/docs/AdvisoryNetgear.md index 1dfece3e..439aba01 100644 --- a/docs/AdvisoryNetgear.md +++ b/docs/AdvisoryNetgear.md @@ -1,5 +1,6 @@ # AdvisoryNetgear +advisory.Netgear ## Properties diff --git a/docs/AdvisoryNetskope.md b/docs/AdvisoryNetskope.md index 66219669..fbcbd64b 100644 --- a/docs/AdvisoryNetskope.md +++ b/docs/AdvisoryNetskope.md @@ -1,5 +1,6 @@ # AdvisoryNetskope +advisory.Netskope ## Properties diff --git a/docs/AdvisoryNexpose.md b/docs/AdvisoryNexpose.md index 349771ec..bfdb4431 100644 --- a/docs/AdvisoryNexpose.md +++ b/docs/AdvisoryNexpose.md @@ -1,5 +1,6 @@ # AdvisoryNexpose +advisory.Nexpose ## Properties diff --git a/docs/AdvisoryNginxAdvisory.md b/docs/AdvisoryNginxAdvisory.md index d80db06e..ec7e7c94 100644 --- a/docs/AdvisoryNginxAdvisory.md +++ b/docs/AdvisoryNginxAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryNginxAdvisory +advisory.NginxAdvisory ## Properties diff --git a/docs/AdvisoryNodeAuthor.md b/docs/AdvisoryNodeAuthor.md index 2f3704fc..07e231ea 100644 --- a/docs/AdvisoryNodeAuthor.md +++ b/docs/AdvisoryNodeAuthor.md @@ -1,5 +1,6 @@ # AdvisoryNodeAuthor +advisory.NodeAuthor ## Properties diff --git a/docs/AdvisoryNodeJS.md b/docs/AdvisoryNodeJS.md index 4ab56921..820ab903 100644 --- a/docs/AdvisoryNodeJS.md +++ b/docs/AdvisoryNodeJS.md @@ -1,5 +1,6 @@ # AdvisoryNodeJS +advisory.NodeJS ## Properties diff --git a/docs/AdvisoryNodeSecurity.md b/docs/AdvisoryNodeSecurity.md index 1e2f034f..3f34dcfe 100644 --- a/docs/AdvisoryNodeSecurity.md +++ b/docs/AdvisoryNodeSecurity.md @@ -1,5 +1,6 @@ # AdvisoryNodeSecurity +advisory.NodeSecurity ## Properties diff --git a/docs/AdvisoryNokia.md b/docs/AdvisoryNokia.md index aec01bdb..a574c5af 100644 --- a/docs/AdvisoryNokia.md +++ b/docs/AdvisoryNokia.md @@ -1,5 +1,6 @@ # AdvisoryNokia +advisory.Nokia ## Properties diff --git a/docs/AdvisoryNote.md b/docs/AdvisoryNote.md index d841c949..dcf9e271 100644 --- a/docs/AdvisoryNote.md +++ b/docs/AdvisoryNote.md @@ -1,5 +1,6 @@ # AdvisoryNote +advisory.Note ## Properties diff --git a/docs/AdvisoryNotePadPlusPlus.md b/docs/AdvisoryNotePadPlusPlus.md index 3e34c4ea..970740f4 100644 --- a/docs/AdvisoryNotePadPlusPlus.md +++ b/docs/AdvisoryNotePadPlusPlus.md @@ -1,5 +1,6 @@ # AdvisoryNotePadPlusPlus +advisory.NotePadPlusPlus ## Properties diff --git a/docs/AdvisoryNozomi.md b/docs/AdvisoryNozomi.md index d66f7910..9f57beca 100644 --- a/docs/AdvisoryNozomi.md +++ b/docs/AdvisoryNozomi.md @@ -1,5 +1,6 @@ # AdvisoryNozomi +advisory.Nozomi ## Properties diff --git a/docs/AdvisoryNuclei.md b/docs/AdvisoryNuclei.md index 88734654..425d8c46 100644 --- a/docs/AdvisoryNuclei.md +++ b/docs/AdvisoryNuclei.md @@ -1,5 +1,6 @@ # AdvisoryNuclei +advisory.Nuclei ## Properties diff --git a/docs/AdvisoryNvidiaRevision.md b/docs/AdvisoryNvidiaRevision.md index bf037325..336003c6 100644 --- a/docs/AdvisoryNvidiaRevision.md +++ b/docs/AdvisoryNvidiaRevision.md @@ -1,5 +1,6 @@ # AdvisoryNvidiaRevision +advisory.NvidiaRevision ## Properties diff --git a/docs/AdvisoryOCurl.md b/docs/AdvisoryOCurl.md index 4e58be3a..b9dc7dfe 100644 --- a/docs/AdvisoryOCurl.md +++ b/docs/AdvisoryOCurl.md @@ -1,5 +1,6 @@ # AdvisoryOCurl +advisory.OCurl ## Properties diff --git a/docs/AdvisoryOSV.md b/docs/AdvisoryOSV.md index f52864e4..c82d02e8 100644 --- a/docs/AdvisoryOSV.md +++ b/docs/AdvisoryOSV.md @@ -1,5 +1,6 @@ # AdvisoryOSV +advisory.OSV ## Properties diff --git a/docs/AdvisoryOSVObj.md b/docs/AdvisoryOSVObj.md index d5d5aa63..fcd97f6d 100644 --- a/docs/AdvisoryOSVObj.md +++ b/docs/AdvisoryOSVObj.md @@ -1,5 +1,6 @@ # AdvisoryOSVObj +advisory.OSVObj ## Properties diff --git a/docs/AdvisoryOSVPackage.md b/docs/AdvisoryOSVPackage.md index eb33f472..902d63c8 100644 --- a/docs/AdvisoryOSVPackage.md +++ b/docs/AdvisoryOSVPackage.md @@ -1,5 +1,6 @@ # AdvisoryOSVPackage +advisory.OSVPackage ## Properties diff --git a/docs/AdvisoryOSVReference.md b/docs/AdvisoryOSVReference.md index 66b8e9b5..9723a351 100644 --- a/docs/AdvisoryOSVReference.md +++ b/docs/AdvisoryOSVReference.md @@ -1,5 +1,6 @@ # AdvisoryOSVReference +advisory.OSVReference ## Properties diff --git a/docs/AdvisoryOTRS.md b/docs/AdvisoryOTRS.md index 77ac20b1..635485d0 100644 --- a/docs/AdvisoryOTRS.md +++ b/docs/AdvisoryOTRS.md @@ -1,5 +1,6 @@ # AdvisoryOTRS +advisory.OTRS ## Properties diff --git a/docs/AdvisoryOctopusDeploy.md b/docs/AdvisoryOctopusDeploy.md index 18d6887f..c3e3711c 100644 --- a/docs/AdvisoryOctopusDeploy.md +++ b/docs/AdvisoryOctopusDeploy.md @@ -1,5 +1,6 @@ # AdvisoryOctopusDeploy +advisory.OctopusDeploy ## Properties diff --git a/docs/AdvisoryOkta.md b/docs/AdvisoryOkta.md index af408f42..2db2e5a2 100644 --- a/docs/AdvisoryOkta.md +++ b/docs/AdvisoryOkta.md @@ -1,5 +1,6 @@ # AdvisoryOkta +advisory.Okta ## Properties diff --git a/docs/AdvisoryOmron.md b/docs/AdvisoryOmron.md index a1aa5094..3444892e 100644 --- a/docs/AdvisoryOmron.md +++ b/docs/AdvisoryOmron.md @@ -1,5 +1,6 @@ # AdvisoryOmron +advisory.Omron ## Properties diff --git a/docs/AdvisoryOneE.md b/docs/AdvisoryOneE.md index a6e7a5ca..bc20eb9c 100644 --- a/docs/AdvisoryOneE.md +++ b/docs/AdvisoryOneE.md @@ -1,5 +1,6 @@ # AdvisoryOneE +advisory.OneE ## Properties diff --git a/docs/AdvisoryOpenBSD.md b/docs/AdvisoryOpenBSD.md index 4cbd2eed..e6afe880 100644 --- a/docs/AdvisoryOpenBSD.md +++ b/docs/AdvisoryOpenBSD.md @@ -1,5 +1,6 @@ # AdvisoryOpenBSD +advisory.OpenBSD ## Properties diff --git a/docs/AdvisoryOpenCVDB.md b/docs/AdvisoryOpenCVDB.md index 8f436025..3bf6ea45 100644 --- a/docs/AdvisoryOpenCVDB.md +++ b/docs/AdvisoryOpenCVDB.md @@ -1,5 +1,6 @@ # AdvisoryOpenCVDB +advisory.OpenCVDB ## Properties diff --git a/docs/AdvisoryOpenJDK.md b/docs/AdvisoryOpenJDK.md index 29463522..bc6617cc 100644 --- a/docs/AdvisoryOpenJDK.md +++ b/docs/AdvisoryOpenJDK.md @@ -1,5 +1,6 @@ # AdvisoryOpenJDK +advisory.OpenJDK ## Properties diff --git a/docs/AdvisoryOpenJDKCVE.md b/docs/AdvisoryOpenJDKCVE.md index c0288f91..f09fbe02 100644 --- a/docs/AdvisoryOpenJDKCVE.md +++ b/docs/AdvisoryOpenJDKCVE.md @@ -1,5 +1,6 @@ # AdvisoryOpenJDKCVE +advisory.OpenJDKCVE ## Properties diff --git a/docs/AdvisoryOpenSSH.md b/docs/AdvisoryOpenSSH.md index 82c24572..a166694a 100644 --- a/docs/AdvisoryOpenSSH.md +++ b/docs/AdvisoryOpenSSH.md @@ -1,5 +1,6 @@ # AdvisoryOpenSSH +advisory.OpenSSH ## Properties diff --git a/docs/AdvisoryOpenSSLSecAdv.md b/docs/AdvisoryOpenSSLSecAdv.md index 0ea972c6..1f46222f 100644 --- a/docs/AdvisoryOpenSSLSecAdv.md +++ b/docs/AdvisoryOpenSSLSecAdv.md @@ -1,5 +1,6 @@ # AdvisoryOpenSSLSecAdv +advisory.OpenSSLSecAdv ## Properties diff --git a/docs/AdvisoryOpenSSLVulnerability.md b/docs/AdvisoryOpenSSLVulnerability.md index 22559b39..d3760643 100644 --- a/docs/AdvisoryOpenSSLVulnerability.md +++ b/docs/AdvisoryOpenSSLVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryOpenSSLVulnerability +advisory.OpenSSLVulnerability ## Properties diff --git a/docs/AdvisoryOpenStack.md b/docs/AdvisoryOpenStack.md index 804780de..b9eff7fa 100644 --- a/docs/AdvisoryOpenStack.md +++ b/docs/AdvisoryOpenStack.md @@ -1,5 +1,6 @@ # AdvisoryOpenStack +advisory.OpenStack ## Properties diff --git a/docs/AdvisoryOpengear.md b/docs/AdvisoryOpengear.md index 9ef7d71d..17b03461 100644 --- a/docs/AdvisoryOpengear.md +++ b/docs/AdvisoryOpengear.md @@ -1,5 +1,6 @@ # AdvisoryOpengear +advisory.Opengear ## Properties diff --git a/docs/AdvisoryOracleCPU.md b/docs/AdvisoryOracleCPU.md index bb21959d..e9872e81 100644 --- a/docs/AdvisoryOracleCPU.md +++ b/docs/AdvisoryOracleCPU.md @@ -1,5 +1,6 @@ # AdvisoryOracleCPU +advisory.OracleCPU ## Properties diff --git a/docs/AdvisoryOracleCPUCSAF.md b/docs/AdvisoryOracleCPUCSAF.md index f52f563e..ea41f5f0 100644 --- a/docs/AdvisoryOracleCPUCSAF.md +++ b/docs/AdvisoryOracleCPUCSAF.md @@ -1,5 +1,6 @@ # AdvisoryOracleCPUCSAF +advisory.OracleCPUCSAF ## Properties diff --git a/docs/AdvisoryOriginalGHSA.md b/docs/AdvisoryOriginalGHSA.md index 854bd46c..5e0905f8 100644 --- a/docs/AdvisoryOriginalGHSA.md +++ b/docs/AdvisoryOriginalGHSA.md @@ -1,5 +1,6 @@ # AdvisoryOriginalGHSA +advisory.OriginalGHSA ## Properties diff --git a/docs/AdvisoryOvalCVE.md b/docs/AdvisoryOvalCVE.md index b717224b..48ef52b6 100644 --- a/docs/AdvisoryOvalCVE.md +++ b/docs/AdvisoryOvalCVE.md @@ -1,5 +1,6 @@ # AdvisoryOvalCVE +advisory.OvalCVE ## Properties diff --git a/docs/AdvisoryOvalReference.md b/docs/AdvisoryOvalReference.md index b67128d2..48f13ea2 100644 --- a/docs/AdvisoryOvalReference.md +++ b/docs/AdvisoryOvalReference.md @@ -1,5 +1,6 @@ # AdvisoryOvalReference +advisory.OvalReference ## Properties diff --git a/docs/AdvisoryOverride.md b/docs/AdvisoryOverride.md index e72bad88..14b16734 100644 --- a/docs/AdvisoryOverride.md +++ b/docs/AdvisoryOverride.md @@ -1,5 +1,6 @@ # AdvisoryOverride +advisory.Override ## Properties diff --git a/docs/AdvisoryOverrideAnnotation.md b/docs/AdvisoryOverrideAnnotation.md index 28cefebc..31a43e2a 100644 --- a/docs/AdvisoryOverrideAnnotation.md +++ b/docs/AdvisoryOverrideAnnotation.md @@ -1,5 +1,6 @@ # AdvisoryOverrideAnnotation +advisory.OverrideAnnotation ## Properties diff --git a/docs/AdvisoryOverrideCVE.md b/docs/AdvisoryOverrideCVE.md index a5c75d46..87d2b03b 100644 --- a/docs/AdvisoryOverrideCVE.md +++ b/docs/AdvisoryOverrideCVE.md @@ -1,5 +1,6 @@ # AdvisoryOverrideCVE +advisory.OverrideCVE ## Properties diff --git a/docs/AdvisoryOverrideConfiguration.md b/docs/AdvisoryOverrideConfiguration.md index a8ab8214..37694df3 100644 --- a/docs/AdvisoryOverrideConfiguration.md +++ b/docs/AdvisoryOverrideConfiguration.md @@ -1,5 +1,6 @@ # AdvisoryOverrideConfiguration +advisory.OverrideConfiguration ## Properties diff --git a/docs/AdvisoryOwnCloud.md b/docs/AdvisoryOwnCloud.md index ab3e441a..673eaac7 100644 --- a/docs/AdvisoryOwnCloud.md +++ b/docs/AdvisoryOwnCloud.md @@ -1,5 +1,6 @@ # AdvisoryOwnCloud +advisory.OwnCloud ## Properties diff --git a/docs/AdvisoryPGFix.md b/docs/AdvisoryPGFix.md index 7eff5f4e..ec3c5b31 100644 --- a/docs/AdvisoryPGFix.md +++ b/docs/AdvisoryPGFix.md @@ -1,5 +1,6 @@ # AdvisoryPGFix +advisory.PGFix ## Properties diff --git a/docs/AdvisoryPHPMyAdmin.md b/docs/AdvisoryPHPMyAdmin.md index 7fb25907..eed72e82 100644 --- a/docs/AdvisoryPHPMyAdmin.md +++ b/docs/AdvisoryPHPMyAdmin.md @@ -1,5 +1,6 @@ # AdvisoryPHPMyAdmin +advisory.PHPMyAdmin ## Properties diff --git a/docs/AdvisoryPKCert.md b/docs/AdvisoryPKCert.md index 71d43c58..909f6b77 100644 --- a/docs/AdvisoryPKCert.md +++ b/docs/AdvisoryPKCert.md @@ -1,5 +1,6 @@ # AdvisoryPKCert +advisory.PKCert ## Properties diff --git a/docs/AdvisoryPTC.md b/docs/AdvisoryPTC.md index 63b9250d..d88fd066 100644 --- a/docs/AdvisoryPTC.md +++ b/docs/AdvisoryPTC.md @@ -1,5 +1,6 @@ # AdvisoryPTC +advisory.PTC ## Properties diff --git a/docs/AdvisoryPTMDescriptions.md b/docs/AdvisoryPTMDescriptions.md index ee224736..e52f2037 100644 --- a/docs/AdvisoryPTMDescriptions.md +++ b/docs/AdvisoryPTMDescriptions.md @@ -1,5 +1,6 @@ # AdvisoryPTMDescriptions +advisory.PTMDescriptions ## Properties diff --git a/docs/AdvisoryPackage.md b/docs/AdvisoryPackage.md index aca7736f..ade0ab06 100644 --- a/docs/AdvisoryPackage.md +++ b/docs/AdvisoryPackage.md @@ -1,5 +1,6 @@ # AdvisoryPackage +advisory.Package ## Properties diff --git a/docs/AdvisoryPackageStat.md b/docs/AdvisoryPackageStat.md index 3bb3149f..3d3ac3cd 100644 --- a/docs/AdvisoryPackageStat.md +++ b/docs/AdvisoryPackageStat.md @@ -1,5 +1,6 @@ # AdvisoryPackageStat +advisory.PackageStat ## Properties diff --git a/docs/AdvisoryPacketstormExploit.md b/docs/AdvisoryPacketstormExploit.md index 00f1771e..bd3dae57 100644 --- a/docs/AdvisoryPacketstormExploit.md +++ b/docs/AdvisoryPacketstormExploit.md @@ -1,5 +1,6 @@ # AdvisoryPacketstormExploit +advisory.PacketstormExploit ## Properties diff --git a/docs/AdvisoryPalantir.md b/docs/AdvisoryPalantir.md index ca44edd2..17a45a4c 100644 --- a/docs/AdvisoryPalantir.md +++ b/docs/AdvisoryPalantir.md @@ -1,5 +1,6 @@ # AdvisoryPalantir +advisory.Palantir ## Properties diff --git a/docs/AdvisoryPaloAltoAdvisory.md b/docs/AdvisoryPaloAltoAdvisory.md index 3a9c98dc..e986ac80 100644 --- a/docs/AdvisoryPaloAltoAdvisory.md +++ b/docs/AdvisoryPaloAltoAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryPaloAltoAdvisory +advisory.PaloAltoAdvisory ## Properties diff --git a/docs/AdvisoryPanasonic.md b/docs/AdvisoryPanasonic.md index 1f5e854c..d368a689 100644 --- a/docs/AdvisoryPanasonic.md +++ b/docs/AdvisoryPanasonic.md @@ -1,5 +1,6 @@ # AdvisoryPanasonic +advisory.Panasonic ## Properties diff --git a/docs/AdvisoryPaperCut.md b/docs/AdvisoryPaperCut.md index 6356e460..6435d187 100644 --- a/docs/AdvisoryPaperCut.md +++ b/docs/AdvisoryPaperCut.md @@ -1,5 +1,6 @@ # AdvisoryPaperCut +advisory.PaperCut ## Properties diff --git a/docs/AdvisoryPatch.md b/docs/AdvisoryPatch.md index 9d080cd1..5586f380 100644 --- a/docs/AdvisoryPatch.md +++ b/docs/AdvisoryPatch.md @@ -1,5 +1,6 @@ # AdvisoryPatch +advisory.Patch ## Properties diff --git a/docs/AdvisoryPega.md b/docs/AdvisoryPega.md index 281c0a5b..47d1d239 100644 --- a/docs/AdvisoryPega.md +++ b/docs/AdvisoryPega.md @@ -1,5 +1,6 @@ # AdvisoryPega +advisory.Pega ## Properties diff --git a/docs/AdvisoryPhilipsAdvisory.md b/docs/AdvisoryPhilipsAdvisory.md index 668e9490..7b6a4f9f 100644 --- a/docs/AdvisoryPhilipsAdvisory.md +++ b/docs/AdvisoryPhilipsAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryPhilipsAdvisory +advisory.PhilipsAdvisory ## Properties diff --git a/docs/AdvisoryPhoenixContactAdvisory.md b/docs/AdvisoryPhoenixContactAdvisory.md index b5518f6d..5b7fa1d1 100644 --- a/docs/AdvisoryPhoenixContactAdvisory.md +++ b/docs/AdvisoryPhoenixContactAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryPhoenixContactAdvisory +advisory.PhoenixContactAdvisory ## Properties diff --git a/docs/AdvisoryPostgresSQL.md b/docs/AdvisoryPostgresSQL.md index de114e64..7c48f7c0 100644 --- a/docs/AdvisoryPostgresSQL.md +++ b/docs/AdvisoryPostgresSQL.md @@ -1,5 +1,6 @@ # AdvisoryPostgresSQL +advisory.PostgresSQL ## Properties diff --git a/docs/AdvisoryPowerDNS.md b/docs/AdvisoryPowerDNS.md index b13bd050..b518aa33 100644 --- a/docs/AdvisoryPowerDNS.md +++ b/docs/AdvisoryPowerDNS.md @@ -1,5 +1,6 @@ # AdvisoryPowerDNS +advisory.PowerDNS ## Properties diff --git a/docs/AdvisoryPrimeVersion.md b/docs/AdvisoryPrimeVersion.md index 9207b304..9f71901d 100644 --- a/docs/AdvisoryPrimeVersion.md +++ b/docs/AdvisoryPrimeVersion.md @@ -1,5 +1,6 @@ # AdvisoryPrimeVersion +advisory.PrimeVersion ## Properties diff --git a/docs/AdvisoryProduct.md b/docs/AdvisoryProduct.md index 8a98c4e6..5c61f52d 100644 --- a/docs/AdvisoryProduct.md +++ b/docs/AdvisoryProduct.md @@ -1,5 +1,6 @@ # AdvisoryProduct +advisory.Product ## Properties @@ -7,7 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **name** | **str** | | [optional] **product_id** | **str** | | [optional] -**product_identification_helper** | **Dict[str, object]** | | [optional] +**product_identification_helper** | **Dict[str, object]** | advisory.IdentificationHelper | [optional] ## Example diff --git a/docs/AdvisoryProductBranch.md b/docs/AdvisoryProductBranch.md index 9d372a7d..6dc7e6d7 100644 --- a/docs/AdvisoryProductBranch.md +++ b/docs/AdvisoryProductBranch.md @@ -1,5 +1,6 @@ # AdvisoryProductBranch +ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property ## Properties diff --git a/docs/AdvisoryProductSpecificDetail.md b/docs/AdvisoryProductSpecificDetail.md index 1b00a26a..2b8d7cf3 100644 --- a/docs/AdvisoryProductSpecificDetail.md +++ b/docs/AdvisoryProductSpecificDetail.md @@ -1,5 +1,6 @@ # AdvisoryProductSpecificDetail +advisory.ProductSpecificDetail ## Properties diff --git a/docs/AdvisoryProductTree.md b/docs/AdvisoryProductTree.md deleted file mode 100644 index 9bc6d7d0..00000000 --- a/docs/AdvisoryProductTree.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryProductTree - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**relationships** | [**List[AdvisoryRelationship]**](AdvisoryRelationship.md) | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryProductTree from a JSON string -advisory_product_tree_instance = AdvisoryProductTree.from_json(json) -# print the JSON string representation of the object -print(AdvisoryProductTree.to_json()) - -# convert the object into a dict -advisory_product_tree_dict = advisory_product_tree_instance.to_dict() -# create an instance of AdvisoryProductTree from a dict -advisory_product_tree_from_dict = AdvisoryProductTree.from_dict(advisory_product_tree_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryProductsAffected.md b/docs/AdvisoryProductsAffected.md index 6fd8449b..0c2d6a36 100644 --- a/docs/AdvisoryProductsAffected.md +++ b/docs/AdvisoryProductsAffected.md @@ -1,5 +1,6 @@ # AdvisoryProductsAffected +advisory.ProductsAffected ## Properties diff --git a/docs/AdvisoryProgress.md b/docs/AdvisoryProgress.md index 952cd1ab..898bf87c 100644 --- a/docs/AdvisoryProgress.md +++ b/docs/AdvisoryProgress.md @@ -1,5 +1,6 @@ # AdvisoryProgress +advisory.Progress ## Properties diff --git a/docs/AdvisoryProofpoint.md b/docs/AdvisoryProofpoint.md index fe59ed09..d24d5b57 100644 --- a/docs/AdvisoryProofpoint.md +++ b/docs/AdvisoryProofpoint.md @@ -1,5 +1,6 @@ # AdvisoryProofpoint +advisory.Proofpoint ## Properties diff --git a/docs/AdvisoryPublisher.md b/docs/AdvisoryPublisher.md index dab22a67..e7f95d0c 100644 --- a/docs/AdvisoryPublisher.md +++ b/docs/AdvisoryPublisher.md @@ -1,5 +1,6 @@ # AdvisoryPublisher +advisory.Publisher ## Properties diff --git a/docs/AdvisoryPureStorage.md b/docs/AdvisoryPureStorage.md index 98fc02d7..a8d9cb19 100644 --- a/docs/AdvisoryPureStorage.md +++ b/docs/AdvisoryPureStorage.md @@ -1,5 +1,6 @@ # AdvisoryPureStorage +advisory.PureStorage ## Properties diff --git a/docs/AdvisoryPyPAAdvisory.md b/docs/AdvisoryPyPAAdvisory.md index bd472dab..9a1c5768 100644 --- a/docs/AdvisoryPyPAAdvisory.md +++ b/docs/AdvisoryPyPAAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryPyPAAdvisory +advisory.PyPAAdvisory ## Properties diff --git a/docs/AdvisoryPyPAAffected.md b/docs/AdvisoryPyPAAffected.md index 1de403ac..25ae5ab9 100644 --- a/docs/AdvisoryPyPAAffected.md +++ b/docs/AdvisoryPyPAAffected.md @@ -1,5 +1,6 @@ # AdvisoryPyPAAffected +advisory.PyPAAffected ## Properties diff --git a/docs/AdvisoryPyPAEvent.md b/docs/AdvisoryPyPAEvent.md index f8884c68..40551ca4 100644 --- a/docs/AdvisoryPyPAEvent.md +++ b/docs/AdvisoryPyPAEvent.md @@ -1,5 +1,6 @@ # AdvisoryPyPAEvent +advisory.PyPAEvent ## Properties diff --git a/docs/AdvisoryPyPAPackage.md b/docs/AdvisoryPyPAPackage.md index 9577c761..a62f6928 100644 --- a/docs/AdvisoryPyPAPackage.md +++ b/docs/AdvisoryPyPAPackage.md @@ -1,5 +1,6 @@ # AdvisoryPyPAPackage +advisory.PyPAPackage ## Properties diff --git a/docs/AdvisoryPyPARange.md b/docs/AdvisoryPyPARange.md index 5e393aee..037ea474 100644 --- a/docs/AdvisoryPyPARange.md +++ b/docs/AdvisoryPyPARange.md @@ -1,5 +1,6 @@ # AdvisoryPyPARange +advisory.PyPARange ## Properties diff --git a/docs/AdvisoryPyPAReference.md b/docs/AdvisoryPyPAReference.md index 5c5d309e..f4b0bc8f 100644 --- a/docs/AdvisoryPyPAReference.md +++ b/docs/AdvisoryPyPAReference.md @@ -1,5 +1,6 @@ # AdvisoryPyPAReference +advisory.PyPAReference ## Properties diff --git a/docs/AdvisoryQNAPAdvisory.md b/docs/AdvisoryQNAPAdvisory.md index 463fe836..77c00d6a 100644 --- a/docs/AdvisoryQNAPAdvisory.md +++ b/docs/AdvisoryQNAPAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryQNAPAdvisory +advisory.QNAPAdvisory ## Properties diff --git a/docs/AdvisoryQQID.md b/docs/AdvisoryQQID.md index 50cf64db..3165c228 100644 --- a/docs/AdvisoryQQID.md +++ b/docs/AdvisoryQQID.md @@ -1,5 +1,6 @@ # AdvisoryQQID +advisory.QQID ## Properties diff --git a/docs/AdvisoryQSB.md b/docs/AdvisoryQSB.md index dce6f7af..ed09b6c8 100644 --- a/docs/AdvisoryQSB.md +++ b/docs/AdvisoryQSB.md @@ -1,5 +1,6 @@ # AdvisoryQSB +advisory.QSB ## Properties diff --git a/docs/AdvisoryQualcomm.md b/docs/AdvisoryQualcomm.md index d74273a3..e2c22291 100644 --- a/docs/AdvisoryQualcomm.md +++ b/docs/AdvisoryQualcomm.md @@ -1,5 +1,6 @@ # AdvisoryQualcomm +advisory.Qualcomm ## Properties diff --git a/docs/AdvisoryQualys.md b/docs/AdvisoryQualys.md index adad6de7..d439509d 100644 --- a/docs/AdvisoryQualys.md +++ b/docs/AdvisoryQualys.md @@ -1,5 +1,6 @@ # AdvisoryQualys +advisory.Qualys ## Properties diff --git a/docs/AdvisoryQualysQID.md b/docs/AdvisoryQualysQID.md index 406db363..70b61d0e 100644 --- a/docs/AdvisoryQualysQID.md +++ b/docs/AdvisoryQualysQID.md @@ -1,5 +1,6 @@ # AdvisoryQualysQID +advisory.QualysQID ## Properties diff --git a/docs/AdvisoryRDescription.md b/docs/AdvisoryRDescription.md index 5578241b..a51afac5 100644 --- a/docs/AdvisoryRDescription.md +++ b/docs/AdvisoryRDescription.md @@ -1,5 +1,6 @@ # AdvisoryRDescription +advisory.RDescription ## Properties diff --git a/docs/AdvisoryRNote.md b/docs/AdvisoryRNote.md index b26f04a5..1808a717 100644 --- a/docs/AdvisoryRNote.md +++ b/docs/AdvisoryRNote.md @@ -1,5 +1,6 @@ # AdvisoryRNote +advisory.RNote ## Properties diff --git a/docs/AdvisoryRRevision.md b/docs/AdvisoryRRevision.md index 76487027..f5f4c3cd 100644 --- a/docs/AdvisoryRRevision.md +++ b/docs/AdvisoryRRevision.md @@ -1,5 +1,6 @@ # AdvisoryRRevision +advisory.RRevision ## Properties diff --git a/docs/AdvisoryRScoreSet.md b/docs/AdvisoryRScoreSet.md index e36a079f..84fb9ac5 100644 --- a/docs/AdvisoryRScoreSet.md +++ b/docs/AdvisoryRScoreSet.md @@ -1,5 +1,6 @@ # AdvisoryRScoreSet +advisory.RScoreSet ## Properties diff --git a/docs/AdvisoryRThreat.md b/docs/AdvisoryRThreat.md index 9a625bc2..20de7503 100644 --- a/docs/AdvisoryRThreat.md +++ b/docs/AdvisoryRThreat.md @@ -1,5 +1,6 @@ # AdvisoryRThreat +advisory.RThreat ## Properties diff --git a/docs/AdvisoryRange.md b/docs/AdvisoryRange.md index 4954f28c..233d865b 100644 --- a/docs/AdvisoryRange.md +++ b/docs/AdvisoryRange.md @@ -1,5 +1,6 @@ # AdvisoryRange +advisory.Range ## Properties diff --git a/docs/AdvisoryRansomwareExploit.md b/docs/AdvisoryRansomwareExploit.md index 59c981e8..83dcc52e 100644 --- a/docs/AdvisoryRansomwareExploit.md +++ b/docs/AdvisoryRansomwareExploit.md @@ -1,5 +1,6 @@ # AdvisoryRansomwareExploit +advisory.RansomwareExploit ## Properties diff --git a/docs/AdvisoryRecordType.md b/docs/AdvisoryRecordType.md index d0025efc..8fced978 100644 --- a/docs/AdvisoryRecordType.md +++ b/docs/AdvisoryRecordType.md @@ -1,5 +1,6 @@ # AdvisoryRecordType +advisory.RecordType ## Properties diff --git a/docs/AdvisoryRedLion.md b/docs/AdvisoryRedLion.md index 8ecb9fa0..75a72b60 100644 --- a/docs/AdvisoryRedLion.md +++ b/docs/AdvisoryRedLion.md @@ -1,5 +1,6 @@ # AdvisoryRedLion +advisory.RedLion ## Properties diff --git a/docs/AdvisoryRedhatCVE.md b/docs/AdvisoryRedhatCVE.md index e7bef96a..cb90a31d 100644 --- a/docs/AdvisoryRedhatCVE.md +++ b/docs/AdvisoryRedhatCVE.md @@ -1,5 +1,6 @@ # AdvisoryRedhatCVE +advisory.RedhatCVE ## Properties diff --git a/docs/AdvisoryReference.md b/docs/AdvisoryReference.md index df5c9c8a..9bb47f7d 100644 --- a/docs/AdvisoryReference.md +++ b/docs/AdvisoryReference.md @@ -1,5 +1,6 @@ # AdvisoryReference +advisory.Reference ## Properties diff --git a/docs/AdvisoryRelatedRule.md b/docs/AdvisoryRelatedRule.md index 869209d2..aaad1897 100644 --- a/docs/AdvisoryRelatedRule.md +++ b/docs/AdvisoryRelatedRule.md @@ -1,5 +1,6 @@ # AdvisoryRelatedRule +advisory.RelatedRule ## Properties diff --git a/docs/AdvisoryRelationship.md b/docs/AdvisoryRelationship.md deleted file mode 100644 index 5b18b32c..00000000 --- a/docs/AdvisoryRelationship.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryRelationship - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**product_reference** | **str** | | [optional] -**relates_to_product_reference** | **str** | | [optional] -**relation_type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryRelationship from a JSON string -advisory_relationship_instance = AdvisoryRelationship.from_json(json) -# print the JSON string representation of the object -print(AdvisoryRelationship.to_json()) - -# convert the object into a dict -advisory_relationship_dict = advisory_relationship_instance.to_dict() -# create an instance of AdvisoryRelationship from a dict -advisory_relationship_from_dict = AdvisoryRelationship.from_dict(advisory_relationship_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryRemediationData.md b/docs/AdvisoryRemediationData.md index 9a7d84ae..fae03eca 100644 --- a/docs/AdvisoryRemediationData.md +++ b/docs/AdvisoryRemediationData.md @@ -1,5 +1,6 @@ # AdvisoryRemediationData +advisory.RemediationData ## Properties diff --git a/docs/AdvisoryRenesas.md b/docs/AdvisoryRenesas.md index 92efb1f3..93d434ad 100644 --- a/docs/AdvisoryRenesas.md +++ b/docs/AdvisoryRenesas.md @@ -1,5 +1,6 @@ # AdvisoryRenesas +advisory.Renesas ## Properties diff --git a/docs/AdvisoryReportedExploit.md b/docs/AdvisoryReportedExploit.md index ca434752..a015d332 100644 --- a/docs/AdvisoryReportedExploit.md +++ b/docs/AdvisoryReportedExploit.md @@ -1,5 +1,6 @@ # AdvisoryReportedExploit +advisory.ReportedExploit ## Properties diff --git a/docs/AdvisoryRestartData.md b/docs/AdvisoryRestartData.md index d55ad3fb..a4d48bc3 100644 --- a/docs/AdvisoryRestartData.md +++ b/docs/AdvisoryRestartData.md @@ -1,5 +1,6 @@ # AdvisoryRestartData +advisory.RestartData ## Properties diff --git a/docs/AdvisoryRevision.md b/docs/AdvisoryRevision.md deleted file mode 100644 index 2b5094a2..00000000 --- a/docs/AdvisoryRevision.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryRevision - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] -**description** | **str** | | [optional] -**number** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryRevision from a JSON string -advisory_revision_instance = AdvisoryRevision.from_json(json) -# print the JSON string representation of the object -print(AdvisoryRevision.to_json()) - -# convert the object into a dict -advisory_revision_dict = advisory_revision_instance.to_dict() -# create an instance of AdvisoryRevision from a dict -advisory_revision_from_dict = AdvisoryRevision.from_dict(advisory_revision_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryRevisionHistory.md b/docs/AdvisoryRevisionHistory.md index b8f49dbb..df9ab659 100644 --- a/docs/AdvisoryRevisionHistory.md +++ b/docs/AdvisoryRevisionHistory.md @@ -1,5 +1,6 @@ # AdvisoryRevisionHistory +advisory.RevisionHistory ## Properties diff --git a/docs/AdvisoryRevive.md b/docs/AdvisoryRevive.md index 45bb1601..8883159e 100644 --- a/docs/AdvisoryRevive.md +++ b/docs/AdvisoryRevive.md @@ -1,5 +1,6 @@ # AdvisoryRevive +advisory.Revive ## Properties diff --git a/docs/AdvisoryRhelCVE.md b/docs/AdvisoryRhelCVE.md index 3db5258c..f7e46614 100644 --- a/docs/AdvisoryRhelCVE.md +++ b/docs/AdvisoryRhelCVE.md @@ -1,5 +1,6 @@ # AdvisoryRhelCVE +advisory.RhelCVE ## Properties diff --git a/docs/AdvisoryRoche.md b/docs/AdvisoryRoche.md index bef812fd..86abbaff 100644 --- a/docs/AdvisoryRoche.md +++ b/docs/AdvisoryRoche.md @@ -1,5 +1,6 @@ # AdvisoryRoche +advisory.Roche ## Properties diff --git a/docs/AdvisoryRocheCVE.md b/docs/AdvisoryRocheCVE.md index 63e7e1d4..c9a79965 100644 --- a/docs/AdvisoryRocheCVE.md +++ b/docs/AdvisoryRocheCVE.md @@ -1,5 +1,6 @@ # AdvisoryRocheCVE +advisory.RocheCVE ## Properties diff --git a/docs/AdvisoryRockwell.md b/docs/AdvisoryRockwell.md index d52fca96..fdce1839 100644 --- a/docs/AdvisoryRockwell.md +++ b/docs/AdvisoryRockwell.md @@ -1,5 +1,6 @@ # AdvisoryRockwell +advisory.Rockwell ## Properties diff --git a/docs/AdvisoryRockwellAffectedProduct.md b/docs/AdvisoryRockwellAffectedProduct.md index c9ad3a66..b431cfc6 100644 --- a/docs/AdvisoryRockwellAffectedProduct.md +++ b/docs/AdvisoryRockwellAffectedProduct.md @@ -1,5 +1,6 @@ # AdvisoryRockwellAffectedProduct +advisory.RockwellAffectedProduct ## Properties diff --git a/docs/AdvisoryRockyAdvisory.md b/docs/AdvisoryRockyAdvisory.md index 64785d84..a1536008 100644 --- a/docs/AdvisoryRockyAdvisory.md +++ b/docs/AdvisoryRockyAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryRockyAdvisory +advisory.RockyAdvisory ## Properties @@ -14,7 +15,7 @@ Name | Type | Description | Notes **published_at** | **str** | | [optional] **reboot_suggested** | **bool** | | [optional] **references** | **List[str]** | | [optional] -**rpms** | [**Dict[str, AdvisoryRockyVersion]**](AdvisoryRockyVersion.md) | | [optional] +**rpms** | [**Dict[str, AdvisoryRockyVersion]**](AdvisoryRockyVersion.md) | advisory.RockyRpms | [optional] **severity** | **str** | | [optional] **short_code** | **str** | | [optional] **solution** | **str** | | [optional] diff --git a/docs/AdvisoryRockyCve.md b/docs/AdvisoryRockyCve.md index fa053da2..b7cb1007 100644 --- a/docs/AdvisoryRockyCve.md +++ b/docs/AdvisoryRockyCve.md @@ -1,5 +1,6 @@ # AdvisoryRockyCve +advisory.RockyCve ## Properties diff --git a/docs/AdvisoryRockyErrata.md b/docs/AdvisoryRockyErrata.md index 7d9469bb..070444f3 100644 --- a/docs/AdvisoryRockyErrata.md +++ b/docs/AdvisoryRockyErrata.md @@ -1,5 +1,6 @@ # AdvisoryRockyErrata +advisory.RockyErrata ## Properties diff --git a/docs/AdvisoryRockyFix.md b/docs/AdvisoryRockyFix.md index 353555b2..b5f4394f 100644 --- a/docs/AdvisoryRockyFix.md +++ b/docs/AdvisoryRockyFix.md @@ -1,5 +1,6 @@ # AdvisoryRockyFix +advisory.RockyFix ## Properties diff --git a/docs/AdvisoryRockyPackage.md b/docs/AdvisoryRockyPackage.md index 76934d1a..7e39e0c8 100644 --- a/docs/AdvisoryRockyPackage.md +++ b/docs/AdvisoryRockyPackage.md @@ -1,5 +1,6 @@ # AdvisoryRockyPackage +advisory.RockyPackage ## Properties diff --git a/docs/AdvisoryRockyVersion.md b/docs/AdvisoryRockyVersion.md index 7474315a..b388d442 100644 --- a/docs/AdvisoryRockyVersion.md +++ b/docs/AdvisoryRockyVersion.md @@ -1,5 +1,6 @@ # AdvisoryRockyVersion +advisory.RockyVersion ## Properties diff --git a/docs/AdvisoryRsync.md b/docs/AdvisoryRsync.md index b2129c79..0f02b4ed 100644 --- a/docs/AdvisoryRsync.md +++ b/docs/AdvisoryRsync.md @@ -1,5 +1,6 @@ # AdvisoryRsync +advisory.Rsync ## Properties diff --git a/docs/AdvisoryRuckus.md b/docs/AdvisoryRuckus.md index 4070a3b3..2634584b 100644 --- a/docs/AdvisoryRuckus.md +++ b/docs/AdvisoryRuckus.md @@ -1,5 +1,6 @@ # AdvisoryRuckus +advisory.Ruckus ## Properties diff --git a/docs/AdvisoryRustsecAdvisory.md b/docs/AdvisoryRustsecAdvisory.md index 74e0767a..305a4324 100644 --- a/docs/AdvisoryRustsecAdvisory.md +++ b/docs/AdvisoryRustsecAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryRustsecAdvisory +advisory.RustsecAdvisory ## Properties diff --git a/docs/AdvisoryRustsecAffected.md b/docs/AdvisoryRustsecAffected.md index 889bbf8c..617006df 100644 --- a/docs/AdvisoryRustsecAffected.md +++ b/docs/AdvisoryRustsecAffected.md @@ -1,5 +1,6 @@ # AdvisoryRustsecAffected +advisory.RustsecAffected ## Properties diff --git a/docs/AdvisoryRustsecFrontMatterAdvisory.md b/docs/AdvisoryRustsecFrontMatterAdvisory.md index 5c4cfd2a..4cc0e5c3 100644 --- a/docs/AdvisoryRustsecFrontMatterAdvisory.md +++ b/docs/AdvisoryRustsecFrontMatterAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryRustsecFrontMatterAdvisory +advisory.RustsecFrontMatterAdvisory ## Properties diff --git a/docs/AdvisoryRustsecFrontMatterVersions.md b/docs/AdvisoryRustsecFrontMatterVersions.md index 41d354d1..a565264f 100644 --- a/docs/AdvisoryRustsecFrontMatterVersions.md +++ b/docs/AdvisoryRustsecFrontMatterVersions.md @@ -1,5 +1,6 @@ # AdvisoryRustsecFrontMatterVersions +advisory.RustsecFrontMatterVersions ## Properties diff --git a/docs/AdvisorySAAdvisory.md b/docs/AdvisorySAAdvisory.md index a2450d08..7a9094e8 100644 --- a/docs/AdvisorySAAdvisory.md +++ b/docs/AdvisorySAAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySAAdvisory +advisory.SAAdvisory ## Properties diff --git a/docs/AdvisorySAP.md b/docs/AdvisorySAP.md index 6d2e0591..4fc6e05a 100644 --- a/docs/AdvisorySAP.md +++ b/docs/AdvisorySAP.md @@ -1,5 +1,6 @@ # AdvisorySAP +advisory.SAP ## Properties diff --git a/docs/AdvisorySECConsult.md b/docs/AdvisorySECConsult.md index df1f3249..c74132d7 100644 --- a/docs/AdvisorySECConsult.md +++ b/docs/AdvisorySECConsult.md @@ -1,5 +1,6 @@ # AdvisorySECConsult +advisory.SECConsult ## Properties diff --git a/docs/AdvisorySSASource.md b/docs/AdvisorySSASource.md index dd5d0f2c..d3ebf64c 100644 --- a/docs/AdvisorySSASource.md +++ b/docs/AdvisorySSASource.md @@ -1,5 +1,6 @@ # AdvisorySSASource +advisory.SSASource ## Properties diff --git a/docs/AdvisorySSDAdvisory.md b/docs/AdvisorySSDAdvisory.md index 3ae0a78e..1f5c9cfa 100644 --- a/docs/AdvisorySSDAdvisory.md +++ b/docs/AdvisorySSDAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySSDAdvisory +advisory.SSDAdvisory ## Properties diff --git a/docs/AdvisorySafran.md b/docs/AdvisorySafran.md index 9b56da07..3809ab1a 100644 --- a/docs/AdvisorySafran.md +++ b/docs/AdvisorySafran.md @@ -1,5 +1,6 @@ # AdvisorySafran +advisory.Safran ## Properties diff --git a/docs/AdvisorySaintExploit.md b/docs/AdvisorySaintExploit.md index c8a4d7ac..476f93b0 100644 --- a/docs/AdvisorySaintExploit.md +++ b/docs/AdvisorySaintExploit.md @@ -1,5 +1,6 @@ # AdvisorySaintExploit +advisory.SaintExploit ## Properties diff --git a/docs/AdvisorySalesForce.md b/docs/AdvisorySalesForce.md index bf38de8e..61983139 100644 --- a/docs/AdvisorySalesForce.md +++ b/docs/AdvisorySalesForce.md @@ -1,5 +1,6 @@ # AdvisorySalesForce +advisory.SalesForce ## Properties diff --git a/docs/AdvisorySamba.md b/docs/AdvisorySamba.md index d6e57c07..11ec2efd 100644 --- a/docs/AdvisorySamba.md +++ b/docs/AdvisorySamba.md @@ -1,5 +1,6 @@ # AdvisorySamba +advisory.Samba ## Properties diff --git a/docs/AdvisorySandisk.md b/docs/AdvisorySandisk.md index e4de1f97..4504276e 100644 --- a/docs/AdvisorySandisk.md +++ b/docs/AdvisorySandisk.md @@ -1,5 +1,6 @@ # AdvisorySandisk +advisory.Sandisk ## Properties diff --git a/docs/AdvisorySansDshield.md b/docs/AdvisorySansDshield.md index ce68e771..06127a51 100644 --- a/docs/AdvisorySansDshield.md +++ b/docs/AdvisorySansDshield.md @@ -1,5 +1,6 @@ # AdvisorySansDshield +advisory.SansDshield ## Properties diff --git a/docs/AdvisorySchneiderCVE.md b/docs/AdvisorySchneiderCVE.md index f3aaf0cb..59145e6e 100644 --- a/docs/AdvisorySchneiderCVE.md +++ b/docs/AdvisorySchneiderCVE.md @@ -1,5 +1,6 @@ # AdvisorySchneiderCVE +advisory.SchneiderCVE ## Properties diff --git a/docs/AdvisorySchneiderElectricAdvisory.md b/docs/AdvisorySchneiderElectricAdvisory.md index f20fcc4a..5b3d2873 100644 --- a/docs/AdvisorySchneiderElectricAdvisory.md +++ b/docs/AdvisorySchneiderElectricAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySchneiderElectricAdvisory +advisory.SchneiderElectricAdvisory ## Properties diff --git a/docs/AdvisorySchutzwerk.md b/docs/AdvisorySchutzwerk.md index be10152e..6b43bb64 100644 --- a/docs/AdvisorySchutzwerk.md +++ b/docs/AdvisorySchutzwerk.md @@ -1,5 +1,6 @@ # AdvisorySchutzwerk +advisory.Schutzwerk ## Properties diff --git a/docs/AdvisoryScoreSet.md b/docs/AdvisoryScoreSet.md deleted file mode 100644 index eee8f8f3..00000000 --- a/docs/AdvisoryScoreSet.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryScoreSet - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**base_score** | **str** | | [optional] -**vector** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryScoreSet from a JSON string -advisory_score_set_instance = AdvisoryScoreSet.from_json(json) -# print the JSON string representation of the object -print(AdvisoryScoreSet.to_json()) - -# convert the object into a dict -advisory_score_set_dict = advisory_score_set_instance.to_dict() -# create an instance of AdvisoryScoreSet from a dict -advisory_score_set_from_dict = AdvisoryScoreSet.from_dict(advisory_score_set_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisorySecFix.md b/docs/AdvisorySecFix.md index 4b77e21b..224aa685 100644 --- a/docs/AdvisorySecFix.md +++ b/docs/AdvisorySecFix.md @@ -1,5 +1,6 @@ # AdvisorySecFix +advisory.SecFix ## Properties diff --git a/docs/AdvisorySecurityBulletin.md b/docs/AdvisorySecurityBulletin.md index 5c0e97f6..07ec7322 100644 --- a/docs/AdvisorySecurityBulletin.md +++ b/docs/AdvisorySecurityBulletin.md @@ -1,5 +1,6 @@ # AdvisorySecurityBulletin +advisory.SecurityBulletin ## Properties diff --git a/docs/AdvisorySecurityLab.md b/docs/AdvisorySecurityLab.md index a6540141..e3fb0cad 100644 --- a/docs/AdvisorySecurityLab.md +++ b/docs/AdvisorySecurityLab.md @@ -1,5 +1,6 @@ # AdvisorySecurityLab +advisory.SecurityLab ## Properties diff --git a/docs/AdvisorySeebugExploit.md b/docs/AdvisorySeebugExploit.md index 90bee2ed..5ee3f068 100644 --- a/docs/AdvisorySeebugExploit.md +++ b/docs/AdvisorySeebugExploit.md @@ -1,5 +1,6 @@ # AdvisorySeebugExploit +advisory.SeebugExploit ## Properties diff --git a/docs/AdvisorySel.md b/docs/AdvisorySel.md index 949fd1e1..cb9f079c 100644 --- a/docs/AdvisorySel.md +++ b/docs/AdvisorySel.md @@ -1,5 +1,6 @@ # AdvisorySel +advisory.Sel ## Properties diff --git a/docs/AdvisorySentinelOne.md b/docs/AdvisorySentinelOne.md index 87c30370..3908688e 100644 --- a/docs/AdvisorySentinelOne.md +++ b/docs/AdvisorySentinelOne.md @@ -1,5 +1,6 @@ # AdvisorySentinelOne +advisory.SentinelOne ## Properties diff --git a/docs/AdvisoryServiceNow.md b/docs/AdvisoryServiceNow.md index 5610b6a4..cb614272 100644 --- a/docs/AdvisoryServiceNow.md +++ b/docs/AdvisoryServiceNow.md @@ -1,5 +1,6 @@ # AdvisoryServiceNow +advisory.ServiceNow ## Properties diff --git a/docs/AdvisorySevenZip.md b/docs/AdvisorySevenZip.md index 38005a63..5c638840 100644 --- a/docs/AdvisorySevenZip.md +++ b/docs/AdvisorySevenZip.md @@ -1,5 +1,6 @@ # AdvisorySevenZip +advisory.SevenZip ## Properties diff --git a/docs/AdvisorySeverity.md b/docs/AdvisorySeverity.md index f7a61b05..7669e5c6 100644 --- a/docs/AdvisorySeverity.md +++ b/docs/AdvisorySeverity.md @@ -1,5 +1,6 @@ # AdvisorySeverity +advisory.Severity ## Properties diff --git a/docs/AdvisoryShadowServerExploitedVulnerability.md b/docs/AdvisoryShadowServerExploitedVulnerability.md index e4f6542c..464b50bc 100644 --- a/docs/AdvisoryShadowServerExploitedVulnerability.md +++ b/docs/AdvisoryShadowServerExploitedVulnerability.md @@ -1,5 +1,6 @@ # AdvisoryShadowServerExploitedVulnerability +advisory.ShadowServerExploitedVulnerability ## Properties diff --git a/docs/AdvisoryShielder.md b/docs/AdvisoryShielder.md index ab9bd1b6..36b2b302 100644 --- a/docs/AdvisoryShielder.md +++ b/docs/AdvisoryShielder.md @@ -1,5 +1,6 @@ # AdvisoryShielder +advisory.Shielder ## Properties diff --git a/docs/AdvisorySick.md b/docs/AdvisorySick.md index b9838fdb..be49192c 100644 --- a/docs/AdvisorySick.md +++ b/docs/AdvisorySick.md @@ -1,5 +1,6 @@ # AdvisorySick +advisory.Sick ## Properties diff --git a/docs/AdvisorySiemensAcknowledgments.md b/docs/AdvisorySiemensAcknowledgments.md index 61b18864..1aabaaaf 100644 --- a/docs/AdvisorySiemensAcknowledgments.md +++ b/docs/AdvisorySiemensAcknowledgments.md @@ -1,5 +1,6 @@ # AdvisorySiemensAcknowledgments +advisory.SiemensAcknowledgments ## Properties diff --git a/docs/AdvisorySiemensAdvisory.md b/docs/AdvisorySiemensAdvisory.md index 2f30110a..2fef9851 100644 --- a/docs/AdvisorySiemensAdvisory.md +++ b/docs/AdvisorySiemensAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySiemensAdvisory +advisory.SiemensAdvisory ## Properties diff --git a/docs/AdvisorySiemensBranch.md b/docs/AdvisorySiemensBranch.md index 76d7babe..249ddee0 100644 --- a/docs/AdvisorySiemensBranch.md +++ b/docs/AdvisorySiemensBranch.md @@ -1,5 +1,6 @@ # AdvisorySiemensBranch +advisory.SiemensBranch ## Properties diff --git a/docs/AdvisorySiemensCVSSV3.md b/docs/AdvisorySiemensCVSSV3.md index d88d83cf..560e86d6 100644 --- a/docs/AdvisorySiemensCVSSV3.md +++ b/docs/AdvisorySiemensCVSSV3.md @@ -1,5 +1,6 @@ # AdvisorySiemensCVSSV3 +advisory.SiemensCVSSV3 ## Properties diff --git a/docs/AdvisorySiemensCWE.md b/docs/AdvisorySiemensCWE.md index d012974e..ea44118e 100644 --- a/docs/AdvisorySiemensCWE.md +++ b/docs/AdvisorySiemensCWE.md @@ -1,5 +1,6 @@ # AdvisorySiemensCWE +advisory.SiemensCWE ## Properties diff --git a/docs/AdvisorySiemensDistribution.md b/docs/AdvisorySiemensDistribution.md index 0bb7541c..4573db8d 100644 --- a/docs/AdvisorySiemensDistribution.md +++ b/docs/AdvisorySiemensDistribution.md @@ -1,5 +1,6 @@ # AdvisorySiemensDistribution +advisory.SiemensDistribution ## Properties diff --git a/docs/AdvisorySiemensDocument.md b/docs/AdvisorySiemensDocument.md index 89e73433..78d9fb9b 100644 --- a/docs/AdvisorySiemensDocument.md +++ b/docs/AdvisorySiemensDocument.md @@ -1,5 +1,6 @@ # AdvisorySiemensDocument +advisory.SiemensDocument ## Properties diff --git a/docs/AdvisorySiemensEngine.md b/docs/AdvisorySiemensEngine.md index 206cff72..b132311c 100644 --- a/docs/AdvisorySiemensEngine.md +++ b/docs/AdvisorySiemensEngine.md @@ -1,5 +1,6 @@ # AdvisorySiemensEngine +advisory.SiemensEngine ## Properties diff --git a/docs/AdvisorySiemensGenerator.md b/docs/AdvisorySiemensGenerator.md index 747c785b..ab74c2ae 100644 --- a/docs/AdvisorySiemensGenerator.md +++ b/docs/AdvisorySiemensGenerator.md @@ -1,5 +1,6 @@ # AdvisorySiemensGenerator +advisory.SiemensGenerator ## Properties diff --git a/docs/AdvisorySiemensNotes.md b/docs/AdvisorySiemensNotes.md index a195afe5..4dd22578 100644 --- a/docs/AdvisorySiemensNotes.md +++ b/docs/AdvisorySiemensNotes.md @@ -1,5 +1,6 @@ # AdvisorySiemensNotes +advisory.SiemensNotes ## Properties diff --git a/docs/AdvisorySiemensProduct.md b/docs/AdvisorySiemensProduct.md index e265e66c..fc6126b0 100644 --- a/docs/AdvisorySiemensProduct.md +++ b/docs/AdvisorySiemensProduct.md @@ -1,5 +1,6 @@ # AdvisorySiemensProduct +advisory.SiemensProduct ## Properties diff --git a/docs/AdvisorySiemensProductIdentificationHelper.md b/docs/AdvisorySiemensProductIdentificationHelper.md index 26fb2700..fdd9dc92 100644 --- a/docs/AdvisorySiemensProductIdentificationHelper.md +++ b/docs/AdvisorySiemensProductIdentificationHelper.md @@ -1,5 +1,6 @@ # AdvisorySiemensProductIdentificationHelper +advisory.SiemensProductIdentificationHelper ## Properties diff --git a/docs/AdvisorySiemensProductStatus.md b/docs/AdvisorySiemensProductStatus.md index ed753683..7c1beaf3 100644 --- a/docs/AdvisorySiemensProductStatus.md +++ b/docs/AdvisorySiemensProductStatus.md @@ -1,5 +1,6 @@ # AdvisorySiemensProductStatus +advisory.SiemensProductStatus ## Properties diff --git a/docs/AdvisorySiemensProductTree.md b/docs/AdvisorySiemensProductTree.md index b4c2bfac..3a937344 100644 --- a/docs/AdvisorySiemensProductTree.md +++ b/docs/AdvisorySiemensProductTree.md @@ -1,5 +1,6 @@ # AdvisorySiemensProductTree +advisory.SiemensProductTree ## Properties diff --git a/docs/AdvisorySiemensPublisher.md b/docs/AdvisorySiemensPublisher.md index 9f6f7872..8f195cd7 100644 --- a/docs/AdvisorySiemensPublisher.md +++ b/docs/AdvisorySiemensPublisher.md @@ -1,5 +1,6 @@ # AdvisorySiemensPublisher +advisory.SiemensPublisher ## Properties diff --git a/docs/AdvisorySiemensReferences.md b/docs/AdvisorySiemensReferences.md index 650349ba..df674244 100644 --- a/docs/AdvisorySiemensReferences.md +++ b/docs/AdvisorySiemensReferences.md @@ -1,5 +1,6 @@ # AdvisorySiemensReferences +advisory.SiemensReferences ## Properties diff --git a/docs/AdvisorySiemensRemediation.md b/docs/AdvisorySiemensRemediation.md index 6a1f2ed3..a506e6fa 100644 --- a/docs/AdvisorySiemensRemediation.md +++ b/docs/AdvisorySiemensRemediation.md @@ -1,5 +1,6 @@ # AdvisorySiemensRemediation +advisory.SiemensRemediation ## Properties diff --git a/docs/AdvisorySiemensRevisionHistory.md b/docs/AdvisorySiemensRevisionHistory.md index 82c6bc99..f4514259 100644 --- a/docs/AdvisorySiemensRevisionHistory.md +++ b/docs/AdvisorySiemensRevisionHistory.md @@ -1,5 +1,6 @@ # AdvisorySiemensRevisionHistory +advisory.SiemensRevisionHistory ## Properties diff --git a/docs/AdvisorySiemensScore.md b/docs/AdvisorySiemensScore.md index 15b44fee..20acd82d 100644 --- a/docs/AdvisorySiemensScore.md +++ b/docs/AdvisorySiemensScore.md @@ -1,5 +1,6 @@ # AdvisorySiemensScore +advisory.SiemensScore ## Properties diff --git a/docs/AdvisorySiemensSubBranch.md b/docs/AdvisorySiemensSubBranch.md index ce256347..1da6d22e 100644 --- a/docs/AdvisorySiemensSubBranch.md +++ b/docs/AdvisorySiemensSubBranch.md @@ -1,5 +1,6 @@ # AdvisorySiemensSubBranch +advisory.SiemensSubBranch ## Properties diff --git a/docs/AdvisorySiemensSubSubBranch.md b/docs/AdvisorySiemensSubSubBranch.md index 052466b8..2bbd2e29 100644 --- a/docs/AdvisorySiemensSubSubBranch.md +++ b/docs/AdvisorySiemensSubSubBranch.md @@ -1,5 +1,6 @@ # AdvisorySiemensSubSubBranch +advisory.SiemensSubSubBranch ## Properties diff --git a/docs/AdvisorySiemensTLP.md b/docs/AdvisorySiemensTLP.md index 09cfd963..9319e344 100644 --- a/docs/AdvisorySiemensTLP.md +++ b/docs/AdvisorySiemensTLP.md @@ -1,5 +1,6 @@ # AdvisorySiemensTLP +advisory.SiemensTLP ## Properties diff --git a/docs/AdvisorySiemensTracking.md b/docs/AdvisorySiemensTracking.md index be757933..070466db 100644 --- a/docs/AdvisorySiemensTracking.md +++ b/docs/AdvisorySiemensTracking.md @@ -1,5 +1,6 @@ # AdvisorySiemensTracking +advisory.SiemensTracking ## Properties diff --git a/docs/AdvisorySiemensVulnerability.md b/docs/AdvisorySiemensVulnerability.md index 3221df94..fe58a7d5 100644 --- a/docs/AdvisorySiemensVulnerability.md +++ b/docs/AdvisorySiemensVulnerability.md @@ -1,5 +1,6 @@ # AdvisorySiemensVulnerability +advisory.SiemensVulnerability ## Properties diff --git a/docs/AdvisorySierraWireless.md b/docs/AdvisorySierraWireless.md index ed7554b4..cef4140e 100644 --- a/docs/AdvisorySierraWireless.md +++ b/docs/AdvisorySierraWireless.md @@ -1,5 +1,6 @@ # AdvisorySierraWireless +advisory.SierraWireless ## Properties diff --git a/docs/AdvisorySigmaRule.md b/docs/AdvisorySigmaRule.md index d1f226ef..c7f1a325 100644 --- a/docs/AdvisorySigmaRule.md +++ b/docs/AdvisorySigmaRule.md @@ -1,5 +1,6 @@ # AdvisorySigmaRule +advisory.SigmaRule ## Properties diff --git a/docs/AdvisorySigmaRuleRule.md b/docs/AdvisorySigmaRuleRule.md index b8c537cc..269b6a11 100644 --- a/docs/AdvisorySigmaRuleRule.md +++ b/docs/AdvisorySigmaRuleRule.md @@ -1,5 +1,6 @@ # AdvisorySigmaRuleRule +advisory.SigmaRuleRule ## Properties diff --git a/docs/AdvisorySingCert.md b/docs/AdvisorySingCert.md index d835dd1f..db987ca4 100644 --- a/docs/AdvisorySingCert.md +++ b/docs/AdvisorySingCert.md @@ -1,5 +1,6 @@ # AdvisorySingCert +advisory.SingCert ## Properties diff --git a/docs/AdvisorySitecore.md b/docs/AdvisorySitecore.md index cb363a05..7828e9ff 100644 --- a/docs/AdvisorySitecore.md +++ b/docs/AdvisorySitecore.md @@ -1,5 +1,6 @@ # AdvisorySitecore +advisory.Sitecore ## Properties diff --git a/docs/AdvisorySlackware.md b/docs/AdvisorySlackware.md index ee6ff31a..75d3fabe 100644 --- a/docs/AdvisorySlackware.md +++ b/docs/AdvisorySlackware.md @@ -1,5 +1,6 @@ # AdvisorySlackware +advisory.Slackware ## Properties diff --git a/docs/AdvisorySoftwareUpdate.md b/docs/AdvisorySoftwareUpdate.md index 3fb72600..cf839082 100644 --- a/docs/AdvisorySoftwareUpdate.md +++ b/docs/AdvisorySoftwareUpdate.md @@ -1,5 +1,6 @@ # AdvisorySoftwareUpdate +advisory.SoftwareUpdate ## Properties diff --git a/docs/AdvisorySolarWindsAdvisory.md b/docs/AdvisorySolarWindsAdvisory.md index cd53ee76..e7f80561 100644 --- a/docs/AdvisorySolarWindsAdvisory.md +++ b/docs/AdvisorySolarWindsAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySolarWindsAdvisory +advisory.SolarWindsAdvisory ## Properties diff --git a/docs/AdvisorySolr.md b/docs/AdvisorySolr.md index c7b31396..53c9b008 100644 --- a/docs/AdvisorySolr.md +++ b/docs/AdvisorySolr.md @@ -1,5 +1,6 @@ # AdvisorySolr +advisory.Solr ## Properties diff --git a/docs/AdvisorySonatype.md b/docs/AdvisorySonatype.md index dc7b7277..2d2777a3 100644 --- a/docs/AdvisorySonatype.md +++ b/docs/AdvisorySonatype.md @@ -1,5 +1,6 @@ # AdvisorySonatype +advisory.Sonatype ## Properties diff --git a/docs/AdvisorySonicWallAdvisory.md b/docs/AdvisorySonicWallAdvisory.md index db233053..f222eed0 100644 --- a/docs/AdvisorySonicWallAdvisory.md +++ b/docs/AdvisorySonicWallAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySonicWallAdvisory +advisory.SonicWallAdvisory ## Properties diff --git a/docs/AdvisorySpacelabsHealthcareAdvisory.md b/docs/AdvisorySpacelabsHealthcareAdvisory.md index 1c9f78ab..e092c540 100644 --- a/docs/AdvisorySpacelabsHealthcareAdvisory.md +++ b/docs/AdvisorySpacelabsHealthcareAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySpacelabsHealthcareAdvisory +advisory.SpacelabsHealthcareAdvisory ## Properties diff --git a/docs/AdvisorySplunk.md b/docs/AdvisorySplunk.md index a8ed6d19..5c186025 100644 --- a/docs/AdvisorySplunk.md +++ b/docs/AdvisorySplunk.md @@ -1,5 +1,6 @@ # AdvisorySplunk +advisory.Splunk ## Properties diff --git a/docs/AdvisorySplunkProduct.md b/docs/AdvisorySplunkProduct.md index ee5ef548..85e8a4a6 100644 --- a/docs/AdvisorySplunkProduct.md +++ b/docs/AdvisorySplunkProduct.md @@ -1,5 +1,6 @@ # AdvisorySplunkProduct +advisory.SplunkProduct ## Properties diff --git a/docs/AdvisorySpring.md b/docs/AdvisorySpring.md index 9196929c..f94e8a22 100644 --- a/docs/AdvisorySpring.md +++ b/docs/AdvisorySpring.md @@ -1,5 +1,6 @@ # AdvisorySpring +advisory.Spring ## Properties diff --git a/docs/AdvisoryStatus.md b/docs/AdvisoryStatus.md deleted file mode 100644 index 1c1f15fc..00000000 --- a/docs/AdvisoryStatus.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryStatus - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**product_id** | **List[str]** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_status import AdvisoryStatus - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryStatus from a JSON string -advisory_status_instance = AdvisoryStatus.from_json(json) -# print the JSON string representation of the object -print(AdvisoryStatus.to_json()) - -# convert the object into a dict -advisory_status_dict = advisory_status_instance.to_dict() -# create an instance of AdvisoryStatus from a dict -advisory_status_from_dict = AdvisoryStatus.from_dict(advisory_status_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryStormshield.md b/docs/AdvisoryStormshield.md index cdd9474c..ac1ac1b3 100644 --- a/docs/AdvisoryStormshield.md +++ b/docs/AdvisoryStormshield.md @@ -1,5 +1,6 @@ # AdvisoryStormshield +advisory.Stormshield ## Properties diff --git a/docs/AdvisoryStrykerAdvisory.md b/docs/AdvisoryStrykerAdvisory.md index 08e6120b..ad76604b 100644 --- a/docs/AdvisoryStrykerAdvisory.md +++ b/docs/AdvisoryStrykerAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryStrykerAdvisory +advisory.StrykerAdvisory ## Properties diff --git a/docs/AdvisorySudo.md b/docs/AdvisorySudo.md index 6d48efa4..76a4403b 100644 --- a/docs/AdvisorySudo.md +++ b/docs/AdvisorySudo.md @@ -1,5 +1,6 @@ # AdvisorySudo +advisory.Sudo ## Properties diff --git a/docs/AdvisorySuseSecurity.md b/docs/AdvisorySuseSecurity.md index 39a9d87f..35a1102d 100644 --- a/docs/AdvisorySuseSecurity.md +++ b/docs/AdvisorySuseSecurity.md @@ -1,5 +1,6 @@ # AdvisorySuseSecurity +advisory.SuseSecurity ## Properties diff --git a/docs/AdvisorySwisslogHealthcareAdvisory.md b/docs/AdvisorySwisslogHealthcareAdvisory.md index b34fe514..b2a5662e 100644 --- a/docs/AdvisorySwisslogHealthcareAdvisory.md +++ b/docs/AdvisorySwisslogHealthcareAdvisory.md @@ -1,5 +1,6 @@ # AdvisorySwisslogHealthcareAdvisory +advisory.SwisslogHealthcareAdvisory ## Properties diff --git a/docs/AdvisorySymfony.md b/docs/AdvisorySymfony.md index 8063fcea..9245a46c 100644 --- a/docs/AdvisorySymfony.md +++ b/docs/AdvisorySymfony.md @@ -1,5 +1,6 @@ # AdvisorySymfony +advisory.Symfony ## Properties diff --git a/docs/AdvisorySynacktiv.md b/docs/AdvisorySynacktiv.md index e69e9639..ec0687ea 100644 --- a/docs/AdvisorySynacktiv.md +++ b/docs/AdvisorySynacktiv.md @@ -1,5 +1,6 @@ # AdvisorySynacktiv +advisory.Synacktiv ## Properties diff --git a/docs/AdvisorySyncroSoft.md b/docs/AdvisorySyncroSoft.md index b8dfbfb4..afe3cc21 100644 --- a/docs/AdvisorySyncroSoft.md +++ b/docs/AdvisorySyncroSoft.md @@ -1,5 +1,6 @@ # AdvisorySyncroSoft +advisory.SyncroSoft ## Properties diff --git a/docs/AdvisorySynology.md b/docs/AdvisorySynology.md index b7e2d99a..e0476a05 100644 --- a/docs/AdvisorySynology.md +++ b/docs/AdvisorySynology.md @@ -1,5 +1,6 @@ # AdvisorySynology +advisory.Synology ## Properties diff --git a/docs/AdvisorySyss.md b/docs/AdvisorySyss.md index cc6a5390..c0640b75 100644 --- a/docs/AdvisorySyss.md +++ b/docs/AdvisorySyss.md @@ -1,5 +1,6 @@ # AdvisorySyss +advisory.Syss ## Properties diff --git a/docs/AdvisoryTI.md b/docs/AdvisoryTI.md index 0ea333f4..35f8015e 100644 --- a/docs/AdvisoryTI.md +++ b/docs/AdvisoryTI.md @@ -1,5 +1,6 @@ # AdvisoryTI +advisory.TI ## Properties diff --git a/docs/AdvisoryTPLink.md b/docs/AdvisoryTPLink.md index cf1af920..50d63977 100644 --- a/docs/AdvisoryTPLink.md +++ b/docs/AdvisoryTPLink.md @@ -1,5 +1,6 @@ # AdvisoryTPLink +advisory.TPLink ## Properties diff --git a/docs/AdvisoryTWCertAdvisory.md b/docs/AdvisoryTWCertAdvisory.md index a1be41ee..e34262aa 100644 --- a/docs/AdvisoryTWCertAdvisory.md +++ b/docs/AdvisoryTWCertAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryTWCertAdvisory +advisory.TWCertAdvisory ## Properties diff --git a/docs/AdvisoryTailscale.md b/docs/AdvisoryTailscale.md index 96bf4040..6ca6494f 100644 --- a/docs/AdvisoryTailscale.md +++ b/docs/AdvisoryTailscale.md @@ -1,5 +1,6 @@ # AdvisoryTailscale +advisory.Tailscale ## Properties diff --git a/docs/AdvisoryTalosAdvisory.md b/docs/AdvisoryTalosAdvisory.md index e9f32232..558d4066 100644 --- a/docs/AdvisoryTalosAdvisory.md +++ b/docs/AdvisoryTalosAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryTalosAdvisory +advisory.TalosAdvisory ## Properties diff --git a/docs/AdvisoryTeamViewer.md b/docs/AdvisoryTeamViewer.md index d7117224..9a5e0deb 100644 --- a/docs/AdvisoryTeamViewer.md +++ b/docs/AdvisoryTeamViewer.md @@ -1,5 +1,6 @@ # AdvisoryTeamViewer +advisory.TeamViewer ## Properties diff --git a/docs/AdvisoryTenableResearchAdvisory.md b/docs/AdvisoryTenableResearchAdvisory.md index 17d78a8f..1de64166 100644 --- a/docs/AdvisoryTenableResearchAdvisory.md +++ b/docs/AdvisoryTenableResearchAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryTenableResearchAdvisory +advisory.TenableResearchAdvisory ## Properties diff --git a/docs/AdvisoryTencent.md b/docs/AdvisoryTencent.md index e72943ab..c6bdcb78 100644 --- a/docs/AdvisoryTencent.md +++ b/docs/AdvisoryTencent.md @@ -1,5 +1,6 @@ # AdvisoryTencent +advisory.Tencent ## Properties diff --git a/docs/AdvisoryThales.md b/docs/AdvisoryThales.md index 2bdffe51..2909aae6 100644 --- a/docs/AdvisoryThales.md +++ b/docs/AdvisoryThales.md @@ -1,5 +1,6 @@ # AdvisoryThales +advisory.Thales ## Properties diff --git a/docs/AdvisoryTheMissingLink.md b/docs/AdvisoryTheMissingLink.md index 36ead4ab..77f93f8f 100644 --- a/docs/AdvisoryTheMissingLink.md +++ b/docs/AdvisoryTheMissingLink.md @@ -1,5 +1,6 @@ # AdvisoryTheMissingLink +advisory.TheMissingLink ## Properties diff --git a/docs/AdvisoryThermoFisher.md b/docs/AdvisoryThermoFisher.md index 4c2149e4..bdc56edc 100644 --- a/docs/AdvisoryThermoFisher.md +++ b/docs/AdvisoryThermoFisher.md @@ -1,5 +1,6 @@ # AdvisoryThermoFisher +advisory.ThermoFisher ## Properties diff --git a/docs/AdvisoryThreat.md b/docs/AdvisoryThreat.md deleted file mode 100644 index d6936a95..00000000 --- a/docs/AdvisoryThreat.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryThreat - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**severity** | **str** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryThreat from a JSON string -advisory_threat_instance = AdvisoryThreat.from_json(json) -# print the JSON string representation of the object -print(AdvisoryThreat.to_json()) - -# convert the object into a dict -advisory_threat_dict = advisory_threat_instance.to_dict() -# create an instance of AdvisoryThreat from a dict -advisory_threat_from_dict = AdvisoryThreat.from_dict(advisory_threat_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryThreatActorWithExternalObjects.md b/docs/AdvisoryThreatActorWithExternalObjects.md index d42558f1..5ef41a1e 100644 --- a/docs/AdvisoryThreatActorWithExternalObjects.md +++ b/docs/AdvisoryThreatActorWithExternalObjects.md @@ -1,5 +1,6 @@ # AdvisoryThreatActorWithExternalObjects +advisory.ThreatActorWithExternalObjects ## Properties diff --git a/docs/AdvisoryThreatData.md b/docs/AdvisoryThreatData.md index 3a447ab5..537e74a4 100644 --- a/docs/AdvisoryThreatData.md +++ b/docs/AdvisoryThreatData.md @@ -1,5 +1,6 @@ # AdvisoryThreatData +advisory.ThreatData ## Properties diff --git a/docs/AdvisoryTibco.md b/docs/AdvisoryTibco.md index fb653b03..8a64b6ca 100644 --- a/docs/AdvisoryTibco.md +++ b/docs/AdvisoryTibco.md @@ -1,5 +1,6 @@ # AdvisoryTibco +advisory.Tibco ## Properties diff --git a/docs/AdvisoryTimeline.md b/docs/AdvisoryTimeline.md index a4ebe24c..4d543d3e 100644 --- a/docs/AdvisoryTimeline.md +++ b/docs/AdvisoryTimeline.md @@ -1,5 +1,6 @@ # AdvisoryTimeline +advisory.Timeline ## Properties diff --git a/docs/AdvisoryTool.md b/docs/AdvisoryTool.md index df4bb175..3811d047 100644 --- a/docs/AdvisoryTool.md +++ b/docs/AdvisoryTool.md @@ -1,5 +1,6 @@ # AdvisoryTool +advisory.Tool ## Properties diff --git a/docs/AdvisoryToolRef.md b/docs/AdvisoryToolRef.md index 2264096d..5d69479b 100644 --- a/docs/AdvisoryToolRef.md +++ b/docs/AdvisoryToolRef.md @@ -1,5 +1,6 @@ # AdvisoryToolRef +advisory.ToolRef ## Properties diff --git a/docs/AdvisoryTracking.md b/docs/AdvisoryTracking.md index 2500b09d..0c4b253e 100644 --- a/docs/AdvisoryTracking.md +++ b/docs/AdvisoryTracking.md @@ -1,5 +1,6 @@ # AdvisoryTracking +advisory.Tracking ## Properties diff --git a/docs/AdvisoryTrackingID.md b/docs/AdvisoryTrackingID.md index d545a0fa..7f57a642 100644 --- a/docs/AdvisoryTrackingID.md +++ b/docs/AdvisoryTrackingID.md @@ -1,5 +1,6 @@ # AdvisoryTrackingID +advisory.TrackingID ## Properties diff --git a/docs/AdvisoryTraneTechnology.md b/docs/AdvisoryTraneTechnology.md index 7494ed76..4b38db0d 100644 --- a/docs/AdvisoryTraneTechnology.md +++ b/docs/AdvisoryTraneTechnology.md @@ -1,5 +1,6 @@ # AdvisoryTraneTechnology +advisory.TraneTechnology ## Properties diff --git a/docs/AdvisoryTrendMicro.md b/docs/AdvisoryTrendMicro.md index 4d739b8a..f2a8ccc5 100644 --- a/docs/AdvisoryTrendMicro.md +++ b/docs/AdvisoryTrendMicro.md @@ -1,5 +1,6 @@ # AdvisoryTrendMicro +advisory.TrendMicro ## Properties diff --git a/docs/AdvisoryTriageNotes.md b/docs/AdvisoryTriageNotes.md index 44ed7d9c..cb7a3a77 100644 --- a/docs/AdvisoryTriageNotes.md +++ b/docs/AdvisoryTriageNotes.md @@ -1,5 +1,6 @@ # AdvisoryTriageNotes +advisory.TriageNotes ## Properties diff --git a/docs/AdvisoryTrustwave.md b/docs/AdvisoryTrustwave.md index af8fcce3..74f90c26 100644 --- a/docs/AdvisoryTrustwave.md +++ b/docs/AdvisoryTrustwave.md @@ -1,5 +1,6 @@ # AdvisoryTrustwave +advisory.Trustwave ## Properties diff --git a/docs/AdvisoryUSD.md b/docs/AdvisoryUSD.md index e4f9c390..e5d05e9a 100644 --- a/docs/AdvisoryUSD.md +++ b/docs/AdvisoryUSD.md @@ -1,5 +1,6 @@ # AdvisoryUSD +advisory.USD ## Properties diff --git a/docs/AdvisoryUSOMAdvisory.md b/docs/AdvisoryUSOMAdvisory.md index c82a6da3..bbe5b8f9 100644 --- a/docs/AdvisoryUSOMAdvisory.md +++ b/docs/AdvisoryUSOMAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryUSOMAdvisory +advisory.USOMAdvisory ## Properties diff --git a/docs/AdvisoryUbiquiti.md b/docs/AdvisoryUbiquiti.md index 1e9da58f..e07ced02 100644 --- a/docs/AdvisoryUbiquiti.md +++ b/docs/AdvisoryUbiquiti.md @@ -1,5 +1,6 @@ # AdvisoryUbiquiti +advisory.Ubiquiti ## Properties diff --git a/docs/AdvisoryUbuntuCVE.md b/docs/AdvisoryUbuntuCVE.md index 2ab16743..a33e58c7 100644 --- a/docs/AdvisoryUbuntuCVE.md +++ b/docs/AdvisoryUbuntuCVE.md @@ -1,5 +1,6 @@ # AdvisoryUbuntuCVE +advisory.UbuntuCVE ## Properties diff --git a/docs/AdvisoryUbuntuPackageReleaseStatus.md b/docs/AdvisoryUbuntuPackageReleaseStatus.md index 4277de6d..f0140ea1 100644 --- a/docs/AdvisoryUbuntuPackageReleaseStatus.md +++ b/docs/AdvisoryUbuntuPackageReleaseStatus.md @@ -1,5 +1,6 @@ # AdvisoryUbuntuPackageReleaseStatus +advisory.UbuntuPackageReleaseStatus ## Properties diff --git a/docs/AdvisoryUnify.md b/docs/AdvisoryUnify.md index 8f8b4d02..a925b404 100644 --- a/docs/AdvisoryUnify.md +++ b/docs/AdvisoryUnify.md @@ -1,5 +1,6 @@ # AdvisoryUnify +advisory.Unify ## Properties diff --git a/docs/AdvisoryUnisoc.md b/docs/AdvisoryUnisoc.md index 24911ac9..0a54ee02 100644 --- a/docs/AdvisoryUnisoc.md +++ b/docs/AdvisoryUnisoc.md @@ -1,5 +1,6 @@ # AdvisoryUnisoc +advisory.Unisoc ## Properties diff --git a/docs/AdvisoryUpdate.md b/docs/AdvisoryUpdate.md index 02d61deb..189f9781 100644 --- a/docs/AdvisoryUpdate.md +++ b/docs/AdvisoryUpdate.md @@ -1,5 +1,6 @@ # AdvisoryUpdate +advisory.Update ## Properties @@ -9,7 +10,7 @@ Name | Type | Description | Notes **date_added** | **str** | | [optional] **description** | **str** | | [optional] **id** | **str** | sort // key | [optional] -**issued** | [**AdvisoryDateTime**](AdvisoryDateTime.md) | | [optional] +**issued** | **object** | advisory.DateTime | [optional] **os_arch** | **str** | | [optional] **os_version** | **str** | | [optional] **packages** | [**List[AdvisoryPackage]**](AdvisoryPackage.md) | | [optional] @@ -17,7 +18,7 @@ Name | Type | Description | Notes **severity** | **str** | | [optional] **title** | **str** | | [optional] **type** | **str** | | [optional] -**updated** | [**AdvisoryDateTime**](AdvisoryDateTime.md) | | [optional] +**updated** | **object** | advisory.DateTime | [optional] ## Example diff --git a/docs/AdvisoryUpdated.md b/docs/AdvisoryUpdated.md deleted file mode 100644 index 9340c5e5..00000000 --- a/docs/AdvisoryUpdated.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryUpdated - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryUpdated from a JSON string -advisory_updated_instance = AdvisoryUpdated.from_json(json) -# print the JSON string representation of the object -print(AdvisoryUpdated.to_json()) - -# convert the object into a dict -advisory_updated_dict = advisory_updated_instance.to_dict() -# create an instance of AdvisoryUpdated from a dict -advisory_updated_from_dict = AdvisoryUpdated.from_dict(advisory_updated_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryV3AcceptanceLevel.md b/docs/AdvisoryV3AcceptanceLevel.md index a70d7301..afd6963a 100644 --- a/docs/AdvisoryV3AcceptanceLevel.md +++ b/docs/AdvisoryV3AcceptanceLevel.md @@ -1,5 +1,6 @@ # AdvisoryV3AcceptanceLevel +advisory.V3AcceptanceLevel ## Properties diff --git a/docs/AdvisoryVCCPEDictionary.md b/docs/AdvisoryVCCPEDictionary.md index e18b2c6b..ba657b04 100644 --- a/docs/AdvisoryVCCPEDictionary.md +++ b/docs/AdvisoryVCCPEDictionary.md @@ -1,5 +1,6 @@ # AdvisoryVCCPEDictionary +advisory.VCCPEDictionary ## Properties diff --git a/docs/AdvisoryVCVulnerableCPEs.md b/docs/AdvisoryVCVulnerableCPEs.md index 1c238f46..1b59602e 100644 --- a/docs/AdvisoryVCVulnerableCPEs.md +++ b/docs/AdvisoryVCVulnerableCPEs.md @@ -1,5 +1,6 @@ # AdvisoryVCVulnerableCPEs +advisory.VCVulnerableCPEs ## Properties diff --git a/docs/AdvisoryVDEAdvisory.md b/docs/AdvisoryVDEAdvisory.md index 28474e0c..9e1d9a9a 100644 --- a/docs/AdvisoryVDEAdvisory.md +++ b/docs/AdvisoryVDEAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryVDEAdvisory +advisory.VDEAdvisory ## Properties diff --git a/docs/AdvisoryVLC.md b/docs/AdvisoryVLC.md index 7ffcc096..92733a21 100644 --- a/docs/AdvisoryVLC.md +++ b/docs/AdvisoryVLC.md @@ -1,5 +1,6 @@ # AdvisoryVLC +advisory.VLC ## Properties diff --git a/docs/AdvisoryVMWareAdvisory.md b/docs/AdvisoryVMWareAdvisory.md index bcc71fb1..829021c5 100644 --- a/docs/AdvisoryVMWareAdvisory.md +++ b/docs/AdvisoryVMWareAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryVMWareAdvisory +advisory.VMWareAdvisory ## Properties diff --git a/docs/AdvisoryVYAIREAdvisory.md b/docs/AdvisoryVYAIREAdvisory.md index 3352c3d5..5cff0421 100644 --- a/docs/AdvisoryVYAIREAdvisory.md +++ b/docs/AdvisoryVYAIREAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryVYAIREAdvisory +advisory.VYAIREAdvisory ## Properties diff --git a/docs/AdvisoryVanDyke.md b/docs/AdvisoryVanDyke.md index 3f62af6d..98bb7e3b 100644 --- a/docs/AdvisoryVanDyke.md +++ b/docs/AdvisoryVanDyke.md @@ -1,5 +1,6 @@ # AdvisoryVanDyke +advisory.VanDyke ## Properties diff --git a/docs/AdvisoryVapidLabsAdvisory.md b/docs/AdvisoryVapidLabsAdvisory.md index 94261d83..7283b99c 100644 --- a/docs/AdvisoryVapidLabsAdvisory.md +++ b/docs/AdvisoryVapidLabsAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryVapidLabsAdvisory +advisory.VapidLabsAdvisory ## Properties diff --git a/docs/AdvisoryVeeam.md b/docs/AdvisoryVeeam.md index e4ceb70e..4e3898a5 100644 --- a/docs/AdvisoryVeeam.md +++ b/docs/AdvisoryVeeam.md @@ -1,5 +1,6 @@ # AdvisoryVeeam +advisory.Veeam ## Properties diff --git a/docs/AdvisoryVendorNameForThreatActor.md b/docs/AdvisoryVendorNameForThreatActor.md index 5707292a..e6ac6920 100644 --- a/docs/AdvisoryVendorNameForThreatActor.md +++ b/docs/AdvisoryVendorNameForThreatActor.md @@ -1,5 +1,6 @@ # AdvisoryVendorNameForThreatActor +advisory.VendorNameForThreatActor ## Properties diff --git a/docs/AdvisoryVendorProduct.md b/docs/AdvisoryVendorProduct.md index 06712ed0..f4e14e45 100644 --- a/docs/AdvisoryVendorProduct.md +++ b/docs/AdvisoryVendorProduct.md @@ -1,5 +1,6 @@ # AdvisoryVendorProduct +advisory.VendorProduct ## Properties diff --git a/docs/AdvisoryVendorRef.md b/docs/AdvisoryVendorRef.md index 3c9ec50f..9ab52e78 100644 --- a/docs/AdvisoryVendorRef.md +++ b/docs/AdvisoryVendorRef.md @@ -1,5 +1,6 @@ # AdvisoryVendorRef +advisory.VendorRef ## Properties diff --git a/docs/AdvisoryVeritas.md b/docs/AdvisoryVeritas.md index c4f0c079..eba670f5 100644 --- a/docs/AdvisoryVeritas.md +++ b/docs/AdvisoryVeritas.md @@ -1,5 +1,6 @@ # AdvisoryVeritas +advisory.Veritas ## Properties diff --git a/docs/AdvisoryVirtuozzo.md b/docs/AdvisoryVirtuozzo.md index e1f03283..31b5f2ca 100644 --- a/docs/AdvisoryVirtuozzo.md +++ b/docs/AdvisoryVirtuozzo.md @@ -1,5 +1,6 @@ # AdvisoryVirtuozzo +advisory.Virtuozzo ## Properties diff --git a/docs/AdvisoryVoidSec.md b/docs/AdvisoryVoidSec.md index 5da10bc1..2e446839 100644 --- a/docs/AdvisoryVoidSec.md +++ b/docs/AdvisoryVoidSec.md @@ -1,5 +1,6 @@ # AdvisoryVoidSec +advisory.VoidSec ## Properties diff --git a/docs/AdvisoryVulnCheck.md b/docs/AdvisoryVulnCheck.md index 0ff63c84..b9faeaa9 100644 --- a/docs/AdvisoryVulnCheck.md +++ b/docs/AdvisoryVulnCheck.md @@ -1,5 +1,6 @@ # AdvisoryVulnCheck +advisory.VulnCheck ## Properties diff --git a/docs/AdvisoryVulnCheckCVEListV5.md b/docs/AdvisoryVulnCheckCVEListV5.md index 79aea3d9..748b9df3 100644 --- a/docs/AdvisoryVulnCheckCVEListV5.md +++ b/docs/AdvisoryVulnCheckCVEListV5.md @@ -1,5 +1,6 @@ # AdvisoryVulnCheckCVEListV5 +advisory.VulnCheckCVEListV5 ## Properties diff --git a/docs/AdvisoryVulnCheckConfig.md b/docs/AdvisoryVulnCheckConfig.md index a6a3f027..ef9a31c7 100644 --- a/docs/AdvisoryVulnCheckConfig.md +++ b/docs/AdvisoryVulnCheckConfig.md @@ -1,5 +1,6 @@ # AdvisoryVulnCheckConfig +advisory.VulnCheckConfig ## Properties diff --git a/docs/AdvisoryVulnCheckKEV.md b/docs/AdvisoryVulnCheckKEV.md index 259a7bfd..0034ff89 100644 --- a/docs/AdvisoryVulnCheckKEV.md +++ b/docs/AdvisoryVulnCheckKEV.md @@ -1,5 +1,6 @@ # AdvisoryVulnCheckKEV +advisory.VulnCheckKEV ## Properties diff --git a/docs/AdvisoryVulnCheckPackage.md b/docs/AdvisoryVulnCheckPackage.md index e410ca95..c9693208 100644 --- a/docs/AdvisoryVulnCheckPackage.md +++ b/docs/AdvisoryVulnCheckPackage.md @@ -1,5 +1,6 @@ # AdvisoryVulnCheckPackage +advisory.VulnCheckPackage ## Properties diff --git a/docs/AdvisoryVulnerability.md b/docs/AdvisoryVulnerability.md deleted file mode 100644 index e01606ce..00000000 --- a/docs/AdvisoryVulnerability.md +++ /dev/null @@ -1,35 +0,0 @@ -# AdvisoryVulnerability - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**cve** | **str** | | [optional] -**cvssscore_sets** | [**AdvisoryScoreSet**](AdvisoryScoreSet.md) | | [optional] -**description** | **str** | | [optional] -**packages** | [**List[AdvisoryVulnCheckPackage]**](AdvisoryVulnCheckPackage.md) | vulncheck addition | [optional] -**product_statuses** | [**List[AdvisoryStatus]**](AdvisoryStatus.md) | | [optional] -**references** | [**List[AdvisoryCVRFReference]**](AdvisoryCVRFReference.md) | | [optional] -**threats** | [**List[AdvisoryThreat]**](AdvisoryThreat.md) | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryVulnerability from a JSON string -advisory_vulnerability_instance = AdvisoryVulnerability.from_json(json) -# print the JSON string representation of the object -print(AdvisoryVulnerability.to_json()) - -# convert the object into a dict -advisory_vulnerability_dict = advisory_vulnerability_instance.to_dict() -# create an instance of AdvisoryVulnerability from a dict -advisory_vulnerability_from_dict = AdvisoryVulnerability.from_dict(advisory_vulnerability_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryVulnerableDebianPackage.md b/docs/AdvisoryVulnerableDebianPackage.md index 8f5e23a6..943b0162 100644 --- a/docs/AdvisoryVulnerableDebianPackage.md +++ b/docs/AdvisoryVulnerableDebianPackage.md @@ -1,5 +1,6 @@ # AdvisoryVulnerableDebianPackage +advisory.VulnerableDebianPackage ## Properties diff --git a/docs/AdvisoryVulnerableProduct.md b/docs/AdvisoryVulnerableProduct.md index 7171a864..6029ddef 100644 --- a/docs/AdvisoryVulnerableProduct.md +++ b/docs/AdvisoryVulnerableProduct.md @@ -1,5 +1,6 @@ # AdvisoryVulnerableProduct +advisory.VulnerableProduct ## Properties diff --git a/docs/AdvisoryVulnrichment.md b/docs/AdvisoryVulnrichment.md index dd5be323..280fc734 100644 --- a/docs/AdvisoryVulnrichment.md +++ b/docs/AdvisoryVulnrichment.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichment +advisory.Vulnrichment ## Properties diff --git a/docs/AdvisoryVulnrichmentCVERef.md b/docs/AdvisoryVulnrichmentCVERef.md index 71a3c601..91df032a 100644 --- a/docs/AdvisoryVulnrichmentCVERef.md +++ b/docs/AdvisoryVulnrichmentCVERef.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentCVERef +advisory.VulnrichmentCVERef ## Properties diff --git a/docs/AdvisoryVulnrichmentContainers.md b/docs/AdvisoryVulnrichmentContainers.md index 1115d1bc..f9f23525 100644 --- a/docs/AdvisoryVulnrichmentContainers.md +++ b/docs/AdvisoryVulnrichmentContainers.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentContainers +advisory.VulnrichmentContainers ## Properties diff --git a/docs/AdvisoryVulnrichmentContent.md b/docs/AdvisoryVulnrichmentContent.md index 3c1e2a76..a6ce4627 100644 --- a/docs/AdvisoryVulnrichmentContent.md +++ b/docs/AdvisoryVulnrichmentContent.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentContent +advisory.VulnrichmentContent ## Properties diff --git a/docs/AdvisoryVulnrichmentMetric.md b/docs/AdvisoryVulnrichmentMetric.md index fc1e6477..652cb4ac 100644 --- a/docs/AdvisoryVulnrichmentMetric.md +++ b/docs/AdvisoryVulnrichmentMetric.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentMetric +advisory.VulnrichmentMetric ## Properties diff --git a/docs/AdvisoryVulnrichmentOption.md b/docs/AdvisoryVulnrichmentOption.md index 038e7ef4..555e3377 100644 --- a/docs/AdvisoryVulnrichmentOption.md +++ b/docs/AdvisoryVulnrichmentOption.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentOption +advisory.VulnrichmentOption ## Properties diff --git a/docs/AdvisoryVulnrichmentOther.md b/docs/AdvisoryVulnrichmentOther.md index 39b8b290..8d88507e 100644 --- a/docs/AdvisoryVulnrichmentOther.md +++ b/docs/AdvisoryVulnrichmentOther.md @@ -1,5 +1,6 @@ # AdvisoryVulnrichmentOther +advisory.VulnrichmentOther ## Properties diff --git a/docs/AdvisoryWRT.md b/docs/AdvisoryWRT.md index c73aa3e2..d8bd5ac5 100644 --- a/docs/AdvisoryWRT.md +++ b/docs/AdvisoryWRT.md @@ -1,5 +1,6 @@ # AdvisoryWRT +advisory.WRT ## Properties diff --git a/docs/AdvisoryWatchGuard.md b/docs/AdvisoryWatchGuard.md index 9690032b..bdc0490d 100644 --- a/docs/AdvisoryWatchGuard.md +++ b/docs/AdvisoryWatchGuard.md @@ -1,5 +1,6 @@ # AdvisoryWatchGuard +advisory.WatchGuard ## Properties diff --git a/docs/AdvisoryWhatsApp.md b/docs/AdvisoryWhatsApp.md index 443587af..bccec9c8 100644 --- a/docs/AdvisoryWhatsApp.md +++ b/docs/AdvisoryWhatsApp.md @@ -1,5 +1,6 @@ # AdvisoryWhatsApp +advisory.WhatsApp ## Properties diff --git a/docs/AdvisoryWibu.md b/docs/AdvisoryWibu.md index 8dd784a4..7c013d4b 100644 --- a/docs/AdvisoryWibu.md +++ b/docs/AdvisoryWibu.md @@ -1,5 +1,6 @@ # AdvisoryWibu +advisory.Wibu ## Properties diff --git a/docs/AdvisoryWireshark.md b/docs/AdvisoryWireshark.md index cba1ef39..4f8c97ef 100644 --- a/docs/AdvisoryWireshark.md +++ b/docs/AdvisoryWireshark.md @@ -1,5 +1,6 @@ # AdvisoryWireshark +advisory.Wireshark ## Properties diff --git a/docs/AdvisoryWithSecure.md b/docs/AdvisoryWithSecure.md index f980a680..0f161409 100644 --- a/docs/AdvisoryWithSecure.md +++ b/docs/AdvisoryWithSecure.md @@ -1,5 +1,6 @@ # AdvisoryWithSecure +advisory.WithSecure ## Properties diff --git a/docs/AdvisoryWolfSSL.md b/docs/AdvisoryWolfSSL.md index 4c14f498..35ceca39 100644 --- a/docs/AdvisoryWolfSSL.md +++ b/docs/AdvisoryWolfSSL.md @@ -1,5 +1,6 @@ # AdvisoryWolfSSL +advisory.WolfSSL ## Properties diff --git a/docs/AdvisoryWolfi.md b/docs/AdvisoryWolfi.md index 32f2adab..3b2d4b4b 100644 --- a/docs/AdvisoryWolfi.md +++ b/docs/AdvisoryWolfi.md @@ -1,5 +1,6 @@ # AdvisoryWolfi +advisory.Wolfi ## Properties diff --git a/docs/AdvisoryWolfiPackage.md b/docs/AdvisoryWolfiPackage.md index 1fc29d6c..bbbfea49 100644 --- a/docs/AdvisoryWolfiPackage.md +++ b/docs/AdvisoryWolfiPackage.md @@ -1,5 +1,6 @@ # AdvisoryWolfiPackage +advisory.WolfiPackage ## Properties diff --git a/docs/AdvisoryWolfiSecFix.md b/docs/AdvisoryWolfiSecFix.md index 30e4b286..b3541449 100644 --- a/docs/AdvisoryWolfiSecFix.md +++ b/docs/AdvisoryWolfiSecFix.md @@ -1,5 +1,6 @@ # AdvisoryWolfiSecFix +advisory.WolfiSecFix ## Properties diff --git a/docs/AdvisoryWordfence.md b/docs/AdvisoryWordfence.md index 4e4c8ede..7e6030a9 100644 --- a/docs/AdvisoryWordfence.md +++ b/docs/AdvisoryWordfence.md @@ -1,5 +1,6 @@ # AdvisoryWordfence +advisory.Wordfence ## Properties diff --git a/docs/AdvisoryXDB.md b/docs/AdvisoryXDB.md index 68e7c6b4..d8d32838 100644 --- a/docs/AdvisoryXDB.md +++ b/docs/AdvisoryXDB.md @@ -1,5 +1,6 @@ # AdvisoryXDB +advisory.XDB ## Properties diff --git a/docs/AdvisoryXen.md b/docs/AdvisoryXen.md index 1c035ca7..52ebb98b 100644 --- a/docs/AdvisoryXen.md +++ b/docs/AdvisoryXen.md @@ -1,5 +1,6 @@ # AdvisoryXen +advisory.Xen ## Properties diff --git a/docs/AdvisoryXerox.md b/docs/AdvisoryXerox.md index 0b1fce73..18c4ff65 100644 --- a/docs/AdvisoryXerox.md +++ b/docs/AdvisoryXerox.md @@ -1,5 +1,6 @@ # AdvisoryXerox +advisory.Xerox ## Properties diff --git a/docs/AdvisoryXiaomi.md b/docs/AdvisoryXiaomi.md index 8a7fefda..d8968cdc 100644 --- a/docs/AdvisoryXiaomi.md +++ b/docs/AdvisoryXiaomi.md @@ -1,5 +1,6 @@ # AdvisoryXiaomi +advisory.Xiaomi ## Properties diff --git a/docs/AdvisoryXylem.md b/docs/AdvisoryXylem.md index 8d80f624..44cb989f 100644 --- a/docs/AdvisoryXylem.md +++ b/docs/AdvisoryXylem.md @@ -1,5 +1,6 @@ # AdvisoryXylem +advisory.Xylem ## Properties diff --git a/docs/AdvisoryYamaha.md b/docs/AdvisoryYamaha.md index f9509b5d..ceaaa6fd 100644 --- a/docs/AdvisoryYamaha.md +++ b/docs/AdvisoryYamaha.md @@ -1,5 +1,6 @@ # AdvisoryYamaha +advisory.Yamaha ## Properties diff --git a/docs/AdvisoryYokogawaAdvisory.md b/docs/AdvisoryYokogawaAdvisory.md index 71e20227..bf1d542a 100644 --- a/docs/AdvisoryYokogawaAdvisory.md +++ b/docs/AdvisoryYokogawaAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryYokogawaAdvisory +advisory.YokogawaAdvisory ## Properties diff --git a/docs/AdvisoryYubico.md b/docs/AdvisoryYubico.md index 1efaeb9a..b5248941 100644 --- a/docs/AdvisoryYubico.md +++ b/docs/AdvisoryYubico.md @@ -1,5 +1,6 @@ # AdvisoryYubico +advisory.Yubico ## Properties diff --git a/docs/AdvisoryZDI.md b/docs/AdvisoryZDI.md index b18ca00c..479bdbbf 100644 --- a/docs/AdvisoryZDI.md +++ b/docs/AdvisoryZDI.md @@ -1,5 +1,6 @@ # AdvisoryZDI +advisory.ZDI ## Properties diff --git a/docs/AdvisoryZDIProduct.md b/docs/AdvisoryZDIProduct.md index 13b47aae..ee234228 100644 --- a/docs/AdvisoryZDIProduct.md +++ b/docs/AdvisoryZDIProduct.md @@ -1,5 +1,6 @@ # AdvisoryZDIProduct +advisory.ZDIProduct ## Properties diff --git a/docs/AdvisoryZDIResponse.md b/docs/AdvisoryZDIResponse.md index a13ca516..8ca41832 100644 --- a/docs/AdvisoryZDIResponse.md +++ b/docs/AdvisoryZDIResponse.md @@ -1,5 +1,6 @@ # AdvisoryZDIResponse +advisory.ZDIResponse ## Properties diff --git a/docs/AdvisoryZDIResponseVendor.md b/docs/AdvisoryZDIResponseVendor.md index 6dbd1fda..b6cc83c9 100644 --- a/docs/AdvisoryZDIResponseVendor.md +++ b/docs/AdvisoryZDIResponseVendor.md @@ -1,5 +1,6 @@ # AdvisoryZDIResponseVendor +advisory.ZDIResponseVendor ## Properties diff --git a/docs/AdvisoryZDIVendor.md b/docs/AdvisoryZDIVendor.md index 35015ea6..ecd23d4c 100644 --- a/docs/AdvisoryZDIVendor.md +++ b/docs/AdvisoryZDIVendor.md @@ -1,5 +1,6 @@ # AdvisoryZDIVendor +advisory.ZDIVendor ## Properties diff --git a/docs/AdvisoryZebra.md b/docs/AdvisoryZebra.md index f81eb840..0034d0b4 100644 --- a/docs/AdvisoryZebra.md +++ b/docs/AdvisoryZebra.md @@ -1,5 +1,6 @@ # AdvisoryZebra +advisory.Zebra ## Properties diff --git a/docs/AdvisoryZeroDayAdvisory.md b/docs/AdvisoryZeroDayAdvisory.md index 24d7d47c..a741b652 100644 --- a/docs/AdvisoryZeroDayAdvisory.md +++ b/docs/AdvisoryZeroDayAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryZeroDayAdvisory +advisory.ZeroDayAdvisory ## Properties diff --git a/docs/AdvisoryZeroScienceAdvisory.md b/docs/AdvisoryZeroScienceAdvisory.md index a2b4b496..2a6aa4c3 100644 --- a/docs/AdvisoryZeroScienceAdvisory.md +++ b/docs/AdvisoryZeroScienceAdvisory.md @@ -1,5 +1,6 @@ # AdvisoryZeroScienceAdvisory +advisory.ZeroScienceAdvisory ## Properties diff --git a/docs/AdvisoryZimbra.md b/docs/AdvisoryZimbra.md index cd05d098..500026d2 100644 --- a/docs/AdvisoryZimbra.md +++ b/docs/AdvisoryZimbra.md @@ -1,5 +1,6 @@ # AdvisoryZimbra +advisory.Zimbra ## Properties diff --git a/docs/AdvisoryZoom.md b/docs/AdvisoryZoom.md index f9d36036..b332ff50 100644 --- a/docs/AdvisoryZoom.md +++ b/docs/AdvisoryZoom.md @@ -1,5 +1,6 @@ # AdvisoryZoom +advisory.Zoom ## Properties diff --git a/docs/AdvisoryZscaler.md b/docs/AdvisoryZscaler.md index 7b0bab33..38a30258 100644 --- a/docs/AdvisoryZscaler.md +++ b/docs/AdvisoryZscaler.md @@ -1,5 +1,6 @@ # AdvisoryZscaler +advisory.Zscaler ## Properties diff --git a/docs/AdvisoryZuluVersion.md b/docs/AdvisoryZuluVersion.md index bd345bd9..c23e97d1 100644 --- a/docs/AdvisoryZuluVersion.md +++ b/docs/AdvisoryZuluVersion.md @@ -1,5 +1,6 @@ # AdvisoryZuluVersion +advisory.ZuluVersion ## Properties diff --git a/docs/AdvisoryZuso.md b/docs/AdvisoryZuso.md index 589c2b52..32460359 100644 --- a/docs/AdvisoryZuso.md +++ b/docs/AdvisoryZuso.md @@ -1,5 +1,6 @@ # AdvisoryZuso +advisory.Zuso ## Properties diff --git a/docs/AdvisoryZyxel.md b/docs/AdvisoryZyxel.md index 415dec23..42edf7aa 100644 --- a/docs/AdvisoryZyxel.md +++ b/docs/AdvisoryZyxel.md @@ -1,5 +1,6 @@ # AdvisoryZyxel +advisory.Zyxel ## Properties diff --git a/docs/ApiBaseMetricV2.md b/docs/ApiBaseMetricV2.md index 1756463f..000f3d82 100644 --- a/docs/ApiBaseMetricV2.md +++ b/docs/ApiBaseMetricV2.md @@ -1,5 +1,6 @@ # ApiBaseMetricV2 +api.BaseMetricV2 ## Properties diff --git a/docs/ApiBaseMetricV3.md b/docs/ApiBaseMetricV3.md index fb0e0afe..d8363164 100644 --- a/docs/ApiBaseMetricV3.md +++ b/docs/ApiBaseMetricV3.md @@ -1,5 +1,6 @@ # ApiBaseMetricV3 +api.BaseMetricV3 ## Properties diff --git a/docs/ApiCPE.md b/docs/ApiCPE.md index ea775284..4ed5be50 100644 --- a/docs/ApiCPE.md +++ b/docs/ApiCPE.md @@ -1,5 +1,6 @@ # ApiCPE +api.CPE ## Properties diff --git a/docs/ApiCPEMatch.md b/docs/ApiCPEMatch.md index 46acebc7..5474e6a8 100644 --- a/docs/ApiCPEMatch.md +++ b/docs/ApiCPEMatch.md @@ -1,5 +1,6 @@ # ApiCPEMatch +api.CPEMatch ## Properties diff --git a/docs/ApiCPEName.md b/docs/ApiCPEName.md index fd08db5a..f02f65bf 100644 --- a/docs/ApiCPEName.md +++ b/docs/ApiCPEName.md @@ -1,5 +1,6 @@ # ApiCPEName +api.CPEName ## Properties diff --git a/docs/ApiCVE.md b/docs/ApiCVE.md index cacb34bc..c52ecbbe 100644 --- a/docs/ApiCVE.md +++ b/docs/ApiCVE.md @@ -1,5 +1,6 @@ # ApiCVE +api.CVE ## Properties diff --git a/docs/ApiCVEDataMeta.md b/docs/ApiCVEDataMeta.md index 0bc04f54..751f89f7 100644 --- a/docs/ApiCVEDataMeta.md +++ b/docs/ApiCVEDataMeta.md @@ -1,5 +1,6 @@ # ApiCVEDataMeta +api.CVEDataMeta ## Properties diff --git a/docs/ApiCVEDataMetaExtended.md b/docs/ApiCVEDataMetaExtended.md index 60bc97e2..f4f3e825 100644 --- a/docs/ApiCVEDataMetaExtended.md +++ b/docs/ApiCVEDataMetaExtended.md @@ -1,5 +1,6 @@ # ApiCVEDataMetaExtended +api.CVEDataMetaExtended ## Properties diff --git a/docs/ApiCVEExtended.md b/docs/ApiCVEExtended.md index 472b61d1..bb8ef03d 100644 --- a/docs/ApiCVEExtended.md +++ b/docs/ApiCVEExtended.md @@ -1,5 +1,6 @@ # ApiCVEExtended +api.CVEExtended ## Properties diff --git a/docs/ApiCVSSV2.md b/docs/ApiCVSSV2.md index 51f110b6..011e2f96 100644 --- a/docs/ApiCVSSV2.md +++ b/docs/ApiCVSSV2.md @@ -1,5 +1,6 @@ # ApiCVSSV2 +api.CVSSV2 ## Properties diff --git a/docs/ApiCVSSV3.md b/docs/ApiCVSSV3.md index 12cd393b..d5e667ef 100644 --- a/docs/ApiCVSSV3.md +++ b/docs/ApiCVSSV3.md @@ -1,5 +1,6 @@ # ApiCVSSV3 +api.CVSSV3 ## Properties diff --git a/docs/ApiCWE.md b/docs/ApiCWE.md index 6693f342..61869543 100644 --- a/docs/ApiCWE.md +++ b/docs/ApiCWE.md @@ -1,5 +1,6 @@ # ApiCWE +api.CWE ## Properties diff --git a/docs/ApiCategorizationExtended.md b/docs/ApiCategorizationExtended.md index 35c0260b..7b7ca083 100644 --- a/docs/ApiCategorizationExtended.md +++ b/docs/ApiCategorizationExtended.md @@ -1,5 +1,6 @@ # ApiCategorizationExtended +api.CategorizationExtended ## Properties diff --git a/docs/ApiClientFingerprints.md b/docs/ApiClientFingerprints.md index ac8c5340..ca8e4f6e 100644 --- a/docs/ApiClientFingerprints.md +++ b/docs/ApiClientFingerprints.md @@ -1,5 +1,6 @@ # ApiClientFingerprints +api.ClientFingerprints ## Properties diff --git a/docs/ApiConfigurations.md b/docs/ApiConfigurations.md index 4b6fcfd2..6301cbaa 100644 --- a/docs/ApiConfigurations.md +++ b/docs/ApiConfigurations.md @@ -1,5 +1,6 @@ # ApiConfigurations +api.Configurations ## Properties diff --git a/docs/ApiCveItems.md b/docs/ApiCveItems.md index 77287547..61e943d2 100644 --- a/docs/ApiCveItems.md +++ b/docs/ApiCveItems.md @@ -1,5 +1,6 @@ # ApiCveItems +api.CveItems ## Properties diff --git a/docs/ApiCveItemsExtended.md b/docs/ApiCveItemsExtended.md index 33b06bbd..10b6e124 100644 --- a/docs/ApiCveItemsExtended.md +++ b/docs/ApiCveItemsExtended.md @@ -1,5 +1,6 @@ # ApiCveItemsExtended +api.CveItemsExtended ## Properties diff --git a/docs/ApiDateTime.md b/docs/ApiDateTime.md deleted file mode 100644 index 29301382..00000000 --- a/docs/ApiDateTime.md +++ /dev/null @@ -1,29 +0,0 @@ -# ApiDateTime - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.api_date_time import ApiDateTime - -# TODO update the JSON string below -json = "{}" -# create an instance of ApiDateTime from a JSON string -api_date_time_instance = ApiDateTime.from_json(json) -# print the JSON string representation of the object -print(ApiDateTime.to_json()) - -# convert the object into a dict -api_date_time_dict = api_date_time_instance.to_dict() -# create an instance of ApiDateTime from a dict -api_date_time_from_dict = ApiDateTime.from_dict(api_date_time_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ApiDescription.md b/docs/ApiDescription.md index 58e0970e..966f4ff5 100644 --- a/docs/ApiDescription.md +++ b/docs/ApiDescription.md @@ -1,5 +1,6 @@ # ApiDescription +api.Description ## Properties diff --git a/docs/ApiDescriptionData.md b/docs/ApiDescriptionData.md index b94d3610..178e499a 100644 --- a/docs/ApiDescriptionData.md +++ b/docs/ApiDescriptionData.md @@ -1,5 +1,6 @@ # ApiDescriptionData +api.DescriptionData ## Properties diff --git a/docs/ApiEPSS.md b/docs/ApiEPSS.md index fcda7438..5814654f 100644 --- a/docs/ApiEPSS.md +++ b/docs/ApiEPSS.md @@ -1,5 +1,6 @@ # ApiEPSS +exclude EPSS from changelog ## Properties diff --git a/docs/ApiEPSSData.md b/docs/ApiEPSSData.md index 1516cdec..5527f6fe 100644 --- a/docs/ApiEPSSData.md +++ b/docs/ApiEPSSData.md @@ -1,5 +1,6 @@ # ApiEPSSData +api.EPSSData ## Properties diff --git a/docs/ApiExploitChain.md b/docs/ApiExploitChain.md index 8bb8f364..d68cf670 100644 --- a/docs/ApiExploitChain.md +++ b/docs/ApiExploitChain.md @@ -1,5 +1,6 @@ # ApiExploitChain +api.ExploitChain ## Properties diff --git a/docs/ApiExploitChainCVE.md b/docs/ApiExploitChainCVE.md index 3bfe16b2..d9a3bda1 100644 --- a/docs/ApiExploitChainCVE.md +++ b/docs/ApiExploitChainCVE.md @@ -1,5 +1,6 @@ # ApiExploitChainCVE +api.ExploitChainCVE ## Properties diff --git a/docs/ApiExploitV3Result.md b/docs/ApiExploitV3Result.md index f468e380..695aeb19 100644 --- a/docs/ApiExploitV3Result.md +++ b/docs/ApiExploitV3Result.md @@ -1,5 +1,6 @@ # ApiExploitV3Result +api.ExploitV3Result ## Properties @@ -9,7 +10,7 @@ Name | Type | Description | Notes **commercial_exploit_found** | **bool** | | [optional] **counts** | [**ApiExploitsV3Count**](ApiExploitsV3Count.md) | | [optional] **date_added** | **str** | | [optional] -**epss** | [**ApiEPSS**](ApiEPSS.md) | exclude EPSS from changelog | [optional] +**epss** | [**ApiEPSS**](ApiEPSS.md) | | [optional] **exploits** | [**List[ApiNormalizedExploitV3Entry]**](ApiNormalizedExploitV3Entry.md) | | [optional] **id** | **str** | | [optional] **in_kev** | **bool** | | [optional] diff --git a/docs/ApiExploitsChange.md b/docs/ApiExploitsChange.md index c8bb3ae7..5e03ef3f 100644 --- a/docs/ApiExploitsChange.md +++ b/docs/ApiExploitsChange.md @@ -1,5 +1,6 @@ # ApiExploitsChange +api.ExploitsChange ## Properties diff --git a/docs/ApiExploitsChangelog.md b/docs/ApiExploitsChangelog.md index f8f55232..4f9082b4 100644 --- a/docs/ApiExploitsChangelog.md +++ b/docs/ApiExploitsChangelog.md @@ -1,5 +1,6 @@ # ApiExploitsChangelog +api.ExploitsChangelog ## Properties diff --git a/docs/ApiExploitsTrending.md b/docs/ApiExploitsTrending.md index d9ae4d9b..3b0f8d67 100644 --- a/docs/ApiExploitsTrending.md +++ b/docs/ApiExploitsTrending.md @@ -1,5 +1,6 @@ # ApiExploitsTrending +api.ExploitsTrending ## Properties diff --git a/docs/ApiExploitsV3Count.md b/docs/ApiExploitsV3Count.md index c81d5f35..3f549f96 100644 --- a/docs/ApiExploitsV3Count.md +++ b/docs/ApiExploitsV3Count.md @@ -1,5 +1,6 @@ # ApiExploitsV3Count +api.ExploitsV3Count ## Properties diff --git a/docs/ApiExploitsV3Timeline.md b/docs/ApiExploitsV3Timeline.md index 7e202d4b..d4f0acbd 100644 --- a/docs/ApiExploitsV3Timeline.md +++ b/docs/ApiExploitsV3Timeline.md @@ -1,5 +1,6 @@ # ApiExploitsV3Timeline +api.ExploitsV3Timeline ## Properties diff --git a/docs/ApiHTTPDetails.md b/docs/ApiHTTPDetails.md index 8c5fa902..b12fcf99 100644 --- a/docs/ApiHTTPDetails.md +++ b/docs/ApiHTTPDetails.md @@ -1,5 +1,6 @@ # ApiHTTPDetails +api.HTTPDetails ## Properties diff --git a/docs/ApiImpact.md b/docs/ApiImpact.md index d4d11e75..89f1b210 100644 --- a/docs/ApiImpact.md +++ b/docs/ApiImpact.md @@ -1,5 +1,6 @@ # ApiImpact +api.Impact ## Properties @@ -7,7 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **base_metric_v2** | [**ApiBaseMetricV2**](ApiBaseMetricV2.md) | | [optional] **base_metric_v3** | [**ApiBaseMetricV3**](ApiBaseMetricV3.md) | | [optional] -**metric_v40** | [**AdvisoryCVSSV40**](AdvisoryCVSSV40.md) | this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics | [optional] +**metric_v40** | [**AdvisoryCVSSV40**](AdvisoryCVSSV40.md) | | [optional] ## Example diff --git a/docs/ApiImpactExtended.md b/docs/ApiImpactExtended.md index 834eeece..aa8b1256 100644 --- a/docs/ApiImpactExtended.md +++ b/docs/ApiImpactExtended.md @@ -1,5 +1,6 @@ # ApiImpactExtended +api.ImpactExtended ## Properties diff --git a/docs/ApiInitialAccess.md b/docs/ApiInitialAccess.md index f1939c0f..d2f73d39 100644 --- a/docs/ApiInitialAccess.md +++ b/docs/ApiInitialAccess.md @@ -1,5 +1,6 @@ # ApiInitialAccess +api.InitialAccess ## Properties diff --git a/docs/ApiInitialAccessArtifact.md b/docs/ApiInitialAccessArtifact.md index 7ad31e50..b73d81c1 100644 --- a/docs/ApiInitialAccessArtifact.md +++ b/docs/ApiInitialAccessArtifact.md @@ -1,5 +1,6 @@ # ApiInitialAccessArtifact +api.InitialAccessArtifact ## Properties diff --git a/docs/ApiMitreAttackTech.md b/docs/ApiMitreAttackTech.md index 450aa69e..9e4d4231 100644 --- a/docs/ApiMitreAttackTech.md +++ b/docs/ApiMitreAttackTech.md @@ -1,5 +1,6 @@ # ApiMitreAttackTech +api.MitreAttackTech ## Properties diff --git a/docs/ApiMitreAttackToCVE.md b/docs/ApiMitreAttackToCVE.md index 63ce7077..003e1d82 100644 --- a/docs/ApiMitreAttackToCVE.md +++ b/docs/ApiMitreAttackToCVE.md @@ -1,5 +1,6 @@ # ApiMitreAttackToCVE +api.MitreAttackToCVE ## Properties diff --git a/docs/ApiMitreD3fendTechnique.md b/docs/ApiMitreD3fendTechnique.md index 08e51eb4..8efffc91 100644 --- a/docs/ApiMitreD3fendTechnique.md +++ b/docs/ApiMitreD3fendTechnique.md @@ -1,5 +1,6 @@ # ApiMitreD3fendTechnique +api.MitreD3fendTechnique ## Properties diff --git a/docs/ApiMitreDetectionTech.md b/docs/ApiMitreDetectionTech.md index f8344df6..9bd9544a 100644 --- a/docs/ApiMitreDetectionTech.md +++ b/docs/ApiMitreDetectionTech.md @@ -1,5 +1,6 @@ # ApiMitreDetectionTech +api.MitreDetectionTech ## Properties diff --git a/docs/ApiMitreMitigation2D3fendMapping.md b/docs/ApiMitreMitigation2D3fendMapping.md index 8b1dca5b..e3aeb1d8 100644 --- a/docs/ApiMitreMitigation2D3fendMapping.md +++ b/docs/ApiMitreMitigation2D3fendMapping.md @@ -1,5 +1,6 @@ # ApiMitreMitigation2D3fendMapping +api.MitreMitigation2D3fendMapping ## Properties diff --git a/docs/ApiMitreMitigationTech.md b/docs/ApiMitreMitigationTech.md index 48755aa1..d7ef2d6f 100644 --- a/docs/ApiMitreMitigationTech.md +++ b/docs/ApiMitreMitigationTech.md @@ -1,5 +1,6 @@ # ApiMitreMitigationTech +api.MitreMitigationTech ## Properties diff --git a/docs/ApiNVD20CPEMatch.md b/docs/ApiNVD20CPEMatch.md index 485ee786..69fd3d08 100644 --- a/docs/ApiNVD20CPEMatch.md +++ b/docs/ApiNVD20CPEMatch.md @@ -1,5 +1,6 @@ # ApiNVD20CPEMatch +api.NVD20CPEMatch ## Properties diff --git a/docs/ApiNVD20CPEName.md b/docs/ApiNVD20CPEName.md index fa1bf229..81beb266 100644 --- a/docs/ApiNVD20CPEName.md +++ b/docs/ApiNVD20CPEName.md @@ -1,5 +1,6 @@ # ApiNVD20CPEName +api.NVD20CPEName ## Properties diff --git a/docs/ApiNVD20CVE.md b/docs/ApiNVD20CVE.md index c1e5cfaa..5d7bd027 100644 --- a/docs/ApiNVD20CVE.md +++ b/docs/ApiNVD20CVE.md @@ -1,5 +1,6 @@ # ApiNVD20CVE +api.NVD20CVE ## Properties diff --git a/docs/ApiNVD20CVEExtended.md b/docs/ApiNVD20CVEExtended.md index 65a3d717..f69e7c41 100644 --- a/docs/ApiNVD20CVEExtended.md +++ b/docs/ApiNVD20CVEExtended.md @@ -1,5 +1,6 @@ # ApiNVD20CVEExtended +api.NVD20CVEExtended ## Properties diff --git a/docs/ApiNVD20CvssDataV2.md b/docs/ApiNVD20CvssDataV2.md index a09c81fd..2abf9e5f 100644 --- a/docs/ApiNVD20CvssDataV2.md +++ b/docs/ApiNVD20CvssDataV2.md @@ -1,5 +1,6 @@ # ApiNVD20CvssDataV2 +api.NVD20CvssDataV2 ## Properties diff --git a/docs/ApiNVD20CvssDataV3.md b/docs/ApiNVD20CvssDataV3.md index fec7bff6..ce96ba92 100644 --- a/docs/ApiNVD20CvssDataV3.md +++ b/docs/ApiNVD20CvssDataV3.md @@ -1,5 +1,6 @@ # ApiNVD20CvssDataV3 +api.NVD20CvssDataV3 ## Properties diff --git a/docs/ApiNVD20CvssMetricV2.md b/docs/ApiNVD20CvssMetricV2.md index e470b5da..b39fe0e5 100644 --- a/docs/ApiNVD20CvssMetricV2.md +++ b/docs/ApiNVD20CvssMetricV2.md @@ -1,5 +1,6 @@ # ApiNVD20CvssMetricV2 +api.NVD20CvssMetricV2 ## Properties diff --git a/docs/ApiNVD20CvssMetricV3.md b/docs/ApiNVD20CvssMetricV3.md index cf203bac..d4c5877d 100644 --- a/docs/ApiNVD20CvssMetricV3.md +++ b/docs/ApiNVD20CvssMetricV3.md @@ -1,5 +1,6 @@ # ApiNVD20CvssMetricV3 +api.NVD20CvssMetricV3 ## Properties diff --git a/docs/ApiNVD20CvssMetricV40.md b/docs/ApiNVD20CvssMetricV40.md index 934ec2ba..0d79a23d 100644 --- a/docs/ApiNVD20CvssMetricV40.md +++ b/docs/ApiNVD20CvssMetricV40.md @@ -1,5 +1,6 @@ # ApiNVD20CvssMetricV40 +api.NVD20CvssMetricV40 ## Properties diff --git a/docs/ApiNVD20Description.md b/docs/ApiNVD20Description.md index 4f743571..c92229c0 100644 --- a/docs/ApiNVD20Description.md +++ b/docs/ApiNVD20Description.md @@ -1,5 +1,6 @@ # ApiNVD20Description +api.NVD20Description ## Properties diff --git a/docs/ApiNVD20Metric.md b/docs/ApiNVD20Metric.md index 988e96a3..11e8657a 100644 --- a/docs/ApiNVD20Metric.md +++ b/docs/ApiNVD20Metric.md @@ -1,5 +1,6 @@ # ApiNVD20Metric +api.NVD20Metric ## Properties diff --git a/docs/ApiNVD20MetricExtended.md b/docs/ApiNVD20MetricExtended.md index 1c96ffea..0b23fe18 100644 --- a/docs/ApiNVD20MetricExtended.md +++ b/docs/ApiNVD20MetricExtended.md @@ -1,5 +1,6 @@ # ApiNVD20MetricExtended +api.NVD20MetricExtended ## Properties diff --git a/docs/ApiNVD20Reference.md b/docs/ApiNVD20Reference.md index 00755d49..b84a371e 100644 --- a/docs/ApiNVD20Reference.md +++ b/docs/ApiNVD20Reference.md @@ -1,5 +1,6 @@ # ApiNVD20Reference +api.NVD20Reference ## Properties diff --git a/docs/ApiNVD20ReferenceExtended.md b/docs/ApiNVD20ReferenceExtended.md index 8e9ef702..ae918121 100644 --- a/docs/ApiNVD20ReferenceExtended.md +++ b/docs/ApiNVD20ReferenceExtended.md @@ -1,5 +1,6 @@ # ApiNVD20ReferenceExtended +api.NVD20ReferenceExtended ## Properties diff --git a/docs/ApiNVD20TemporalAssociatedBaseMetric.md b/docs/ApiNVD20TemporalAssociatedBaseMetric.md index 7e8238d7..229913cf 100644 --- a/docs/ApiNVD20TemporalAssociatedBaseMetric.md +++ b/docs/ApiNVD20TemporalAssociatedBaseMetric.md @@ -1,5 +1,6 @@ # ApiNVD20TemporalAssociatedBaseMetric +api.NVD20TemporalAssociatedBaseMetric ## Properties diff --git a/docs/ApiNVD20TemporalCVSSV2.md b/docs/ApiNVD20TemporalCVSSV2.md index 834658aa..7deb3558 100644 --- a/docs/ApiNVD20TemporalCVSSV2.md +++ b/docs/ApiNVD20TemporalCVSSV2.md @@ -1,5 +1,6 @@ # ApiNVD20TemporalCVSSV2 +api.NVD20TemporalCVSSV2 ## Properties diff --git a/docs/ApiNVD20TemporalCVSSV3.md b/docs/ApiNVD20TemporalCVSSV3.md index f1866c6e..56198730 100644 --- a/docs/ApiNVD20TemporalCVSSV3.md +++ b/docs/ApiNVD20TemporalCVSSV3.md @@ -1,5 +1,6 @@ # ApiNVD20TemporalCVSSV3 +api.NVD20TemporalCVSSV3 ## Properties diff --git a/docs/ApiNVD20ThreatAssociatedBaseMetric.md b/docs/ApiNVD20ThreatAssociatedBaseMetric.md index 1e3fef7f..66ea3c14 100644 --- a/docs/ApiNVD20ThreatAssociatedBaseMetric.md +++ b/docs/ApiNVD20ThreatAssociatedBaseMetric.md @@ -1,5 +1,6 @@ # ApiNVD20ThreatAssociatedBaseMetric +api.NVD20ThreatAssociatedBaseMetric ## Properties diff --git a/docs/ApiNVD20ThreatCVSSV40.md b/docs/ApiNVD20ThreatCVSSV40.md index 2535ae94..1d2a711d 100644 --- a/docs/ApiNVD20ThreatCVSSV40.md +++ b/docs/ApiNVD20ThreatCVSSV40.md @@ -1,5 +1,6 @@ # ApiNVD20ThreatCVSSV40 +api.NVD20ThreatCVSSV40 ## Properties diff --git a/docs/ApiNVD20VendorComment.md b/docs/ApiNVD20VendorComment.md index 5c628b3c..0ca3e7c8 100644 --- a/docs/ApiNVD20VendorComment.md +++ b/docs/ApiNVD20VendorComment.md @@ -1,5 +1,6 @@ # ApiNVD20VendorComment +api.NVD20VendorComment ## Properties diff --git a/docs/ApiNVD20Weakness.md b/docs/ApiNVD20Weakness.md index 7eeb603a..52b3e00c 100644 --- a/docs/ApiNVD20Weakness.md +++ b/docs/ApiNVD20Weakness.md @@ -1,5 +1,6 @@ # ApiNVD20Weakness +api.NVD20Weakness ## Properties diff --git a/docs/ApiNVD20WeaknessDescExtended.md b/docs/ApiNVD20WeaknessDescExtended.md index b3669483..a17b7106 100644 --- a/docs/ApiNVD20WeaknessDescExtended.md +++ b/docs/ApiNVD20WeaknessDescExtended.md @@ -1,5 +1,6 @@ # ApiNVD20WeaknessDescExtended +api.NVD20WeaknessDescExtended ## Properties diff --git a/docs/ApiNVD20WeaknessExtended.md b/docs/ApiNVD20WeaknessExtended.md index 8020ceed..bfa484ac 100644 --- a/docs/ApiNVD20WeaknessExtended.md +++ b/docs/ApiNVD20WeaknessExtended.md @@ -1,5 +1,6 @@ # ApiNVD20WeaknessExtended +api.NVD20WeaknessExtended ## Properties diff --git a/docs/ApiNodes.md b/docs/ApiNodes.md index 0a4a26fa..a553c740 100644 --- a/docs/ApiNodes.md +++ b/docs/ApiNodes.md @@ -1,5 +1,6 @@ # ApiNodes +api.Nodes ## Properties diff --git a/docs/ApiNormalizedExploitV3Entry.md b/docs/ApiNormalizedExploitV3Entry.md index 52072c0a..05135e10 100644 --- a/docs/ApiNormalizedExploitV3Entry.md +++ b/docs/ApiNormalizedExploitV3Entry.md @@ -1,5 +1,6 @@ # ApiNormalizedExploitV3Entry +api.NormalizedExploitV3Entry ## Properties diff --git a/docs/ApiNormalizedReportV3Entry.md b/docs/ApiNormalizedReportV3Entry.md index 813686d3..e3afef72 100644 --- a/docs/ApiNormalizedReportV3Entry.md +++ b/docs/ApiNormalizedReportV3Entry.md @@ -1,5 +1,6 @@ # ApiNormalizedReportV3Entry +api.NormalizedReportV3Entry ## Properties diff --git a/docs/ApiOSSPackage.md b/docs/ApiOSSPackage.md index fbcaeb8a..d9c0887e 100644 --- a/docs/ApiOSSPackage.md +++ b/docs/ApiOSSPackage.md @@ -1,5 +1,6 @@ # ApiOSSPackage +api.OSSPackage ## Properties diff --git a/docs/ApiOSSPackageArtifacts.md b/docs/ApiOSSPackageArtifacts.md index 0f600d0f..f9e7595a 100644 --- a/docs/ApiOSSPackageArtifacts.md +++ b/docs/ApiOSSPackageArtifacts.md @@ -1,5 +1,6 @@ # ApiOSSPackageArtifacts +api.OSSPackageArtifacts ## Properties diff --git a/docs/ApiOSSPackageDownloadInfo.md b/docs/ApiOSSPackageDownloadInfo.md index 1338bbb7..e6dd3597 100644 --- a/docs/ApiOSSPackageDownloadInfo.md +++ b/docs/ApiOSSPackageDownloadInfo.md @@ -1,5 +1,6 @@ # ApiOSSPackageDownloadInfo +api.OSSPackageDownloadInfo ## Properties diff --git a/docs/ApiOSSPackageHashInfo.md b/docs/ApiOSSPackageHashInfo.md index ac7fbc54..50302e34 100644 --- a/docs/ApiOSSPackageHashInfo.md +++ b/docs/ApiOSSPackageHashInfo.md @@ -1,5 +1,6 @@ # ApiOSSPackageHashInfo +api.OSSPackageHashInfo ## Properties diff --git a/docs/ApiOSSPackageResearchAttributes.md b/docs/ApiOSSPackageResearchAttributes.md index cc5832c1..1d4dd361 100644 --- a/docs/ApiOSSPackageResearchAttributes.md +++ b/docs/ApiOSSPackageResearchAttributes.md @@ -1,5 +1,6 @@ # ApiOSSPackageResearchAttributes +api.OSSPackageResearchAttributes ## Properties diff --git a/docs/ApiOSSPackageVulnerability.md b/docs/ApiOSSPackageVulnerability.md index 6c66740d..22ac85d1 100644 --- a/docs/ApiOSSPackageVulnerability.md +++ b/docs/ApiOSSPackageVulnerability.md @@ -1,5 +1,6 @@ # ApiOSSPackageVulnerability +api.OSSPackageVulnerability ## Properties diff --git a/docs/ApiPackage.md b/docs/ApiPackage.md index ad78b94e..797931bf 100644 --- a/docs/ApiPackage.md +++ b/docs/ApiPackage.md @@ -1,5 +1,6 @@ # ApiPackage +api.Package ## Properties diff --git a/docs/ApiProblemType.md b/docs/ApiProblemType.md index 20ebdac9..1ef6a900 100644 --- a/docs/ApiProblemType.md +++ b/docs/ApiProblemType.md @@ -1,5 +1,6 @@ # ApiProblemType +api.ProblemType ## Properties diff --git a/docs/ApiProblemTypeData.md b/docs/ApiProblemTypeData.md index bf5b98d5..a7a91243 100644 --- a/docs/ApiProblemTypeData.md +++ b/docs/ApiProblemTypeData.md @@ -1,5 +1,6 @@ # ApiProblemTypeData +api.ProblemTypeData ## Properties diff --git a/docs/ApiProblemTypeDataExtended.md b/docs/ApiProblemTypeDataExtended.md index a25d0351..15ddefd8 100644 --- a/docs/ApiProblemTypeDataExtended.md +++ b/docs/ApiProblemTypeDataExtended.md @@ -1,5 +1,6 @@ # ApiProblemTypeDataExtended +api.ProblemTypeDataExtended ## Properties diff --git a/docs/ApiProblemTypeDescription.md b/docs/ApiProblemTypeDescription.md index 99ee4b5f..b4dd659c 100644 --- a/docs/ApiProblemTypeDescription.md +++ b/docs/ApiProblemTypeDescription.md @@ -1,5 +1,6 @@ # ApiProblemTypeDescription +api.ProblemTypeDescription ## Properties diff --git a/docs/ApiProblemTypeDescriptionExtended.md b/docs/ApiProblemTypeDescriptionExtended.md index bef09bf0..70891d81 100644 --- a/docs/ApiProblemTypeDescriptionExtended.md +++ b/docs/ApiProblemTypeDescriptionExtended.md @@ -1,5 +1,6 @@ # ApiProblemTypeDescriptionExtended +api.ProblemTypeDescriptionExtended ## Properties diff --git a/docs/ApiProblemTypeExtended.md b/docs/ApiProblemTypeExtended.md index 7b6e19df..ee7f4457 100644 --- a/docs/ApiProblemTypeExtended.md +++ b/docs/ApiProblemTypeExtended.md @@ -1,5 +1,6 @@ # ApiProblemTypeExtended +api.ProblemTypeExtended ## Properties diff --git a/docs/ApiReference.md b/docs/ApiReference.md index 951a2619..43f76315 100644 --- a/docs/ApiReference.md +++ b/docs/ApiReference.md @@ -1,5 +1,6 @@ # ApiReference +api.Reference ## Properties diff --git a/docs/ApiReferenceData.md b/docs/ApiReferenceData.md index c82ef202..a9a32479 100644 --- a/docs/ApiReferenceData.md +++ b/docs/ApiReferenceData.md @@ -1,5 +1,6 @@ # ApiReferenceData +api.ReferenceData ## Properties diff --git a/docs/ApiReferenceDataExtended.md b/docs/ApiReferenceDataExtended.md index c48e9ee4..3e486d90 100644 --- a/docs/ApiReferenceDataExtended.md +++ b/docs/ApiReferenceDataExtended.md @@ -1,5 +1,6 @@ # ApiReferenceDataExtended +api.ReferenceDataExtended ## Properties diff --git a/docs/ApiReferences.md b/docs/ApiReferences.md index 110f8f80..6ed8195e 100644 --- a/docs/ApiReferences.md +++ b/docs/ApiReferences.md @@ -1,5 +1,6 @@ # ApiReferences +api.References ## Properties diff --git a/docs/ApiReferencesExtended.md b/docs/ApiReferencesExtended.md index f4b1a0eb..31e60211 100644 --- a/docs/ApiReferencesExtended.md +++ b/docs/ApiReferencesExtended.md @@ -1,5 +1,6 @@ # ApiReferencesExtended +api.ReferencesExtended ## Properties diff --git a/docs/ApiRelatedAttackPattern.md b/docs/ApiRelatedAttackPattern.md index f61a3479..3ca6cde2 100644 --- a/docs/ApiRelatedAttackPattern.md +++ b/docs/ApiRelatedAttackPattern.md @@ -1,5 +1,6 @@ # ApiRelatedAttackPattern +api.RelatedAttackPattern ## Properties diff --git a/docs/ApiSSVC.md b/docs/ApiSSVC.md index 7896dc85..000632a3 100644 --- a/docs/ApiSSVC.md +++ b/docs/ApiSSVC.md @@ -1,5 +1,6 @@ # ApiSSVC +api.SSVC ## Properties diff --git a/docs/ApiTemporalCVSSV2.md b/docs/ApiTemporalCVSSV2.md index 91bbe7e9..9b93af51 100644 --- a/docs/ApiTemporalCVSSV2.md +++ b/docs/ApiTemporalCVSSV2.md @@ -1,5 +1,6 @@ # ApiTemporalCVSSV2 +api.TemporalCVSSV2 ## Properties diff --git a/docs/ApiTemporalCVSSV3.md b/docs/ApiTemporalCVSSV3.md index d753861f..7c47e4e8 100644 --- a/docs/ApiTemporalCVSSV3.md +++ b/docs/ApiTemporalCVSSV3.md @@ -1,5 +1,6 @@ # ApiTemporalCVSSV3 +api.TemporalCVSSV3 ## Properties diff --git a/docs/ApiTemporalMetricV2.md b/docs/ApiTemporalMetricV2.md index ad40cdc3..e9110292 100644 --- a/docs/ApiTemporalMetricV2.md +++ b/docs/ApiTemporalMetricV2.md @@ -1,5 +1,6 @@ # ApiTemporalMetricV2 +api.TemporalMetricV2 ## Properties diff --git a/docs/ApiTemporalMetricV3.md b/docs/ApiTemporalMetricV3.md index 83413df9..e70f8c3b 100644 --- a/docs/ApiTemporalMetricV3.md +++ b/docs/ApiTemporalMetricV3.md @@ -1,5 +1,6 @@ # ApiTemporalMetricV3 +api.TemporalMetricV3 ## Properties diff --git a/docs/ApiUpdate.md b/docs/ApiUpdate.md index 8ff79dc3..86cb5a97 100644 --- a/docs/ApiUpdate.md +++ b/docs/ApiUpdate.md @@ -1,5 +1,6 @@ # ApiUpdate +api.Update ## Properties @@ -9,7 +10,7 @@ Name | Type | Description | Notes **date_added** | **str** | | [optional] **description** | **str** | | [optional] **id** | **str** | sort // key | [optional] -**issued** | [**ApiDateTime**](ApiDateTime.md) | | [optional] +**issued** | **object** | api.DateTime | [optional] **os_arch** | **str** | | [optional] **os_version** | **str** | | [optional] **packages** | [**List[ApiPackage]**](ApiPackage.md) | | [optional] @@ -17,7 +18,7 @@ Name | Type | Description | Notes **severity** | **str** | | [optional] **title** | **str** | | [optional] **type** | **str** | | [optional] -**updated** | [**ApiDateTime**](ApiDateTime.md) | | [optional] +**updated** | **object** | api.DateTime | [optional] ## Example diff --git a/docs/ApiVulnCheckCanary.md b/docs/ApiVulnCheckCanary.md index 74f62677..a1c289e2 100644 --- a/docs/ApiVulnCheckCanary.md +++ b/docs/ApiVulnCheckCanary.md @@ -1,5 +1,6 @@ # ApiVulnCheckCanary +api.VulnCheckCanary ## Properties diff --git a/docs/ApiVulnerabilityAlias.md b/docs/ApiVulnerabilityAlias.md index bbec9762..fa37cc1a 100644 --- a/docs/ApiVulnerabilityAlias.md +++ b/docs/ApiVulnerabilityAlias.md @@ -1,5 +1,6 @@ # ApiVulnerabilityAlias +api.VulnerabilityAlias ## Properties diff --git a/docs/EndpointsApi.md b/docs/EndpointsApi.md index 2542a7cc..346c986b 100644 --- a/docs/EndpointsApi.md +++ b/docs/EndpointsApi.md @@ -1,6 +1,6 @@ # vulncheck_sdk.EndpointsApi -All URIs are relative to */v3* +All URIs are relative to *https://api.vulncheck.com/v3* Method | HTTP request | Description ------------- | ------------- | ------------- @@ -34,10 +34,10 @@ from vulncheck_sdk.models.render_response_array_params_index_backup_list import from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -111,10 +111,10 @@ from vulncheck_sdk.models.render_response_with_metadata_v3controllers_backup_res from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -192,10 +192,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_string_v3controlle from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -275,10 +275,10 @@ from vulncheck_sdk.models.models_entitlements import ModelsEntitlements from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -352,10 +352,10 @@ from vulncheck_sdk.models.render_response_array_params_index_list import RenderR from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -428,10 +428,10 @@ import vulncheck_sdk from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -503,10 +503,10 @@ import vulncheck_sdk from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -584,10 +584,10 @@ from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purl_respo from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -649,7 +649,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **purls_post** -> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata purls_post(purls) +> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata purls_post(request_body) Request vulnerabilities related to a list of PURLs @@ -665,10 +665,10 @@ from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purls_resp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -686,11 +686,11 @@ configuration.api_key['Bearer'] = os.environ["API_KEY"] with vulncheck_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = vulncheck_sdk.EndpointsApi(api_client) - purls = ['purls_example'] # List[str] | PURL strings used to identify and locate software packages + request_body = ['request_body_example'] # List[str] | PURL strings used to identify and locate software packages try: # Request vulnerabilities related to a list of PURLs - api_response = api_instance.purls_post(purls) + api_response = api_instance.purls_post(request_body) print("The response of EndpointsApi->purls_post:\n") pprint(api_response) except Exception as e: @@ -704,7 +704,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **purls** | [**List[str]**](str.md)| PURL strings used to identify and locate software packages | + **request_body** | [**List[str]**](str.md)| PURL strings used to identify and locate software packages | ### Return type @@ -716,7 +716,7 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json ### HTTP response details @@ -745,10 +745,10 @@ import vulncheck_sdk from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -825,10 +825,10 @@ import vulncheck_sdk from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters diff --git a/docs/IndicesApi.md b/docs/IndicesApi.md index 8291bbd2..94d88294 100644 --- a/docs/IndicesApi.md +++ b/docs/IndicesApi.md @@ -1,6 +1,6 @@ # vulncheck_sdk.IndicesApi -All URIs are relative to */v3* +All URIs are relative to *https://api.vulncheck.com/v3* Method | HTTP request | Description ------------- | ------------- | ------------- @@ -494,7 +494,7 @@ Method | HTTP request | Description # **index7zip_get** -> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"7zip\" @@ -521,10 +521,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_seven_zip from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -559,8 +559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -570,7 +569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"7zip\" - api_response = api_instance.index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index7zip_get:\n") pprint(api_response) except Exception as e: @@ -601,8 +600,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -634,7 +632,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_a10_get** -> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"a10\" @@ -661,10 +659,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_a10_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -699,8 +697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -710,7 +707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"a10\" - api_response = api_instance.index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_a10_get:\n") pprint(api_response) except Exception as e: @@ -741,8 +738,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -774,7 +770,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_abb_get** -> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"abb\" @@ -801,10 +797,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_abb_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -839,8 +835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -850,7 +845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"abb\" - api_response = api_instance.index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_abb_get:\n") pprint(api_response) except Exception as e: @@ -881,8 +876,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -914,7 +908,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_abbott_get** -> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"abbott\" @@ -941,10 +935,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_abbott_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -979,8 +973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -990,7 +983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"abbott\" - api_response = api_instance.index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_abbott_get:\n") pprint(api_response) except Exception as e: @@ -1021,8 +1014,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1054,7 +1046,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_absolute_get** -> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"absolute\" @@ -1081,10 +1073,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_absolute_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1119,8 +1111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1130,7 +1121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"absolute\" - api_response = api_instance.index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_absolute_get:\n") pprint(api_response) except Exception as e: @@ -1161,8 +1152,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1194,7 +1184,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_acronis_get** -> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"acronis\" @@ -1221,10 +1211,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_acronis_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1259,8 +1249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1270,7 +1259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"acronis\" - api_response = api_instance.index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_acronis_get:\n") pprint(api_response) except Exception as e: @@ -1301,8 +1290,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1334,7 +1322,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_adobe_get** -> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"adobe\" @@ -1361,10 +1349,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_adobe_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1399,8 +1387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1410,7 +1397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"adobe\" - api_response = api_instance.index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_adobe_get:\n") pprint(api_response) except Exception as e: @@ -1441,8 +1428,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1474,7 +1460,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_advantech_get** -> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"advantech\" @@ -1501,10 +1487,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_advantech from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1539,8 +1525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1550,7 +1535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"advantech\" - api_response = api_instance.index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_advantech_get:\n") pprint(api_response) except Exception as e: @@ -1581,8 +1566,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1614,7 +1598,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"advisories\" @@ -1641,10 +1625,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_advisory_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1679,8 +1663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1690,7 +1673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"advisories\" - api_response = api_instance.index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_advisories_get:\n") pprint(api_response) except Exception as e: @@ -1721,8 +1704,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1754,7 +1736,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aix_get** -> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aix\" @@ -1781,10 +1763,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aix_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1819,8 +1801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1830,7 +1811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aix\" - api_response = api_instance.index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aix_get:\n") pprint(api_response) except Exception as e: @@ -1861,8 +1842,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1894,7 +1874,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aleph_research_get** -> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aleph-research\" @@ -1921,10 +1901,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aleph_res from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -1959,8 +1939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1970,7 +1949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aleph-research\" - api_response = api_instance.index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aleph_research_get:\n") pprint(api_response) except Exception as e: @@ -2001,8 +1980,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2034,7 +2012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alibaba_advs_get** -> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alibaba-advs\" @@ -2061,10 +2039,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_alibaba_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2099,8 +2077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2110,7 +2087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alibaba-advs\" - api_response = api_instance.index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alibaba_advs_get:\n") pprint(api_response) except Exception as e: @@ -2141,8 +2118,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2174,7 +2150,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alma_get** -> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alma\" @@ -2201,10 +2177,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_alma_linu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2239,8 +2215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2250,7 +2225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alma\" - api_response = api_instance.index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alma_get:\n") pprint(api_response) except Exception as e: @@ -2281,8 +2256,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2314,7 +2288,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alpine_get** -> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alpine\" @@ -2341,10 +2315,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_alpine_li from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2379,8 +2353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2390,7 +2363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alpine\" - api_response = api_instance.index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alpine_get:\n") pprint(api_response) except Exception as e: @@ -2421,8 +2394,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2454,7 +2426,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alpine_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alpine-purls\" @@ -2481,10 +2453,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_purls_purl_respons from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2519,8 +2491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2530,7 +2501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alpine-purls\" - api_response = api_instance.index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alpine_purls_get:\n") pprint(api_response) except Exception as e: @@ -2561,8 +2532,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2594,7 +2564,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amazon_cve_get** -> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amazon-cve\" @@ -2621,10 +2591,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_amazon_cv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2659,8 +2629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2670,7 +2639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amazon-cve\" - api_response = api_instance.index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amazon_cve_get:\n") pprint(api_response) except Exception as e: @@ -2701,8 +2670,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2734,7 +2702,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amazon_get** -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amazon\" @@ -2761,10 +2729,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_update_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2799,8 +2767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2810,7 +2777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amazon\" - api_response = api_instance.index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amazon_get:\n") pprint(api_response) except Exception as e: @@ -2841,8 +2808,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2874,7 +2840,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amd_get** -> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amd\" @@ -2901,10 +2867,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_amd_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -2939,8 +2905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2950,7 +2915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amd\" - api_response = api_instance.index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amd_get:\n") pprint(api_response) except Exception as e: @@ -2981,8 +2946,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3014,7 +2978,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ami_get** -> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ami\" @@ -3041,10 +3005,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ami_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3079,8 +3043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3090,7 +3053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ami\" - api_response = api_instance.index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ami_get:\n") pprint(api_response) except Exception as e: @@ -3121,8 +3084,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3154,7 +3116,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_anchore_nvd_override_get** -> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"anchore-nvd-override\" @@ -3181,10 +3143,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_anchore_n from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3219,8 +3181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3230,7 +3191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"anchore-nvd-override\" - api_response = api_instance.index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_anchore_nvd_override_get:\n") pprint(api_response) except Exception as e: @@ -3261,8 +3222,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3294,7 +3254,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_android_get** -> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"android\" @@ -3321,10 +3281,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_android_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3359,8 +3319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3370,7 +3329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"android\" - api_response = api_instance.index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_android_get:\n") pprint(api_response) except Exception as e: @@ -3401,8 +3360,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3434,7 +3392,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_activemq_get** -> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-activemq\" @@ -3461,10 +3419,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ac from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3499,8 +3457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3510,7 +3467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-activemq\" - api_response = api_instance.index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_activemq_get:\n") pprint(api_response) except Exception as e: @@ -3541,8 +3498,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3574,7 +3530,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_archiva_get** -> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-archiva\" @@ -3601,10 +3557,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ar from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3639,8 +3595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3650,7 +3605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-archiva\" - api_response = api_instance.index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_archiva_get:\n") pprint(api_response) except Exception as e: @@ -3681,8 +3636,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3714,7 +3668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_arrow_get** -> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-arrow\" @@ -3741,10 +3695,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ar from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3779,8 +3733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3790,7 +3743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-arrow\" - api_response = api_instance.index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_arrow_get:\n") pprint(api_response) except Exception as e: @@ -3821,8 +3774,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3854,7 +3806,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_camel_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-camel\" @@ -3881,10 +3833,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ca from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -3919,8 +3871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3930,7 +3881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-camel\" - api_response = api_instance.index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_camel_get:\n") pprint(api_response) except Exception as e: @@ -3961,8 +3912,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3994,7 +3944,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_commons_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-commons\" @@ -4021,10 +3971,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_co from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4059,8 +4009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4070,7 +4019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-commons\" - api_response = api_instance.index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_commons_get:\n") pprint(api_response) except Exception as e: @@ -4101,8 +4050,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4134,7 +4082,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_couchdb_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-couchdb\" @@ -4161,10 +4109,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_co from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4199,8 +4147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4210,7 +4157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-couchdb\" - api_response = api_instance.index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_couchdb_get:\n") pprint(api_response) except Exception as e: @@ -4241,8 +4188,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4274,7 +4220,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_flink_get** -> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-flink\" @@ -4301,10 +4247,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_fl from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4339,8 +4285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4350,7 +4295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-flink\" - api_response = api_instance.index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_flink_get:\n") pprint(api_response) except Exception as e: @@ -4381,8 +4326,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4414,7 +4358,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_guacamole_get** -> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-guacamole\" @@ -4441,10 +4385,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_gu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4479,8 +4423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4490,7 +4433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-guacamole\" - api_response = api_instance.index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_guacamole_get:\n") pprint(api_response) except Exception as e: @@ -4521,8 +4464,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4554,7 +4496,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_hadoop_get** -> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-hadoop\" @@ -4581,10 +4523,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ha from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4619,8 +4561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4630,7 +4571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-hadoop\" - api_response = api_instance.index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_hadoop_get:\n") pprint(api_response) except Exception as e: @@ -4661,8 +4602,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4694,7 +4634,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_http_get** -> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-http\" @@ -4721,10 +4661,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ht from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4759,8 +4699,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4770,7 +4709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-http\" - api_response = api_instance.index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_http_get:\n") pprint(api_response) except Exception as e: @@ -4801,8 +4740,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4834,7 +4772,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_jspwiki_get** -> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-jspwiki\" @@ -4861,10 +4799,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_js from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -4899,8 +4837,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4910,7 +4847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-jspwiki\" - api_response = api_instance.index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_jspwiki_get:\n") pprint(api_response) except Exception as e: @@ -4941,8 +4878,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4974,7 +4910,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_kafka_get** -> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-kafka\" @@ -5001,10 +4937,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ka from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5039,8 +4975,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5050,7 +4985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-kafka\" - api_response = api_instance.index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_kafka_get:\n") pprint(api_response) except Exception as e: @@ -5081,8 +5016,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5114,7 +5048,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_loggingservices_get** -> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-loggingservices\" @@ -5141,10 +5075,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_lo from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5179,8 +5113,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5190,7 +5123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-loggingservices\" - api_response = api_instance.index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_loggingservices_get:\n") pprint(api_response) except Exception as e: @@ -5221,8 +5154,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5254,7 +5186,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_nifi_get** -> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-nifi\" @@ -5281,10 +5213,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_ni from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5319,8 +5251,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5330,7 +5261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-nifi\" - api_response = api_instance.index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_nifi_get:\n") pprint(api_response) except Exception as e: @@ -5361,8 +5292,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5394,7 +5324,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_ofbiz_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-ofbiz\" @@ -5421,10 +5351,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_of from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5459,8 +5389,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5470,7 +5399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-ofbiz\" - api_response = api_instance.index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_ofbiz_get:\n") pprint(api_response) except Exception as e: @@ -5501,8 +5430,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5534,7 +5462,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_openmeetings_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-openmeetings\" @@ -5561,10 +5489,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_op from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5599,8 +5527,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5610,7 +5537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-openmeetings\" - api_response = api_instance.index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_openmeetings_get:\n") pprint(api_response) except Exception as e: @@ -5641,8 +5568,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5674,7 +5600,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_openoffice_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-openoffice\" @@ -5701,10 +5627,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_op from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5739,8 +5665,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5750,7 +5675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-openoffice\" - api_response = api_instance.index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_openoffice_get:\n") pprint(api_response) except Exception as e: @@ -5781,8 +5706,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5814,7 +5738,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_pulsar_get** -> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-pulsar\" @@ -5841,10 +5765,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_pu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -5879,8 +5803,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5890,7 +5813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-pulsar\" - api_response = api_instance.index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_pulsar_get:\n") pprint(api_response) except Exception as e: @@ -5921,8 +5844,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5954,7 +5876,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_shiro_get** -> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-shiro\" @@ -5981,10 +5903,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_sh from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6019,8 +5941,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6030,7 +5951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-shiro\" - api_response = api_instance.index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_shiro_get:\n") pprint(api_response) except Exception as e: @@ -6061,8 +5982,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6094,7 +6014,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_spark_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-spark\" @@ -6121,10 +6041,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_sp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6159,8 +6079,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6170,7 +6089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-spark\" - api_response = api_instance.index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_spark_get:\n") pprint(api_response) except Exception as e: @@ -6201,8 +6120,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6234,7 +6152,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_struts_get** -> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-struts\" @@ -6261,10 +6179,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_st from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6299,8 +6217,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6310,7 +6227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-struts\" - api_response = api_instance.index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_struts_get:\n") pprint(api_response) except Exception as e: @@ -6341,8 +6258,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6374,7 +6290,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_subversion_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-subversion\" @@ -6401,10 +6317,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_su from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6439,8 +6355,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6450,7 +6365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-subversion\" - api_response = api_instance.index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_subversion_get:\n") pprint(api_response) except Exception as e: @@ -6481,8 +6396,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6514,7 +6428,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_superset_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-superset\" @@ -6541,10 +6455,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_su from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6579,8 +6493,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6590,7 +6503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-superset\" - api_response = api_instance.index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_superset_get:\n") pprint(api_response) except Exception as e: @@ -6621,8 +6534,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6654,7 +6566,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_tomcat_get** -> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-tomcat\" @@ -6681,10 +6593,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_to from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6719,8 +6631,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6730,7 +6641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-tomcat\" - api_response = api_instance.index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_tomcat_get:\n") pprint(api_response) except Exception as e: @@ -6761,8 +6672,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6794,7 +6704,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_zookeeper_get** -> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-zookeeper\" @@ -6821,10 +6731,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apache_zo from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6859,8 +6769,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6870,7 +6779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-zookeeper\" - api_response = api_instance.index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_zookeeper_get:\n") pprint(api_response) except Exception as e: @@ -6901,8 +6810,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6934,7 +6842,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_appcheck_get** -> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"appcheck\" @@ -6961,10 +6869,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_app_check from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -6999,8 +6907,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7010,7 +6917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"appcheck\" - api_response = api_instance.index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_appcheck_get:\n") pprint(api_response) except Exception as e: @@ -7041,8 +6948,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7074,7 +6980,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_appgate_get** -> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"appgate\" @@ -7101,10 +7007,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_appgate_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7139,8 +7045,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7150,7 +7055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"appgate\" - api_response = api_instance.index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_appgate_get:\n") pprint(api_response) except Exception as e: @@ -7181,8 +7086,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7214,7 +7118,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apple_get** -> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apple\" @@ -7241,10 +7145,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_apple_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7279,8 +7183,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7290,7 +7193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apple\" - api_response = api_instance.index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apple_get:\n") pprint(api_response) except Exception as e: @@ -7321,8 +7224,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7354,7 +7256,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_arch_get** -> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"arch\" @@ -7381,10 +7283,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_arch_issu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7419,8 +7321,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7430,7 +7331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"arch\" - api_response = api_instance.index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_arch_get:\n") pprint(api_response) except Exception as e: @@ -7461,8 +7362,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7494,7 +7394,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_arista_get** -> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"arista\" @@ -7521,10 +7421,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_arista_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7559,8 +7459,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7570,7 +7469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"arista\" - api_response = api_instance.index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_arista_get:\n") pprint(api_response) except Exception as e: @@ -7601,8 +7500,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7634,7 +7532,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aruba_get** -> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aruba\" @@ -7661,10 +7559,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aruba_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7699,8 +7597,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7710,7 +7607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aruba\" - api_response = api_instance.index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aruba_get:\n") pprint(api_response) except Exception as e: @@ -7741,8 +7638,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7774,7 +7670,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asrg_get** -> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asrg\" @@ -7801,10 +7697,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_asrg_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7839,8 +7735,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7850,7 +7745,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asrg\" - api_response = api_instance.index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asrg_get:\n") pprint(api_response) except Exception as e: @@ -7881,8 +7776,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7914,7 +7808,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_assetnote_get** -> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"assetnote\" @@ -7941,10 +7835,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_asset_not from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -7979,8 +7873,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7990,7 +7883,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"assetnote\" - api_response = api_instance.index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_assetnote_get:\n") pprint(api_response) except Exception as e: @@ -8021,8 +7914,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8054,7 +7946,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asterisk_get** -> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asterisk\" @@ -8081,10 +7973,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_asterisk_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8119,8 +8011,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8130,7 +8021,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asterisk\" - api_response = api_instance.index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asterisk_get:\n") pprint(api_response) except Exception as e: @@ -8161,8 +8052,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8194,7 +8084,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_astra_get** -> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"astra\" @@ -8221,10 +8111,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_astra_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8259,8 +8149,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8270,7 +8159,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"astra\" - api_response = api_instance.index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_astra_get:\n") pprint(api_response) except Exception as e: @@ -8301,8 +8190,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8334,7 +8222,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asus_get** -> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asus\" @@ -8361,10 +8249,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_asus_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8399,8 +8287,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8410,7 +8297,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asus\" - api_response = api_instance.index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asus_get:\n") pprint(api_response) except Exception as e: @@ -8441,8 +8328,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8474,7 +8360,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atlassian_get** -> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atlassian\" @@ -8501,10 +8387,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_atlassian from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8539,8 +8425,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8550,7 +8435,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atlassian\" - api_response = api_instance.index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atlassian_get:\n") pprint(api_response) except Exception as e: @@ -8581,8 +8466,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8614,7 +8498,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atlassian_vulns_get** -> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atlassian-vulns\" @@ -8641,10 +8525,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_atlassian from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8679,8 +8563,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8690,7 +8573,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atlassian-vulns\" - api_response = api_instance.index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atlassian_vulns_get:\n") pprint(api_response) except Exception as e: @@ -8721,8 +8604,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8754,7 +8636,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atredis_get** -> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atredis\" @@ -8781,10 +8663,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_atredis_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8819,8 +8701,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8830,7 +8711,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atredis\" - api_response = api_instance.index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atredis_get:\n") pprint(api_response) except Exception as e: @@ -8861,8 +8742,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8894,7 +8774,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_audiocodes_get** -> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"audiocodes\" @@ -8921,10 +8801,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_audiocode from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -8959,8 +8839,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8970,7 +8849,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"audiocodes\" - api_response = api_instance.index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_audiocodes_get:\n") pprint(api_response) except Exception as e: @@ -9001,8 +8880,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9034,7 +8912,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_auscert_get** -> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"auscert\" @@ -9061,10 +8939,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aus_cert_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9099,8 +8977,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9110,7 +8987,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"auscert\" - api_response = api_instance.index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_auscert_get:\n") pprint(api_response) except Exception as e: @@ -9141,8 +9018,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9174,7 +9050,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_autodesk_get** -> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"autodesk\" @@ -9201,10 +9077,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_autodesk_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9239,8 +9115,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9250,7 +9125,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"autodesk\" - api_response = api_instance.index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_autodesk_get:\n") pprint(api_response) except Exception as e: @@ -9281,8 +9156,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9314,7 +9188,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avaya_get** -> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avaya\" @@ -9341,10 +9215,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_avaya_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9379,8 +9253,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9390,7 +9263,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avaya\" - api_response = api_instance.index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avaya_get:\n") pprint(api_response) except Exception as e: @@ -9421,8 +9294,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9454,7 +9326,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aveva_get** -> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aveva\" @@ -9481,10 +9353,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aveva_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9519,8 +9391,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9530,7 +9401,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aveva\" - api_response = api_instance.index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aveva_get:\n") pprint(api_response) except Exception as e: @@ -9561,8 +9432,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9594,7 +9464,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avidml_advs_get** -> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avidml-advs\" @@ -9621,10 +9491,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_avidml_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9659,8 +9529,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9670,7 +9539,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avidml-advs\" - api_response = api_instance.index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avidml_advs_get:\n") pprint(api_response) except Exception as e: @@ -9701,8 +9570,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9734,7 +9602,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avigilon_get** -> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avigilon\" @@ -9761,10 +9629,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_avigilon_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9799,8 +9667,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9810,7 +9677,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avigilon\" - api_response = api_instance.index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avigilon_get:\n") pprint(api_response) except Exception as e: @@ -9841,8 +9708,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9874,7 +9740,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aws_get** -> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aws\" @@ -9901,10 +9767,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_aws_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -9939,8 +9805,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9950,7 +9815,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aws\" - api_response = api_instance.index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aws_get:\n") pprint(api_response) except Exception as e: @@ -9981,8 +9846,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10014,7 +9878,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_axis_get** -> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"axis\" @@ -10041,10 +9905,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_axis_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10079,8 +9943,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10090,7 +9953,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"axis\" - api_response = api_instance.index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_axis_get:\n") pprint(api_response) except Exception as e: @@ -10121,8 +9984,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10154,7 +10016,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_azul_get** -> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"azul\" @@ -10181,10 +10043,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_azul_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10219,8 +10081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10230,7 +10091,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"azul\" - api_response = api_instance.index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_azul_get:\n") pprint(api_response) except Exception as e: @@ -10261,8 +10122,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10294,7 +10154,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bandr_get** -> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bandr\" @@ -10321,10 +10181,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_bandr_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10359,8 +10219,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10370,7 +10229,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bandr\" - api_response = api_instance.index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bandr_get:\n") pprint(api_response) except Exception as e: @@ -10401,8 +10260,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10434,7 +10292,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_baxter_get** -> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"baxter\" @@ -10461,10 +10319,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_baxter_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10499,8 +10357,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10510,7 +10367,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"baxter\" - api_response = api_instance.index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_baxter_get:\n") pprint(api_response) except Exception as e: @@ -10541,8 +10398,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10574,7 +10430,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bbraun_get** -> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bbraun\" @@ -10601,10 +10457,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_b_braun_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10639,8 +10495,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10650,7 +10505,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bbraun\" - api_response = api_instance.index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bbraun_get:\n") pprint(api_response) except Exception as e: @@ -10681,8 +10536,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10714,7 +10568,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bd_get** -> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bd\" @@ -10741,10 +10595,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_becton_di from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10779,8 +10633,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10790,7 +10643,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bd\" - api_response = api_instance.index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bd_get:\n") pprint(api_response) except Exception as e: @@ -10821,8 +10674,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10854,7 +10706,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bdu_get** -> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bdu\" @@ -10881,10 +10733,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_bdu_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -10919,8 +10771,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10930,7 +10781,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bdu\" - api_response = api_instance.index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bdu_get:\n") pprint(api_response) except Exception as e: @@ -10961,8 +10812,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10994,7 +10844,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beckhoff_get** -> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beckhoff\" @@ -11021,10 +10871,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_beckhoff_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11059,8 +10909,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11070,7 +10919,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beckhoff\" - api_response = api_instance.index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beckhoff_get:\n") pprint(api_response) except Exception as e: @@ -11101,8 +10950,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11134,7 +10982,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beckman_coulter_get** -> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beckman-coulter\" @@ -11161,10 +11009,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_beckman_c from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11199,8 +11047,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11210,7 +11057,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beckman-coulter\" - api_response = api_instance.index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beckman_coulter_get:\n") pprint(api_response) except Exception as e: @@ -11241,8 +11088,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11274,7 +11120,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_belden_get** -> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"belden\" @@ -11301,10 +11147,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_belden_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11339,8 +11185,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11350,7 +11195,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"belden\" - api_response = api_instance.index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_belden_get:\n") pprint(api_response) except Exception as e: @@ -11381,8 +11226,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11414,7 +11258,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beyond_trust_get** -> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beyond-trust\" @@ -11441,10 +11285,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_beyond_tr from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11479,8 +11323,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11490,7 +11333,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beyond-trust\" - api_response = api_instance.index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beyond_trust_get:\n") pprint(api_response) except Exception as e: @@ -11521,8 +11364,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11554,7 +11396,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_binarly_get** -> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"binarly\" @@ -11581,10 +11423,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_binarly_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11619,8 +11461,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11630,7 +11471,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"binarly\" - api_response = api_instance.index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_binarly_get:\n") pprint(api_response) except Exception as e: @@ -11661,8 +11502,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11694,7 +11534,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bitdefender_get** -> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bitdefender\" @@ -11721,10 +11561,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_bit_defen from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11759,8 +11599,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11770,7 +11609,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bitdefender\" - api_response = api_instance.index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bitdefender_get:\n") pprint(api_response) except Exception as e: @@ -11801,8 +11640,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11834,7 +11672,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_blackberry_get** -> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"blackberry\" @@ -11861,10 +11699,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_black_ber from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -11899,8 +11737,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11910,7 +11747,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"blackberry\" - api_response = api_instance.index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_blackberry_get:\n") pprint(api_response) except Exception as e: @@ -11941,8 +11778,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11974,7 +11810,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bls_get** -> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bls\" @@ -12001,10 +11837,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_bls_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12039,8 +11875,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12050,7 +11885,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bls\" - api_response = api_instance.index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bls_get:\n") pprint(api_response) except Exception as e: @@ -12081,8 +11916,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12114,7 +11948,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bosch_get** -> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bosch\" @@ -12141,10 +11975,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_bosch_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12179,8 +12013,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12190,7 +12023,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bosch\" - api_response = api_instance.index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bosch_get:\n") pprint(api_response) except Exception as e: @@ -12221,8 +12054,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12254,7 +12086,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_boston_scientific_get** -> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"boston-scientific\" @@ -12281,10 +12113,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_boston_sc from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12319,8 +12151,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12330,7 +12161,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"boston-scientific\" - api_response = api_instance.index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_boston_scientific_get:\n") pprint(api_response) except Exception as e: @@ -12361,8 +12192,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12394,7 +12224,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_botnets_get** -> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"botnets\" @@ -12421,10 +12251,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_botnet_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12459,8 +12289,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12470,7 +12299,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"botnets\" - api_response = api_instance.index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_botnets_get:\n") pprint(api_response) except Exception as e: @@ -12501,8 +12330,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12534,7 +12362,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ca_cyber_centre_get** -> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ca-cyber-centre\" @@ -12561,10 +12389,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ca_cyber_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12599,8 +12427,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12610,7 +12437,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ca-cyber-centre\" - api_response = api_instance.index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ca_cyber_centre_get:\n") pprint(api_response) except Exception as e: @@ -12641,8 +12468,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12674,7 +12500,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_canvas_get** -> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"canvas\" @@ -12701,10 +12527,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_canvas_ex from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12739,8 +12565,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12750,7 +12575,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"canvas\" - api_response = api_instance.index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_canvas_get:\n") pprint(api_response) except Exception as e: @@ -12781,8 +12606,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12814,7 +12638,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_carestream_get** -> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"carestream\" @@ -12841,10 +12665,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_carestrea from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -12879,8 +12703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12890,7 +12713,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"carestream\" - api_response = api_instance.index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_carestream_get:\n") pprint(api_response) except Exception as e: @@ -12921,8 +12744,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12954,7 +12776,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cargo_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cargo\" @@ -12981,10 +12803,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13019,8 +12841,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13030,7 +12851,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cargo\" - api_response = api_instance.index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cargo_get:\n") pprint(api_response) except Exception as e: @@ -13061,8 +12882,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13094,7 +12914,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_carrier_get** -> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"carrier\" @@ -13121,10 +12941,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_carrier_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13159,8 +12979,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13170,7 +12989,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"carrier\" - api_response = api_instance.index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_carrier_get:\n") pprint(api_response) except Exception as e: @@ -13201,8 +13020,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13234,7 +13052,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cbl_mariner_get** -> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cbl-mariner\" @@ -13261,10 +13079,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cbl_marin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13299,8 +13117,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13310,7 +13127,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cbl-mariner\" - api_response = api_instance.index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cbl_mariner_get:\n") pprint(api_response) except Exception as e: @@ -13341,8 +13158,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13374,7 +13190,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_centos_get** -> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"centos\" @@ -13401,10 +13217,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cesa_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13439,8 +13255,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13450,7 +13265,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"centos\" - api_response = api_instance.index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_centos_get:\n") pprint(api_response) except Exception as e: @@ -13481,8 +13296,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13514,7 +13328,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_be_get** -> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-be\" @@ -13541,10 +13355,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_be_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13579,8 +13393,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13590,7 +13403,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-be\" - api_response = api_instance.index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_be_get:\n") pprint(api_response) except Exception as e: @@ -13621,8 +13434,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13654,7 +13466,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_in_get** -> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-in\" @@ -13681,10 +13493,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_in_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13719,8 +13531,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13730,7 +13541,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-in\" - api_response = api_instance.index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_in_get:\n") pprint(api_response) except Exception as e: @@ -13761,8 +13572,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13794,7 +13604,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_ir_security_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -13821,10 +13631,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_ir_s from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13859,8 +13669,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13870,7 +13679,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-ir-security-alerts\" - api_response = api_instance.index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_ir_security_alerts_get:\n") pprint(api_response) except Exception as e: @@ -13901,8 +13710,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13934,7 +13742,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_se_get** -> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-se\" @@ -13961,10 +13769,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_se_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -13999,8 +13807,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14010,7 +13817,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-se\" - api_response = api_instance.index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_se_get:\n") pprint(api_response) except Exception as e: @@ -14041,8 +13848,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14074,7 +13880,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_ua_get** -> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-ua\" @@ -14101,10 +13907,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_ua_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14139,8 +13945,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14150,7 +13955,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-ua\" - api_response = api_instance.index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_ua_get:\n") pprint(api_response) except Exception as e: @@ -14181,8 +13986,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14214,7 +14018,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_certeu_get** -> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"certeu\" @@ -14241,10 +14045,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_certeu_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14279,8 +14083,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14290,7 +14093,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"certeu\" - api_response = api_instance.index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_certeu_get:\n") pprint(api_response) except Exception as e: @@ -14321,8 +14124,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14354,7 +14156,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_certfr_get** -> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"certfr\" @@ -14381,10 +14183,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cert_fr_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14419,8 +14221,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14430,7 +14231,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"certfr\" - api_response = api_instance.index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_certfr_get:\n") pprint(api_response) except Exception as e: @@ -14461,8 +14262,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14494,7 +14294,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_chainguard_get** -> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"chainguard\" @@ -14521,10 +14321,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_chain_gua from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14559,8 +14359,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14570,7 +14369,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"chainguard\" - api_response = api_instance.index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_chainguard_get:\n") pprint(api_response) except Exception as e: @@ -14601,8 +14400,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14634,7 +14432,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_checkpoint_get** -> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"checkpoint\" @@ -14661,10 +14459,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_check_poi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14699,8 +14497,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14710,7 +14507,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"checkpoint\" - api_response = api_instance.index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_checkpoint_get:\n") pprint(api_response) except Exception as e: @@ -14741,8 +14538,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14774,7 +14570,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_chrome_get** -> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"chrome\" @@ -14801,10 +14597,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_chrome_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14839,8 +14635,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14850,7 +14645,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"chrome\" - api_response = api_instance.index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_chrome_get:\n") pprint(api_response) except Exception as e: @@ -14881,8 +14676,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14914,7 +14708,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ciena_get** -> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ciena\" @@ -14941,10 +14735,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ciena_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -14979,8 +14773,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14990,7 +14783,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ciena\" - api_response = api_instance.index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ciena_get:\n") pprint(api_response) except Exception as e: @@ -15021,8 +14814,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15054,7 +14846,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-alerts\" @@ -15081,10 +14873,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cisa_aler from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15119,8 +14911,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15130,7 +14921,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-alerts\" - api_response = api_instance.index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_alerts_get:\n") pprint(api_response) except Exception as e: @@ -15161,8 +14952,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15194,7 +14984,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-csaf\" @@ -15221,10 +15011,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cisa_csaf from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15259,8 +15049,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15270,7 +15059,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-csaf\" - api_response = api_instance.index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_csaf_get:\n") pprint(api_response) except Exception as e: @@ -15301,8 +15090,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15334,7 +15122,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_kev_get** -> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-kev\" @@ -15361,10 +15149,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kev_catal from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15399,8 +15187,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15410,7 +15197,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-kev\" - api_response = api_instance.index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_kev_get:\n") pprint(api_response) except Exception as e: @@ -15441,8 +15228,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15474,7 +15260,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-csaf\" @@ -15501,10 +15287,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cisco_csa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15539,8 +15325,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15550,7 +15335,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-csaf\" - api_response = api_instance.index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_csaf_get:\n") pprint(api_response) except Exception as e: @@ -15581,8 +15366,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15614,7 +15398,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco\" @@ -15641,10 +15425,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cisco_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15679,8 +15463,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15690,7 +15473,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco\" - api_response = api_instance.index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_get:\n") pprint(api_response) except Exception as e: @@ -15721,8 +15504,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15754,7 +15536,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_known_good_values_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-known-good-values\" @@ -15781,10 +15563,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cisco_kno from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15819,8 +15601,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15830,7 +15611,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-known-good-values\" - api_response = api_instance.index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_known_good_values_get:\n") pprint(api_response) except Exception as e: @@ -15861,8 +15642,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15894,7 +15674,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_talos_get** -> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-talos\" @@ -15921,10 +15701,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_talos_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -15959,8 +15739,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15970,7 +15749,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-talos\" - api_response = api_instance.index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_talos_get:\n") pprint(api_response) except Exception as e: @@ -16001,8 +15780,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16034,7 +15812,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_citrix_get** -> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"citrix\" @@ -16061,10 +15839,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_citrix_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16099,8 +15877,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16110,7 +15887,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"citrix\" - api_response = api_instance.index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_citrix_get:\n") pprint(api_response) except Exception as e: @@ -16141,8 +15918,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16174,7 +15950,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_claroty_get** -> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"claroty\" @@ -16201,10 +15977,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_claroty_v from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16239,8 +16015,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16250,7 +16025,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"claroty\" - api_response = api_instance.index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_claroty_get:\n") pprint(api_response) except Exception as e: @@ -16281,8 +16056,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16314,7 +16088,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cloudbees_get** -> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cloudbees\" @@ -16341,10 +16115,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cloud_bee from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16379,8 +16153,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16390,7 +16163,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cloudbees\" - api_response = api_instance.index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cloudbees_get:\n") pprint(api_response) except Exception as e: @@ -16421,8 +16194,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16454,7 +16226,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cloudvulndb_get** -> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cloudvulndb\" @@ -16481,10 +16253,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cloud_vul from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16519,8 +16291,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16530,7 +16301,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cloudvulndb\" - api_response = api_instance.index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cloudvulndb_get:\n") pprint(api_response) except Exception as e: @@ -16561,8 +16332,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16594,7 +16364,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnnvd_get** -> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnnvd\" @@ -16621,10 +16391,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cnnvd_ent from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16659,8 +16429,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16670,7 +16439,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnnvd\" - api_response = api_instance.index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnnvd_get:\n") pprint(api_response) except Exception as e: @@ -16701,8 +16470,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16734,7 +16502,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnvd_bulletins_get** -> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnvd-bulletins\" @@ -16761,10 +16529,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cnvd_bull from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16799,8 +16567,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16810,7 +16577,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnvd-bulletins\" - api_response = api_instance.index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnvd_bulletins_get:\n") pprint(api_response) except Exception as e: @@ -16841,8 +16608,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16874,7 +16640,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnvd_flaws_get** -> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnvd-flaws\" @@ -16901,10 +16667,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cnvd_flaw from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -16939,8 +16705,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16950,7 +16715,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnvd-flaws\" - api_response = api_instance.index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnvd_flaws_get:\n") pprint(api_response) except Exception as e: @@ -16981,8 +16746,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17014,7 +16778,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cocoapods_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cocoapods\" @@ -17041,10 +16805,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17079,8 +16843,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17090,7 +16853,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cocoapods\" - api_response = api_instance.index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cocoapods_get:\n") pprint(api_response) except Exception as e: @@ -17121,8 +16884,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17154,7 +16916,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_codesys_get** -> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"codesys\" @@ -17181,10 +16943,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_codesys_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17219,8 +16981,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17230,7 +16991,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"codesys\" - api_response = api_instance.index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_codesys_get:\n") pprint(api_response) except Exception as e: @@ -17261,8 +17022,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17294,7 +17054,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_commvault_get** -> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"commvault\" @@ -17321,10 +17081,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_comm_vaul from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17359,8 +17119,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17370,7 +17129,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"commvault\" - api_response = api_instance.index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_commvault_get:\n") pprint(api_response) except Exception as e: @@ -17401,8 +17160,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17434,7 +17192,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_compass_security_get** -> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"compass-security\" @@ -17461,10 +17219,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_compass_s from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17499,8 +17257,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17510,7 +17267,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"compass-security\" - api_response = api_instance.index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_compass_security_get:\n") pprint(api_response) except Exception as e: @@ -17541,8 +17298,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17574,7 +17330,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_composer_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"composer\" @@ -17601,10 +17357,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17639,8 +17395,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17650,7 +17405,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"composer\" - api_response = api_instance.index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_composer_get:\n") pprint(api_response) except Exception as e: @@ -17681,8 +17436,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17714,7 +17468,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_conan_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"conan\" @@ -17741,10 +17495,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17779,8 +17533,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17790,7 +17543,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"conan\" - api_response = api_instance.index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_conan_get:\n") pprint(api_response) except Exception as e: @@ -17821,8 +17574,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17854,7 +17606,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_coreimpact_get** -> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"coreimpact\" @@ -17881,10 +17633,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_core_impa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -17919,8 +17671,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17930,7 +17681,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"coreimpact\" - api_response = api_instance.index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_coreimpact_get:\n") pprint(api_response) except Exception as e: @@ -17961,8 +17712,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17994,7 +17744,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cpe_vulnerable_get** -> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cpe-vulnerable\" @@ -18021,10 +17771,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vc_vulner from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18059,8 +17809,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18070,7 +17819,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cpe-vulnerable\" - api_response = api_instance.index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cpe_vulnerable_get:\n") pprint(api_response) except Exception as e: @@ -18101,8 +17850,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18134,7 +17882,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_crestron_get** -> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"crestron\" @@ -18161,10 +17909,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_crestron_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18199,8 +17947,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18210,7 +17957,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"crestron\" - api_response = api_instance.index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_crestron_get:\n") pprint(api_response) except Exception as e: @@ -18241,8 +17988,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18274,7 +18020,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_crowdsec_get** -> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"crowdsec\" @@ -18301,10 +18047,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_crowd_sec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18339,8 +18085,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18350,7 +18095,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"crowdsec\" - api_response = api_instance.index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_crowdsec_get:\n") pprint(api_response) except Exception as e: @@ -18381,8 +18126,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18414,7 +18158,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_curl_get** -> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"curl\" @@ -18441,10 +18185,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_curl_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18479,8 +18223,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18490,7 +18233,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"curl\" - api_response = api_instance.index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_curl_get:\n") pprint(api_response) except Exception as e: @@ -18521,8 +18264,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18554,7 +18296,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cwe_get** -> RenderResponseWithMetadataArrayApiCWEPaginatePagination index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCWEPaginatePagination index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cwe\" @@ -18581,10 +18323,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_cwe_paginate_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18619,8 +18361,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18630,7 +18371,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cwe\" - api_response = api_instance.index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cwe_get:\n") pprint(api_response) except Exception as e: @@ -18661,8 +18402,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18694,7 +18434,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dahua_get** -> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dahua\" @@ -18721,10 +18461,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dahua_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18759,8 +18499,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18770,7 +18509,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dahua\" - api_response = api_instance.index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dahua_get:\n") pprint(api_response) except Exception as e: @@ -18801,8 +18540,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18834,7 +18572,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_danfoss_get** -> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"danfoss\" @@ -18861,10 +18599,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_danfoss_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -18899,8 +18637,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18910,7 +18647,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"danfoss\" - api_response = api_instance.index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_danfoss_get:\n") pprint(api_response) except Exception as e: @@ -18941,8 +18678,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18974,7 +18710,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dassault_get** -> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dassault\" @@ -19001,10 +18737,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dassault_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19039,8 +18775,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19050,7 +18785,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dassault\" - api_response = api_instance.index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dassault_get:\n") pprint(api_response) except Exception as e: @@ -19081,8 +18816,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19114,7 +18848,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_dsa_get** -> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-dsa\" @@ -19141,10 +18875,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_debian_se from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19179,8 +18913,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19190,7 +18923,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-dsa\" - api_response = api_instance.index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_dsa_get:\n") pprint(api_response) except Exception as e: @@ -19221,8 +18954,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19254,7 +18986,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_get** -> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian\" @@ -19281,10 +19013,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vulnerabl from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19319,8 +19051,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19330,7 +19061,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian\" - api_response = api_instance.index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_get:\n") pprint(api_response) except Exception as e: @@ -19361,8 +19092,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19394,7 +19124,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_packages_get** -> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-packages\" @@ -19421,10 +19151,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_distro_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19459,8 +19189,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19470,7 +19199,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-packages\" - api_response = api_instance.index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_packages_get:\n") pprint(api_response) except Exception as e: @@ -19501,8 +19230,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19534,7 +19262,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-purls\" @@ -19561,10 +19289,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_purls_purl_respons from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19599,8 +19327,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19610,7 +19337,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-purls\" - api_response = api_instance.index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_purls_get:\n") pprint(api_response) except Exception as e: @@ -19641,8 +19368,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19674,7 +19400,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dell_get** -> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dell\" @@ -19701,10 +19427,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dell_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19739,8 +19465,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19750,7 +19475,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dell\" - api_response = api_instance.index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dell_get:\n") pprint(api_response) except Exception as e: @@ -19781,8 +19506,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19814,7 +19538,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_delta_get** -> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"delta\" @@ -19841,10 +19565,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_delta_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -19879,8 +19603,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19890,7 +19613,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"delta\" - api_response = api_instance.index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_delta_get:\n") pprint(api_response) except Exception as e: @@ -19921,8 +19644,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19954,7 +19676,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dfn_cert_get** -> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dfn-cert\" @@ -19981,10 +19703,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dfn_cert_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20019,8 +19741,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20030,7 +19751,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dfn-cert\" - api_response = api_instance.index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dfn_cert_get:\n") pprint(api_response) except Exception as e: @@ -20061,8 +19782,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20094,7 +19814,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_django_get** -> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"django\" @@ -20121,10 +19841,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_django_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20159,8 +19879,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20170,7 +19889,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"django\" - api_response = api_instance.index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_django_get:\n") pprint(api_response) except Exception as e: @@ -20201,8 +19920,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20234,7 +19952,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dlink_get** -> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dlink\" @@ -20261,10 +19979,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_d_link_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20299,8 +20017,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20310,7 +20027,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dlink\" - api_response = api_instance.index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dlink_get:\n") pprint(api_response) except Exception as e: @@ -20341,8 +20058,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20374,7 +20090,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dnn_get** -> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dnn\" @@ -20401,10 +20117,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dnn_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20439,8 +20155,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20450,7 +20165,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dnn\" - api_response = api_instance.index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dnn_get:\n") pprint(api_response) except Exception as e: @@ -20481,8 +20196,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20514,7 +20228,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dotcms_get** -> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dotcms\" @@ -20541,10 +20255,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dot_cms_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20579,8 +20293,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20590,7 +20303,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dotcms\" - api_response = api_instance.index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dotcms_get:\n") pprint(api_response) except Exception as e: @@ -20621,8 +20334,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20654,7 +20366,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dragos_get** -> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dragos\" @@ -20681,10 +20393,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_dragos_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20719,8 +20431,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20730,7 +20441,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dragos\" - api_response = api_instance.index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dragos_get:\n") pprint(api_response) except Exception as e: @@ -20761,8 +20472,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20794,7 +20504,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_draytek_get** -> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"draytek\" @@ -20821,10 +20531,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_draytek_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20859,8 +20569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20870,7 +20579,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"draytek\" - api_response = api_instance.index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_draytek_get:\n") pprint(api_response) except Exception as e: @@ -20901,8 +20610,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20934,7 +20642,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_drupal_get** -> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"drupal\" @@ -20961,10 +20669,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_drupal_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -20999,8 +20707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21010,7 +20717,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"drupal\" - api_response = api_instance.index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_drupal_get:\n") pprint(api_response) except Exception as e: @@ -21041,8 +20748,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21074,7 +20780,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eaton_get** -> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eaton\" @@ -21101,10 +20807,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_eaton_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21139,8 +20845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21150,7 +20855,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eaton\" - api_response = api_instance.index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eaton_get:\n") pprint(api_response) except Exception as e: @@ -21181,8 +20886,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21214,7 +20918,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_elastic_get** -> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"elastic\" @@ -21241,10 +20945,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_elastic_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21279,8 +20983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21290,7 +20993,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"elastic\" - api_response = api_instance.index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_elastic_get:\n") pprint(api_response) except Exception as e: @@ -21321,8 +21024,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21354,7 +21056,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_elspec_get** -> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"elspec\" @@ -21381,10 +21083,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_elspec_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21419,8 +21121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21430,7 +21131,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"elspec\" - api_response = api_instance.index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_elspec_get:\n") pprint(api_response) except Exception as e: @@ -21461,8 +21162,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21494,7 +21194,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_emerging_threats_snort_get** -> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"emerging-threats-snort\" @@ -21521,10 +21221,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_emerging_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21559,8 +21259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21570,7 +21269,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"emerging-threats-snort\" - api_response = api_instance.index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_emerging_threats_snort_get:\n") pprint(api_response) except Exception as e: @@ -21601,8 +21300,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21634,7 +21332,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_emerson_get** -> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"emerson\" @@ -21661,10 +21359,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_emerson_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21699,8 +21397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21710,7 +21407,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"emerson\" - api_response = api_instance.index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_emerson_get:\n") pprint(api_response) except Exception as e: @@ -21741,8 +21438,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21774,7 +21470,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_endoflife_get** -> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"endoflife\" @@ -21801,10 +21497,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_end_of_li from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21839,8 +21535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21850,7 +21545,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"endoflife\" - api_response = api_instance.index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_endoflife_get:\n") pprint(api_response) except Exception as e: @@ -21881,8 +21576,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21914,7 +21608,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_endress_get** -> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"endress\" @@ -21941,10 +21635,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_endress_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -21979,8 +21673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21990,7 +21683,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"endress\" - api_response = api_instance.index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_endress_get:\n") pprint(api_response) except Exception as e: @@ -22021,8 +21714,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22054,7 +21746,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_alibaba_get** -> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol-alibaba\" @@ -22081,10 +21773,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_eol_aliba from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22119,8 +21811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22130,7 +21821,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol-alibaba\" - api_response = api_instance.index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_alibaba_get:\n") pprint(api_response) except Exception as e: @@ -22161,8 +21852,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22194,7 +21884,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_get** -> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol\" @@ -22221,10 +21911,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_eol_relea from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22259,8 +21949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22270,7 +21959,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol\" - api_response = api_instance.index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_get:\n") pprint(api_response) except Exception as e: @@ -22301,8 +21990,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22334,7 +22022,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_microsoft_get** -> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol-microsoft\" @@ -22361,10 +22049,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_eol_micro from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22399,8 +22087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22410,7 +22097,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol-microsoft\" - api_response = api_instance.index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_microsoft_get:\n") pprint(api_response) except Exception as e: @@ -22441,8 +22128,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22474,7 +22160,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_epss_get** -> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"epss\" @@ -22501,10 +22187,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_epss_data_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22539,8 +22225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22550,7 +22235,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"epss\" - api_response = api_instance.index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_epss_get:\n") pprint(api_response) except Exception as e: @@ -22581,8 +22266,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22614,7 +22298,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_euvd_get** -> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"euvd\" @@ -22641,10 +22325,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_euvd_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22679,8 +22363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22690,7 +22373,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"euvd\" - api_response = api_instance.index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_euvd_get:\n") pprint(api_response) except Exception as e: @@ -22721,8 +22404,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22754,7 +22436,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exodus_intel_get** -> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exodus-intel\" @@ -22781,10 +22463,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_exodus_in from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22819,8 +22501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22830,7 +22511,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exodus-intel\" - api_response = api_instance.index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exodus_intel_get:\n") pprint(api_response) except Exception as e: @@ -22861,8 +22542,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22894,7 +22574,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploit_chains_get** -> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploit-chains\" @@ -22921,10 +22601,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_exploit_chain_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -22959,8 +22639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22970,7 +22649,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploit-chains\" - api_response = api_instance.index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploit_chains_get:\n") pprint(api_response) except Exception as e: @@ -23001,8 +22680,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23034,7 +22712,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploitdb_get** -> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploitdb\" @@ -23061,10 +22739,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_exploit_d from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23099,8 +22777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23110,7 +22787,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploitdb\" - api_response = api_instance.index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploitdb_get:\n") pprint(api_response) except Exception as e: @@ -23141,8 +22818,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23174,7 +22850,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploits_changelog_get** -> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploits-changelog\" @@ -23201,10 +22877,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_exploits_chang from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23239,8 +22915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23250,7 +22925,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploits-changelog\" - api_response = api_instance.index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploits_changelog_get:\n") pprint(api_response) except Exception as e: @@ -23281,8 +22956,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23314,7 +22988,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploits_get** -> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploits\" @@ -23341,10 +23015,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_exploit_v3_res from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23379,8 +23053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23390,7 +23063,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploits\" - api_response = api_instance.index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploits_get:\n") pprint(api_response) except Exception as e: @@ -23421,8 +23094,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23454,7 +23126,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_f5_get** -> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"f5\" @@ -23481,10 +23153,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_f5_pagina from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23519,8 +23191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23530,7 +23201,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"f5\" - api_response = api_instance.index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_f5_get:\n") pprint(api_response) except Exception as e: @@ -23561,8 +23232,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23594,7 +23264,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_f_secure_get** -> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"f-secure\" @@ -23621,10 +23291,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_f_secure_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23659,8 +23329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23670,7 +23339,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"f-secure\" - api_response = api_instance.index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_f_secure_get:\n") pprint(api_response) except Exception as e: @@ -23701,8 +23370,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23734,7 +23402,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fanuc_get** -> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fanuc\" @@ -23761,10 +23429,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_fanuc_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23799,8 +23467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23810,7 +23477,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fanuc\" - api_response = api_instance.index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fanuc_get:\n") pprint(api_response) except Exception as e: @@ -23841,8 +23508,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23874,7 +23540,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fastly_get** -> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fastly\" @@ -23901,10 +23567,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_fastly_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -23939,8 +23605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23950,7 +23615,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fastly\" - api_response = api_instance.index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fastly_get:\n") pprint(api_response) except Exception as e: @@ -23981,8 +23646,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24014,7 +23678,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fedora_get** -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fedora\" @@ -24041,10 +23705,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_update_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24079,8 +23743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24090,7 +23753,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fedora\" - api_response = api_instance.index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fedora_get:\n") pprint(api_response) except Exception as e: @@ -24121,8 +23784,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24154,7 +23816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_festo_get** -> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"festo\" @@ -24181,10 +23843,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_festo_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24219,8 +23881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24230,7 +23891,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"festo\" - api_response = api_instance.index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_festo_get:\n") pprint(api_response) except Exception as e: @@ -24261,8 +23922,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24294,7 +23954,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_filecloud_get** -> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"filecloud\" @@ -24321,10 +23981,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_file_clou from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24359,8 +24019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24370,7 +24029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"filecloud\" - api_response = api_instance.index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_filecloud_get:\n") pprint(api_response) except Exception as e: @@ -24401,8 +24060,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24434,7 +24092,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_filezilla_get** -> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"filezilla\" @@ -24461,10 +24119,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_file_zill from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24499,8 +24157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24510,7 +24167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"filezilla\" - api_response = api_instance.index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_filezilla_get:\n") pprint(api_response) except Exception as e: @@ -24541,8 +24198,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24574,7 +24230,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_flatt_security_get** -> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"flatt-security\" @@ -24601,10 +24257,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_flatt_sec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24639,8 +24295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24650,7 +24305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"flatt-security\" - api_response = api_instance.index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_flatt_security_get:\n") pprint(api_response) except Exception as e: @@ -24681,8 +24336,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24714,7 +24368,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_forgerock_get** -> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"forgerock\" @@ -24741,10 +24395,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_forge_roc from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24779,8 +24433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24790,7 +24443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"forgerock\" - api_response = api_instance.index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_forgerock_get:\n") pprint(api_response) except Exception as e: @@ -24821,8 +24474,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24854,7 +24506,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fortinet_get** -> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fortinet\" @@ -24881,10 +24533,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_fortinet_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -24919,8 +24571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24930,7 +24581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fortinet\" - api_response = api_instance.index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fortinet_get:\n") pprint(api_response) except Exception as e: @@ -24961,8 +24612,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24994,7 +24644,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fortinet_ips_get** -> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fortinet-ips\" @@ -25021,10 +24671,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_fortinet_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25059,8 +24709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25070,7 +24719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fortinet-ips\" - api_response = api_instance.index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fortinet_ips_get:\n") pprint(api_response) except Exception as e: @@ -25101,8 +24750,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25134,7 +24782,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_foxit_get** -> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"foxit\" @@ -25161,10 +24809,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_foxit_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25199,8 +24847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25210,7 +24857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"foxit\" - api_response = api_instance.index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_foxit_get:\n") pprint(api_response) except Exception as e: @@ -25241,8 +24888,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25274,7 +24920,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_freebsd_get** -> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"freebsd\" @@ -25301,10 +24947,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_advisory_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25339,8 +24985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25350,7 +24995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"freebsd\" - api_response = api_instance.index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_freebsd_get:\n") pprint(api_response) except Exception as e: @@ -25381,8 +25026,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25414,7 +25058,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fresenius_get** -> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fresenius\" @@ -25441,10 +25085,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_fresenius from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25479,8 +25123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25490,7 +25133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fresenius\" - api_response = api_instance.index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fresenius_get:\n") pprint(api_response) except Exception as e: @@ -25521,8 +25164,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25554,7 +25196,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gallagher_get** -> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gallagher\" @@ -25581,10 +25223,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gallagher from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25619,8 +25261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25630,7 +25271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gallagher\" - api_response = api_instance.index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gallagher_get:\n") pprint(api_response) except Exception as e: @@ -25661,8 +25302,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25694,7 +25334,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gcp_get** -> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gcp\" @@ -25721,10 +25361,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gcp_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25759,8 +25399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25770,7 +25409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gcp\" - api_response = api_instance.index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gcp_get:\n") pprint(api_response) except Exception as e: @@ -25801,8 +25440,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25834,7 +25472,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ge_gas_get** -> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ge-gas\" @@ -25861,10 +25499,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ge_gas_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -25899,8 +25537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25910,7 +25547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ge-gas\" - api_response = api_instance.index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ge_gas_get:\n") pprint(api_response) except Exception as e: @@ -25941,8 +25578,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25974,7 +25610,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ge_healthcare_get** -> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ge-healthcare\" @@ -26001,10 +25637,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ge_health from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26039,8 +25675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26050,7 +25685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ge-healthcare\" - api_response = api_instance.index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ge_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -26081,8 +25716,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26114,7 +25748,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gem_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gem\" @@ -26141,10 +25775,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26179,8 +25813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26190,7 +25823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gem\" - api_response = api_instance.index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gem_get:\n") pprint(api_response) except Exception as e: @@ -26221,8 +25854,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26254,7 +25886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gen_get** -> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gen\" @@ -26281,10 +25913,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gen_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26319,8 +25951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26330,7 +25961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gen\" - api_response = api_instance.index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gen_get:\n") pprint(api_response) except Exception as e: @@ -26361,8 +25992,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26394,7 +26024,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_genetec_get** -> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"genetec\" @@ -26421,10 +26051,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_genetec_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26459,8 +26089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26470,7 +26099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"genetec\" - api_response = api_instance.index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_genetec_get:\n") pprint(api_response) except Exception as e: @@ -26501,8 +26130,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26534,7 +26162,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ghsa_get** -> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ghsa\" @@ -26561,10 +26189,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ghsa_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26599,8 +26227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26610,7 +26237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ghsa\" - api_response = api_instance.index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ghsa_get:\n") pprint(api_response) except Exception as e: @@ -26641,8 +26268,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26674,7 +26300,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gigabyte_get** -> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gigabyte\" @@ -26701,10 +26327,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gigabyte_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26739,8 +26365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26750,7 +26375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gigabyte\" - api_response = api_instance.index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gigabyte_get:\n") pprint(api_response) except Exception as e: @@ -26781,8 +26406,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26814,7 +26438,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitee_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitee-exploits\" @@ -26841,10 +26465,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gitee_exp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -26879,8 +26503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26890,7 +26513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitee-exploits\" - api_response = api_instance.index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitee_exploits_get:\n") pprint(api_response) except Exception as e: @@ -26921,8 +26544,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26954,7 +26576,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_github_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"github-exploits\" @@ -26981,10 +26603,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_git_hub_e from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27019,8 +26641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27030,7 +26651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"github-exploits\" - api_response = api_instance.index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_github_exploits_get:\n") pprint(api_response) except Exception as e: @@ -27061,8 +26682,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27094,7 +26714,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_github_security_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"github-security-advisories\" @@ -27121,10 +26741,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gh_adviso from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27159,8 +26779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27170,7 +26789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"github-security-advisories\" - api_response = api_instance.index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_github_security_advisories_get:\n") pprint(api_response) except Exception as e: @@ -27201,8 +26820,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27234,7 +26852,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitlab_advisories_community_get** -> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -27261,10 +26879,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gitlab_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27299,8 +26917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27310,7 +26927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitlab-advisories-community\" - api_response = api_instance.index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitlab_advisories_community_get:\n") pprint(api_response) except Exception as e: @@ -27341,8 +26958,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27374,7 +26990,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitlab_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitlab-exploits\" @@ -27401,10 +27017,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_git_lab_e from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27439,8 +27055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27450,7 +27065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitlab-exploits\" - api_response = api_instance.index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitlab_exploits_get:\n") pprint(api_response) except Exception as e: @@ -27481,8 +27096,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27514,7 +27128,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_glibc_get** -> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"glibc\" @@ -27541,10 +27155,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_glibc_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27579,8 +27193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27590,7 +27203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"glibc\" - api_response = api_instance.index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_glibc_get:\n") pprint(api_response) except Exception as e: @@ -27621,8 +27234,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27654,7 +27266,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gmo_cybersecurity_get** -> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -27681,10 +27293,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gmo_cyber from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27719,8 +27331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27730,7 +27341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gmo-cybersecurity\" - api_response = api_instance.index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gmo_cybersecurity_get:\n") pprint(api_response) except Exception as e: @@ -27761,8 +27372,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27794,7 +27404,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gnutls_get** -> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gnutls\" @@ -27821,10 +27431,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_gnu_tls_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27859,8 +27469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27870,7 +27479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gnutls\" - api_response = api_instance.index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gnutls_get:\n") pprint(api_response) except Exception as e: @@ -27901,8 +27510,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27934,7 +27542,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_go_vulndb_get** -> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"go-vulndb\" @@ -27961,10 +27569,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_go_vuln_j from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -27999,8 +27607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28010,7 +27617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"go-vulndb\" - api_response = api_instance.index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_go_vulndb_get:\n") pprint(api_response) except Exception as e: @@ -28041,8 +27648,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28074,7 +27680,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_golang_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"golang\" @@ -28101,10 +27707,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28139,8 +27745,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28150,7 +27755,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"golang\" - api_response = api_instance.index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_golang_get:\n") pprint(api_response) except Exception as e: @@ -28181,8 +27786,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28214,7 +27818,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_google0day_itw_get** -> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"google-0day-itw\" @@ -28241,10 +27845,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_itw_explo from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28279,8 +27883,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28290,7 +27893,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"google-0day-itw\" - api_response = api_instance.index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_google0day_itw_get:\n") pprint(api_response) except Exception as e: @@ -28321,8 +27924,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28354,7 +27956,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_google_container_optimized_os_get** -> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"google-container-optimized-os\" @@ -28381,10 +27983,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_container from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28419,8 +28021,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28430,7 +28031,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"google-container-optimized-os\" - api_response = api_instance.index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_google_container_optimized_os_get:\n") pprint(api_response) except Exception as e: @@ -28461,8 +28062,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28494,7 +28094,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_grafana_get** -> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"grafana\" @@ -28521,10 +28121,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_grafana_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28559,8 +28159,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28570,7 +28169,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"grafana\" - api_response = api_instance.index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_grafana_get:\n") pprint(api_response) except Exception as e: @@ -28601,8 +28200,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28634,7 +28232,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_greynoise_metadata_get** -> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"greynoise-metadata\" @@ -28661,10 +28259,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_grey_nois from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28699,8 +28297,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28710,7 +28307,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"greynoise-metadata\" - api_response = api_instance.index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_greynoise_metadata_get:\n") pprint(api_response) except Exception as e: @@ -28741,8 +28338,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28774,7 +28370,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hackage_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hackage\" @@ -28801,10 +28397,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28839,8 +28435,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28850,7 +28445,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hackage\" - api_response = api_instance.index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hackage_get:\n") pprint(api_response) except Exception as e: @@ -28881,8 +28476,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28914,7 +28508,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hacktivity_get** -> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hacktivity\" @@ -28941,10 +28535,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hacktivit from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -28979,8 +28573,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28990,7 +28583,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hacktivity\" - api_response = api_instance.index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hacktivity_get:\n") pprint(api_response) except Exception as e: @@ -29021,8 +28614,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29054,7 +28646,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_harmonyos_get** -> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"harmonyos\" @@ -29081,10 +28673,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_harmony_o from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29119,8 +28711,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29130,7 +28721,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"harmonyos\" - api_response = api_instance.index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_harmonyos_get:\n") pprint(api_response) except Exception as e: @@ -29161,8 +28752,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29194,7 +28784,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hashicorp_get** -> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hashicorp\" @@ -29221,10 +28811,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hashi_cor from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29259,8 +28849,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29270,7 +28859,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hashicorp\" - api_response = api_instance.index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hashicorp_get:\n") pprint(api_response) except Exception as e: @@ -29301,8 +28890,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29334,7 +28922,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_haskell_sadb_get** -> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"haskell-sadb\" @@ -29361,10 +28949,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_haskell_s from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29399,8 +28987,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29410,7 +28997,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"haskell-sadb\" - api_response = api_instance.index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_haskell_sadb_get:\n") pprint(api_response) except Exception as e: @@ -29441,8 +29028,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29474,7 +29060,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hcl_get** -> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hcl\" @@ -29501,10 +29087,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hcl_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29539,8 +29125,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29550,7 +29135,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hcl\" - api_response = api_instance.index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hcl_get:\n") pprint(api_response) except Exception as e: @@ -29581,8 +29166,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29614,7 +29198,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hex_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hex\" @@ -29641,10 +29225,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29679,8 +29263,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29690,7 +29273,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hex\" - api_response = api_instance.index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hex_get:\n") pprint(api_response) except Exception as e: @@ -29721,8 +29304,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29754,7 +29336,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hikvision_get** -> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hikvision\" @@ -29781,10 +29363,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hik_visio from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29819,8 +29401,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29830,7 +29411,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hikvision\" - api_response = api_instance.index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hikvision_get:\n") pprint(api_response) except Exception as e: @@ -29861,8 +29442,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29894,7 +29474,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hillrom_get** -> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hillrom\" @@ -29921,10 +29501,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hillrom_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -29959,8 +29539,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29970,7 +29549,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hillrom\" - api_response = api_instance.index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hillrom_get:\n") pprint(api_response) except Exception as e: @@ -30001,8 +29580,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30034,7 +29612,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hitachi_energy_get** -> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hitachi-energy\" @@ -30061,10 +29639,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hitachi_e from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30099,8 +29677,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30110,7 +29687,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hitachi-energy\" - api_response = api_instance.index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hitachi_energy_get:\n") pprint(api_response) except Exception as e: @@ -30141,8 +29718,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30174,7 +29750,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hitachi_get** -> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hitachi\" @@ -30201,10 +29777,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hitachi_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30239,8 +29815,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30250,7 +29825,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hitachi\" - api_response = api_instance.index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hitachi_get:\n") pprint(api_response) except Exception as e: @@ -30281,8 +29856,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30314,7 +29888,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hkcert_get** -> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hkcert\" @@ -30341,10 +29915,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hk_cert_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30379,8 +29953,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30390,7 +29963,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hkcert\" - api_response = api_instance.index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hkcert_get:\n") pprint(api_response) except Exception as e: @@ -30421,8 +29994,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30454,7 +30026,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hms_get** -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hms\" @@ -30481,10 +30053,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hms_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30519,8 +30091,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30530,7 +30101,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hms\" - api_response = api_instance.index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hms_get:\n") pprint(api_response) except Exception as e: @@ -30561,8 +30132,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30594,7 +30164,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_honeywell_get** -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"honeywell\" @@ -30621,10 +30191,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_honeywell from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30659,8 +30229,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30670,7 +30239,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"honeywell\" - api_response = api_instance.index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_honeywell_get:\n") pprint(api_response) except Exception as e: @@ -30701,8 +30270,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30734,7 +30302,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hp_get** -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hp\" @@ -30761,10 +30329,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hp_pagina from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30799,8 +30367,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30810,7 +30377,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hp\" - api_response = api_instance.index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hp_get:\n") pprint(api_response) except Exception as e: @@ -30841,8 +30408,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30874,7 +30440,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hpe_get** -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hpe\" @@ -30901,10 +30467,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_hpe_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -30939,8 +30505,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30950,7 +30515,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hpe\" - api_response = api_instance.index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hpe_get:\n") pprint(api_response) except Exception as e: @@ -30981,8 +30546,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31014,7 +30578,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_euleros_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-euleros\" @@ -31041,10 +30605,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_huawei_eu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31079,8 +30643,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31090,7 +30653,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-euleros\" - api_response = api_instance.index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_euleros_get:\n") pprint(api_response) except Exception as e: @@ -31121,8 +30684,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31154,7 +30716,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_ips_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-ips\" @@ -31181,10 +30743,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_huawei_ip from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31219,8 +30781,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31230,7 +30791,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-ips\" - api_response = api_instance.index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_ips_get:\n") pprint(api_response) except Exception as e: @@ -31261,8 +30822,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31294,7 +30854,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_psirt_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-psirt\" @@ -31321,10 +30881,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_huawei_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31359,8 +30919,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31370,7 +30929,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-psirt\" - api_response = api_instance.index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_psirt_get:\n") pprint(api_response) except Exception as e: @@ -31401,8 +30960,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31434,7 +30992,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_iava_get** -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"iava\" @@ -31461,10 +31019,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_iava_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31499,8 +31057,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31510,7 +31067,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"iava\" - api_response = api_instance.index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_iava_get:\n") pprint(api_response) except Exception as e: @@ -31541,8 +31098,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31574,7 +31130,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ibm_get** -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ibm\" @@ -31601,10 +31157,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ibm_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31639,8 +31195,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31650,7 +31205,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ibm\" - api_response = api_instance.index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ibm_get:\n") pprint(api_response) except Exception as e: @@ -31681,8 +31236,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31714,7 +31268,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_idemia_get** -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"idemia\" @@ -31741,10 +31295,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_idemia_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31779,8 +31333,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31790,7 +31343,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"idemia\" - api_response = api_instance.index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_idemia_get:\n") pprint(api_response) except Exception as e: @@ -31821,8 +31374,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31854,7 +31406,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_igel_get** -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"igel\" @@ -31881,10 +31433,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_igel_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -31919,8 +31471,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31930,7 +31481,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"igel\" - api_response = api_instance.index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_igel_get:\n") pprint(api_response) except Exception as e: @@ -31961,8 +31512,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31994,7 +31544,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_il_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"il-alerts\" @@ -32021,10 +31571,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_israeli_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32059,8 +31609,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32070,7 +31619,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"il-alerts\" - api_response = api_instance.index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_il_alerts_get:\n") pprint(api_response) except Exception as e: @@ -32101,8 +31650,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32134,7 +31682,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_il_vulnerabilities_get** -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"il-vulnerabilities\" @@ -32161,10 +31709,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_israeli_v from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32199,8 +31747,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32210,7 +31757,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"il-vulnerabilities\" - api_response = api_instance.index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_il_vulnerabilities_get:\n") pprint(api_response) except Exception as e: @@ -32241,8 +31788,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32274,7 +31820,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_incibe_get** -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"incibe\" @@ -32301,10 +31847,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_incibe_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32339,8 +31885,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32350,7 +31895,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"incibe\" - api_response = api_instance.index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_incibe_get:\n") pprint(api_response) except Exception as e: @@ -32381,8 +31926,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32414,7 +31958,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_initial_access_get** -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"initial-access\" @@ -32441,10 +31985,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_initial_access from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32479,8 +32023,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32490,7 +32033,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"initial-access\" - api_response = api_instance.index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_initial_access_get:\n") pprint(api_response) except Exception as e: @@ -32521,8 +32064,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32554,7 +32096,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_initial_access_git_get** -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"initial-access-git\" @@ -32581,10 +32123,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_initial_access from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32619,8 +32161,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32630,7 +32171,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"initial-access-git\" - api_response = api_instance.index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_initial_access_git_get:\n") pprint(api_response) except Exception as e: @@ -32661,8 +32202,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32694,7 +32234,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_intel_get** -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"intel\" @@ -32721,10 +32261,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_intel_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32759,8 +32299,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32770,7 +32309,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"intel\" - api_response = api_instance.index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_intel_get:\n") pprint(api_response) except Exception as e: @@ -32801,8 +32340,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32834,7 +32372,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel10d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-10d\" @@ -32861,10 +32399,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ip_intel_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -32904,8 +32442,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32915,7 +32452,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-10d\" - api_response = api_instance.index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel10d_get:\n") pprint(api_response) except Exception as e: @@ -32951,8 +32488,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32984,7 +32520,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel30d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-30d\" @@ -33011,10 +32547,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ip_intel_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33054,8 +32590,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33065,7 +32600,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-30d\" - api_response = api_instance.index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel30d_get:\n") pprint(api_response) except Exception as e: @@ -33101,8 +32636,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33134,7 +32668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel3d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-3d\" @@ -33161,10 +32695,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ip_intel_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33204,8 +32738,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33215,7 +32748,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-3d\" - api_response = api_instance.index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel3d_get:\n") pprint(api_response) except Exception as e: @@ -33251,8 +32784,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33284,7 +32816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel90d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-90d\" @@ -33311,10 +32843,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ip_intel_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33354,8 +32886,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33365,7 +32896,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-90d\" - api_response = api_instance.index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel90d_get:\n") pprint(api_response) except Exception as e: @@ -33401,8 +32932,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33434,7 +32964,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_istio_get** -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"istio\" @@ -33461,10 +32991,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_istio_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33499,8 +33029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33510,7 +33039,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"istio\" - api_response = api_instance.index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_istio_get:\n") pprint(api_response) except Exception as e: @@ -33541,8 +33070,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33574,7 +33102,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ivanti_get** -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ivanti\" @@ -33601,10 +33129,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ivanti_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33639,8 +33167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33650,7 +33177,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ivanti\" - api_response = api_instance.index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ivanti_get:\n") pprint(api_response) except Exception as e: @@ -33681,8 +33208,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33714,7 +33240,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ivanti_rss_get** -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ivanti-rss\" @@ -33741,10 +33267,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ivanti_rs from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33779,8 +33305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33790,7 +33315,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ivanti-rss\" - api_response = api_instance.index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ivanti_rss_get:\n") pprint(api_response) except Exception as e: @@ -33821,8 +33346,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33854,7 +33378,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jenkins_get** -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jenkins\" @@ -33881,10 +33405,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_jenkins_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -33919,8 +33443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33930,7 +33453,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jenkins\" - api_response = api_instance.index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jenkins_get:\n") pprint(api_response) except Exception as e: @@ -33961,8 +33484,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33994,7 +33516,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jetbrains_get** -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jetbrains\" @@ -34021,10 +33543,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_jet_brain from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34059,8 +33581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34070,7 +33591,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jetbrains\" - api_response = api_instance.index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jetbrains_get:\n") pprint(api_response) except Exception as e: @@ -34101,8 +33622,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34134,7 +33654,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jfrog_get** -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jfrog\" @@ -34161,10 +33681,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_j_frog_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34199,8 +33719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34210,7 +33729,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jfrog\" - api_response = api_instance.index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jfrog_get:\n") pprint(api_response) except Exception as e: @@ -34241,8 +33760,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34274,7 +33792,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jnj_get** -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jnj\" @@ -34301,10 +33819,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_jnj_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34339,8 +33857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34350,7 +33867,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jnj\" - api_response = api_instance.index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jnj_get:\n") pprint(api_response) except Exception as e: @@ -34381,8 +33898,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34414,7 +33930,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_johnson_controls_get** -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"johnson-controls\" @@ -34441,10 +33957,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_johnson_c from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34479,8 +33995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34490,7 +34005,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"johnson-controls\" - api_response = api_instance.index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_johnson_controls_get:\n") pprint(api_response) except Exception as e: @@ -34521,8 +34036,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34554,7 +34068,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_juniper_get** -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"juniper\" @@ -34581,10 +34095,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_juniper_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34619,8 +34133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34630,7 +34143,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"juniper\" - api_response = api_instance.index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_juniper_get:\n") pprint(api_response) except Exception as e: @@ -34661,8 +34174,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34694,7 +34206,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jvn_get** -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jvn\" @@ -34721,10 +34233,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_jvn_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34759,8 +34271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34770,7 +34281,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jvn\" - api_response = api_instance.index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jvn_get:\n") pprint(api_response) except Exception as e: @@ -34801,8 +34312,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34834,7 +34344,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jvndb_get** -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jvndb\" @@ -34861,10 +34371,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_jvn_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -34899,8 +34409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34910,7 +34419,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jvndb\" - api_response = api_instance.index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jvndb_get:\n") pprint(api_response) except Exception as e: @@ -34941,8 +34450,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34974,7 +34482,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kaspersky_ics_cert_get** -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -35001,10 +34509,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kaspersky from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35039,8 +34547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35050,7 +34557,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kaspersky-ics-cert\" - api_response = api_instance.index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kaspersky_ics_cert_get:\n") pprint(api_response) except Exception as e: @@ -35081,8 +34588,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35114,7 +34620,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_korelogic_get** -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"korelogic\" @@ -35141,10 +34647,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kore_logi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35179,8 +34685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35190,7 +34695,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"korelogic\" - api_response = api_instance.index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_korelogic_get:\n") pprint(api_response) except Exception as e: @@ -35221,8 +34726,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35254,7 +34758,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_krcert_security_notices_get** -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"krcert-security-notices\" @@ -35281,10 +34785,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kr_cert_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35319,8 +34823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35330,7 +34833,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"krcert-security-notices\" - api_response = api_instance.index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_krcert_security_notices_get:\n") pprint(api_response) except Exception as e: @@ -35361,8 +34864,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35394,7 +34896,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_krcert_vulnerabilities_get** -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -35421,10 +34923,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kr_cert_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35459,8 +34961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35470,7 +34971,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"krcert-vulnerabilities\" - api_response = api_instance.index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_krcert_vulnerabilities_get:\n") pprint(api_response) except Exception as e: @@ -35501,8 +35002,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35534,7 +35034,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kubernetes_get** -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kubernetes\" @@ -35561,10 +35061,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_k8_s_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35599,8 +35099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35610,7 +35109,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kubernetes\" - api_response = api_instance.index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kubernetes_get:\n") pprint(api_response) except Exception as e: @@ -35641,8 +35140,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35674,7 +35172,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kunbus_get** -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kunbus\" @@ -35701,10 +35199,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_kunbus_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35739,8 +35237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35750,7 +35247,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kunbus\" - api_response = api_instance.index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kunbus_get:\n") pprint(api_response) except Exception as e: @@ -35781,8 +35278,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35814,7 +35310,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lantronix_get** -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lantronix\" @@ -35841,10 +35337,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_lantronix from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -35879,8 +35375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35890,7 +35385,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lantronix\" - api_response = api_instance.index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lantronix_get:\n") pprint(api_response) except Exception as e: @@ -35921,8 +35416,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35954,7 +35448,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lenovo_get** -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lenovo\" @@ -35981,10 +35475,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_lenovo_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36019,8 +35513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36030,7 +35523,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lenovo\" - api_response = api_instance.index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lenovo_get:\n") pprint(api_response) except Exception as e: @@ -36061,8 +35554,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36094,7 +35586,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lexmark_get** -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lexmark\" @@ -36121,10 +35613,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_lexmark_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36159,8 +35651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36170,7 +35661,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lexmark\" - api_response = api_instance.index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lexmark_get:\n") pprint(api_response) except Exception as e: @@ -36201,8 +35692,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36234,7 +35724,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lg_get** -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lg\" @@ -36261,10 +35751,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_lg_pagina from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36299,8 +35789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36310,7 +35799,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lg\" - api_response = api_instance.index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lg_get:\n") pprint(api_response) except Exception as e: @@ -36341,8 +35830,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36374,7 +35862,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_libre_office_get** -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"libre-office\" @@ -36401,10 +35889,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_libre_off from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36439,8 +35927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36450,7 +35937,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"libre-office\" - api_response = api_instance.index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_libre_office_get:\n") pprint(api_response) except Exception as e: @@ -36481,8 +35968,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36514,7 +36000,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_linux_get** -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"linux\" @@ -36541,10 +36027,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_linux_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36579,8 +36065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36590,7 +36075,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"linux\" - api_response = api_instance.index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_linux_get:\n") pprint(api_response) except Exception as e: @@ -36621,8 +36106,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36654,7 +36138,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lol_advs_get** -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lol-advs\" @@ -36681,10 +36165,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_lol_advs_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36719,8 +36203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36730,7 +36213,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lol-advs\" - api_response = api_instance.index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lol_advs_get:\n") pprint(api_response) except Exception as e: @@ -36761,8 +36244,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36794,7 +36276,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_m_files_get** -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"m-files\" @@ -36821,10 +36303,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_m_files_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36859,8 +36341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36870,7 +36351,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"m-files\" - api_response = api_instance.index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_m_files_get:\n") pprint(api_response) except Exception as e: @@ -36901,8 +36382,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36934,7 +36414,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_macert_get** -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"macert\" @@ -36961,10 +36441,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ma_cert_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -36999,8 +36479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37010,7 +36489,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"macert\" - api_response = api_instance.index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_macert_get:\n") pprint(api_response) except Exception as e: @@ -37041,8 +36520,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37074,7 +36552,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_malicious_packages_get** -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"malicious-packages\" @@ -37101,10 +36579,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_malicious from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37139,8 +36617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37150,7 +36627,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"malicious-packages\" - api_response = api_instance.index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_malicious_packages_get:\n") pprint(api_response) except Exception as e: @@ -37181,8 +36658,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37214,7 +36690,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_manageengine_get** -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"manageengine\" @@ -37241,10 +36717,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_manage_en from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37279,8 +36755,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37290,7 +36765,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"manageengine\" - api_response = api_instance.index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_manageengine_get:\n") pprint(api_response) except Exception as e: @@ -37321,8 +36796,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37354,7 +36828,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_maven_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"maven\" @@ -37381,10 +36855,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37419,8 +36893,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37430,7 +36903,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"maven\" - api_response = api_instance.index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_maven_get:\n") pprint(api_response) except Exception as e: @@ -37461,8 +36934,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37494,7 +36966,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mbed_tls_get** -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mbed-tls\" @@ -37521,10 +36993,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mbed_tls_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37559,8 +37031,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37570,7 +37041,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mbed-tls\" - api_response = api_instance.index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mbed_tls_get:\n") pprint(api_response) except Exception as e: @@ -37601,8 +37072,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37634,7 +37104,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mcafee_get** -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mcafee\" @@ -37661,10 +37131,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mc_afee_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37699,8 +37169,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37710,7 +37179,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mcafee\" - api_response = api_instance.index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mcafee_get:\n") pprint(api_response) except Exception as e: @@ -37741,8 +37210,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37774,7 +37242,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mediatek_get** -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mediatek\" @@ -37801,10 +37269,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mediatek_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37839,8 +37307,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37850,7 +37317,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mediatek\" - api_response = api_instance.index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mediatek_get:\n") pprint(api_response) except Exception as e: @@ -37881,8 +37348,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37914,7 +37380,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_medtronic_get** -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"medtronic\" @@ -37941,10 +37407,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_medtronic from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -37979,8 +37445,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37990,7 +37455,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"medtronic\" - api_response = api_instance.index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_medtronic_get:\n") pprint(api_response) except Exception as e: @@ -38021,8 +37486,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38054,7 +37518,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mendix_get** -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mendix\" @@ -38081,10 +37545,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mendix_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38119,8 +37583,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38130,7 +37593,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mendix\" - api_response = api_instance.index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mendix_get:\n") pprint(api_response) except Exception as e: @@ -38161,8 +37624,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38194,7 +37656,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_meta_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"meta-advisories\" @@ -38221,10 +37683,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_meta_advi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38259,8 +37721,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38270,7 +37731,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"meta-advisories\" - api_response = api_instance.index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_meta_advisories_get:\n") pprint(api_response) except Exception as e: @@ -38301,8 +37762,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38334,7 +37794,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_metasploit_get** -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"metasploit\" @@ -38361,10 +37821,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_metasploi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38399,8 +37859,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38410,7 +37869,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"metasploit\" - api_response = api_instance.index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_metasploit_get:\n") pprint(api_response) except Exception as e: @@ -38441,8 +37900,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38474,7 +37932,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-csaf\" @@ -38501,10 +37959,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_microsoft from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38539,8 +37997,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38550,7 +38007,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-csaf\" - api_response = api_instance.index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_csaf_get:\n") pprint(api_response) except Exception as e: @@ -38581,8 +38038,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38614,7 +38070,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_cvrf_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-cvrf\" @@ -38641,10 +38097,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_microsoft from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38679,8 +38135,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38690,7 +38145,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-cvrf\" - api_response = api_instance.index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_cvrf_get:\n") pprint(api_response) except Exception as e: @@ -38721,8 +38176,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38754,7 +38208,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_driver_block_list_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -38781,10 +38235,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_microsoft from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38819,8 +38273,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38830,7 +38283,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-driver-block-list\" - api_response = api_instance.index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_driver_block_list_get:\n") pprint(api_response) except Exception as e: @@ -38861,8 +38314,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38894,7 +38346,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_kb_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-kb\" @@ -38921,10 +38373,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_microsoft from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -38959,8 +38411,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38970,7 +38421,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-kb\" - api_response = api_instance.index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_kb_get:\n") pprint(api_response) except Exception as e: @@ -39001,8 +38452,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39034,7 +38484,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mikrotik_get** -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mikrotik\" @@ -39061,10 +38511,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mikrotik_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39099,8 +38549,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39110,7 +38559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mikrotik\" - api_response = api_instance.index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mikrotik_get:\n") pprint(api_response) except Exception as e: @@ -39141,8 +38590,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39174,7 +38622,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mindray_get** -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mindray\" @@ -39201,10 +38649,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mindray_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39239,8 +38687,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39250,7 +38697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mindray\" - api_response = api_instance.index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mindray_get:\n") pprint(api_response) except Exception as e: @@ -39281,8 +38728,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39314,7 +38760,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_misp_threat_actors_get** -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"misp-threat-actors\" @@ -39341,10 +38787,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_misp_valu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39379,8 +38825,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39390,7 +38835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"misp-threat-actors\" - api_response = api_instance.index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_misp_threat_actors_get:\n") pprint(api_response) except Exception as e: @@ -39421,8 +38866,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39454,7 +38898,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitel_get** -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitel\" @@ -39481,10 +38925,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mitel_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39519,8 +38963,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39530,7 +38973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitel\" - api_response = api_instance.index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitel_get:\n") pprint(api_response) except Exception as e: @@ -39561,8 +39004,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39594,7 +39036,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitre_attack_cve_get** -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitre-attack-cve\" @@ -39621,10 +39063,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_mitre_attack_t from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39659,8 +39101,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39670,7 +39111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitre-attack-cve\" - api_response = api_instance.index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitre_attack_cve_get:\n") pprint(api_response) except Exception as e: @@ -39701,8 +39142,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39734,7 +39174,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitre_cvelist_v5_get** -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -39761,10 +39201,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mitre_cve from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39799,8 +39239,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39810,7 +39249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitre-cvelist-v5\" - api_response = api_instance.index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitre_cvelist_v5_get:\n") pprint(api_response) except Exception as e: @@ -39841,8 +39280,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39874,7 +39312,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitsubishi_electric_get** -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitsubishi-electric\" @@ -39901,10 +39339,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mitsubish from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -39939,8 +39377,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39950,7 +39387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitsubishi-electric\" - api_response = api_instance.index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitsubishi_electric_get:\n") pprint(api_response) except Exception as e: @@ -39981,8 +39418,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40014,7 +39450,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mongodb_get** -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mongodb\" @@ -40041,10 +39477,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mongo_db_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40079,8 +39515,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40090,7 +39525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mongodb\" - api_response = api_instance.index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mongodb_get:\n") pprint(api_response) except Exception as e: @@ -40121,8 +39556,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40154,7 +39588,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_moxa_get** -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"moxa\" @@ -40181,10 +39615,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_moxa_advi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40219,8 +39653,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40230,7 +39663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"moxa\" - api_response = api_instance.index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_moxa_get:\n") pprint(api_response) except Exception as e: @@ -40261,8 +39694,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40294,7 +39726,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mozilla_get** -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mozilla\" @@ -40321,10 +39753,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_mozilla_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40359,8 +39791,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40370,7 +39801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mozilla\" - api_response = api_instance.index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mozilla_get:\n") pprint(api_response) except Exception as e: @@ -40401,8 +39832,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40434,7 +39864,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_naver_get** -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"naver\" @@ -40461,10 +39891,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_naver_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40499,8 +39929,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40510,7 +39939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"naver\" - api_response = api_instance.index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_naver_get:\n") pprint(api_response) except Exception as e: @@ -40541,8 +39970,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40574,7 +40002,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ncsc_cves_get** -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ncsc-cves\" @@ -40601,10 +40029,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ncsccve_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40639,8 +40067,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40650,7 +40077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ncsc-cves\" - api_response = api_instance.index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ncsc_cves_get:\n") pprint(api_response) except Exception as e: @@ -40681,8 +40108,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40714,7 +40140,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ncsc_get** -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ncsc\" @@ -40741,10 +40167,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ncsc_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40779,8 +40205,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40790,7 +40215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ncsc\" - api_response = api_instance.index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ncsc_get:\n") pprint(api_response) except Exception as e: @@ -40821,8 +40246,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40854,7 +40278,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nec_get** -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nec\" @@ -40881,10 +40305,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nec_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -40919,8 +40343,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40930,7 +40353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nec\" - api_response = api_instance.index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nec_get:\n") pprint(api_response) except Exception as e: @@ -40961,8 +40384,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40994,7 +40416,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nessus_get** -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nessus\" @@ -41021,10 +40443,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nessus_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41059,8 +40481,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41070,7 +40491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nessus\" - api_response = api_instance.index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nessus_get:\n") pprint(api_response) except Exception as e: @@ -41101,8 +40522,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41134,7 +40554,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netapp_get** -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netapp\" @@ -41161,10 +40581,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_net_app_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41199,8 +40619,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41210,7 +40629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netapp\" - api_response = api_instance.index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netapp_get:\n") pprint(api_response) except Exception as e: @@ -41241,8 +40660,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41274,7 +40692,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netatalk_get** -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netatalk\" @@ -41301,10 +40719,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_netatalk_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41339,8 +40757,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41350,7 +40767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netatalk\" - api_response = api_instance.index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netatalk_get:\n") pprint(api_response) except Exception as e: @@ -41381,8 +40798,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41414,7 +40830,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netgate_get** -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netgate\" @@ -41441,10 +40857,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_netgate_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41479,8 +40895,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41490,7 +40905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netgate\" - api_response = api_instance.index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netgate_get:\n") pprint(api_response) except Exception as e: @@ -41521,8 +40936,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41554,7 +40968,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netgear_get** -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netgear\" @@ -41581,10 +40995,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_netgear_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41619,8 +41033,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41630,7 +41043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netgear\" - api_response = api_instance.index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netgear_get:\n") pprint(api_response) except Exception as e: @@ -41661,8 +41074,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41694,7 +41106,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netskope_get** -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netskope\" @@ -41721,10 +41133,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_netskope_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41759,8 +41171,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41770,7 +41181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netskope\" - api_response = api_instance.index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netskope_get:\n") pprint(api_response) except Exception as e: @@ -41801,8 +41212,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41834,7 +41244,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nexpose_get** -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nexpose\" @@ -41861,10 +41271,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nexpose_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -41899,8 +41309,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41910,7 +41319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nexpose\" - api_response = api_instance.index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nexpose_get:\n") pprint(api_response) except Exception as e: @@ -41941,8 +41350,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41974,7 +41382,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nginx_get** -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nginx\" @@ -42001,10 +41409,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nginx_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42039,8 +41447,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42050,7 +41457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nginx\" - api_response = api_instance.index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nginx_get:\n") pprint(api_response) except Exception as e: @@ -42081,8 +41488,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42114,7 +41520,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nhs_get** -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nhs\" @@ -42141,10 +41547,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nhs_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42179,8 +41585,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42190,7 +41595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nhs\" - api_response = api_instance.index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nhs_get:\n") pprint(api_response) except Exception as e: @@ -42221,8 +41626,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42254,7 +41658,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ni_get** -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ni\" @@ -42281,10 +41685,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ni_pagina from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42319,8 +41723,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42330,7 +41733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ni\" - api_response = api_instance.index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ni_get:\n") pprint(api_response) except Exception as e: @@ -42361,8 +41764,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42394,7 +41796,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_cpematch_get** -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -42421,10 +41823,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_nvd20_cpe_matc from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42459,8 +41861,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42470,7 +41871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2-cpematch\" - api_response = api_instance.index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_cpematch_get:\n") pprint(api_response) except Exception as e: @@ -42501,8 +41902,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42534,7 +41934,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_get** -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2\" @@ -42561,10 +41961,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_nvd20_cve_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42599,8 +41999,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42610,7 +42009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2\" - api_response = api_instance.index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_get:\n") pprint(api_response) except Exception as e: @@ -42641,8 +42040,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42674,7 +42072,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_sources_get** -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -42701,10 +42099,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nvd20_sou from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42739,8 +42137,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42750,7 +42147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2-sources\" - api_response = api_instance.index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_sources_get:\n") pprint(api_response) except Exception as e: @@ -42781,8 +42178,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42814,7 +42210,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd_get** -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd\" @@ -42841,10 +42237,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_cve_items_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -42879,8 +42275,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42890,7 +42285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd\" - api_response = api_instance.index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd_get:\n") pprint(api_response) except Exception as e: @@ -42921,8 +42316,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42954,7 +42348,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_node_security_get** -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"node-security\" @@ -42981,10 +42375,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_node_secu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43019,8 +42413,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43030,7 +42423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"node-security\" - api_response = api_instance.index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_node_security_get:\n") pprint(api_response) except Exception as e: @@ -43061,8 +42454,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43094,7 +42486,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nodejs_get** -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nodejs\" @@ -43121,10 +42513,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_node_js_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43159,8 +42551,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43170,7 +42561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nodejs\" - api_response = api_instance.index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nodejs_get:\n") pprint(api_response) except Exception as e: @@ -43201,8 +42592,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43234,7 +42624,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nokia_get** -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nokia\" @@ -43261,10 +42651,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nokia_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43299,8 +42689,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43310,7 +42699,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nokia\" - api_response = api_instance.index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nokia_get:\n") pprint(api_response) except Exception as e: @@ -43341,8 +42730,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43374,7 +42762,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_notepadplusplus_get** -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"notepadplusplus\" @@ -43401,10 +42789,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_note_pad_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43439,8 +42827,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43450,7 +42837,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"notepadplusplus\" - api_response = api_instance.index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_notepadplusplus_get:\n") pprint(api_response) except Exception as e: @@ -43481,8 +42868,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43514,7 +42900,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nozomi_get** -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nozomi\" @@ -43541,10 +42927,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nozomi_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43579,8 +42965,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43590,7 +42975,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nozomi\" - api_response = api_instance.index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nozomi_get:\n") pprint(api_response) except Exception as e: @@ -43621,8 +43006,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43654,7 +43038,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_npm_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"npm\" @@ -43681,10 +43065,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43719,8 +43103,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43730,7 +43113,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"npm\" - api_response = api_instance.index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_npm_get:\n") pprint(api_response) except Exception as e: @@ -43761,8 +43144,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43794,7 +43176,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ntp_get** -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ntp\" @@ -43821,10 +43203,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ntp_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43859,8 +43241,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43870,7 +43251,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ntp\" - api_response = api_instance.index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ntp_get:\n") pprint(api_response) except Exception as e: @@ -43901,8 +43282,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43934,7 +43314,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nuclei_get** -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nuclei\" @@ -43961,10 +43341,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nuclei_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -43999,8 +43379,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44010,7 +43389,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nuclei\" - api_response = api_instance.index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nuclei_get:\n") pprint(api_response) except Exception as e: @@ -44041,8 +43420,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44074,7 +43452,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nuget_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nuget\" @@ -44101,10 +43479,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44139,8 +43517,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44150,7 +43527,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nuget\" - api_response = api_instance.index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nuget_get:\n") pprint(api_response) except Exception as e: @@ -44181,8 +43558,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44214,7 +43590,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nvd_cpe_dictionary_get** -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -44241,10 +43617,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nvdcpe_di from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44279,8 +43655,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44290,7 +43665,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nvd-cpe-dictionary\" - api_response = api_instance.index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nvd_cpe_dictionary_get:\n") pprint(api_response) except Exception as e: @@ -44321,8 +43696,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44354,7 +43728,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nvidia_get** -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nvidia\" @@ -44381,10 +43755,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_security_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44419,8 +43793,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44430,7 +43803,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nvidia\" - api_response = api_instance.index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nvidia_get:\n") pprint(api_response) except Exception as e: @@ -44461,8 +43834,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44494,7 +43866,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nz_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nz-advisories\" @@ -44521,10 +43893,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_nz_adviso from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44559,8 +43931,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44570,7 +43941,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nz-advisories\" - api_response = api_instance.index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nz_advisories_get:\n") pprint(api_response) except Exception as e: @@ -44601,8 +43972,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44634,7 +44004,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_octopus_deploy_get** -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"octopus-deploy\" @@ -44661,10 +44031,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_octopus_d from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44699,8 +44069,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44710,7 +44079,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"octopus-deploy\" - api_response = api_instance.index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_octopus_deploy_get:\n") pprint(api_response) except Exception as e: @@ -44741,8 +44110,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44774,7 +44142,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_okta_get** -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"okta\" @@ -44801,10 +44169,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_okta_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44839,8 +44207,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44850,7 +44217,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"okta\" - api_response = api_instance.index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_okta_get:\n") pprint(api_response) except Exception as e: @@ -44881,8 +44248,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44914,7 +44280,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_omron_get** -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"omron\" @@ -44941,10 +44307,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_omron_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -44979,8 +44345,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44990,7 +44355,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"omron\" - api_response = api_instance.index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_omron_get:\n") pprint(api_response) except Exception as e: @@ -45021,8 +44386,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45054,7 +44418,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_one_e_get** -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"one-e\" @@ -45081,10 +44445,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_one_e_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45119,8 +44483,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45130,7 +44493,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"one-e\" - api_response = api_instance.index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_one_e_get:\n") pprint(api_response) except Exception as e: @@ -45161,8 +44524,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45194,7 +44556,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_opam_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"opam\" @@ -45221,10 +44583,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45259,8 +44621,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45270,7 +44631,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"opam\" - api_response = api_instance.index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_opam_get:\n") pprint(api_response) except Exception as e: @@ -45301,8 +44662,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45334,7 +44694,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_open_cvdb_get** -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"open-cvdb\" @@ -45361,10 +44721,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_cvdb from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45399,8 +44759,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45410,7 +44769,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"open-cvdb\" - api_response = api_instance.index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_open_cvdb_get:\n") pprint(api_response) except Exception as e: @@ -45441,8 +44800,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45474,7 +44832,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openbsd_get** -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openbsd\" @@ -45501,10 +44859,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_bsd_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45539,8 +44897,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45550,7 +44907,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openbsd\" - api_response = api_instance.index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openbsd_get:\n") pprint(api_response) except Exception as e: @@ -45581,8 +44938,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45614,7 +44970,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_opengear_get** -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"opengear\" @@ -45641,10 +44997,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_opengear_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45679,8 +45035,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45690,7 +45045,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"opengear\" - api_response = api_instance.index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_opengear_get:\n") pprint(api_response) except Exception as e: @@ -45721,8 +45076,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45754,7 +45108,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openjdk_get** -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openjdk\" @@ -45781,10 +45135,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_jdk_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45819,8 +45173,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45830,7 +45183,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openjdk\" - api_response = api_instance.index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openjdk_get:\n") pprint(api_response) except Exception as e: @@ -45861,8 +45214,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45894,7 +45246,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openssh_get** -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openssh\" @@ -45921,10 +45273,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_ssh_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -45959,8 +45311,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45970,7 +45321,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openssh\" - api_response = api_instance.index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openssh_get:\n") pprint(api_response) except Exception as e: @@ -46001,8 +45352,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46034,7 +45384,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openssl_secadv_get** -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openssl-secadv\" @@ -46061,10 +45411,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_ssl_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46099,8 +45449,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46110,7 +45459,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openssl-secadv\" - api_response = api_instance.index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openssl_secadv_get:\n") pprint(api_response) except Exception as e: @@ -46141,8 +45490,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46174,7 +45522,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openstack_get** -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openstack\" @@ -46201,10 +45549,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_open_stac from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46239,8 +45587,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46250,7 +45597,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openstack\" - api_response = api_instance.index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openstack_get:\n") pprint(api_response) except Exception as e: @@ -46281,8 +45628,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46314,7 +45660,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openwrt_get** -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openwrt\" @@ -46341,10 +45687,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wrt_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46379,8 +45725,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46390,7 +45735,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openwrt\" - api_response = api_instance.index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openwrt_get:\n") pprint(api_response) except Exception as e: @@ -46421,8 +45766,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46454,7 +45798,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_cpu_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -46481,10 +45825,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_oracle_cp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46519,8 +45863,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46530,7 +45873,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle-cpu-csaf\" - api_response = api_instance.index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_cpu_csaf_get:\n") pprint(api_response) except Exception as e: @@ -46561,8 +45904,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46594,7 +45936,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_cpu_get** -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle-cpu\" @@ -46621,10 +45963,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_oracle_cp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46659,8 +46001,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46670,7 +46011,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle-cpu\" - api_response = api_instance.index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_cpu_get:\n") pprint(api_response) except Exception as e: @@ -46701,8 +46042,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46734,7 +46074,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_get** -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle\" @@ -46761,10 +46101,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_meta_data from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46799,8 +46139,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46810,7 +46149,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle\" - api_response = api_instance.index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_get:\n") pprint(api_response) except Exception as e: @@ -46841,8 +46180,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46874,7 +46212,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_osv_get** -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"osv\" @@ -46901,10 +46239,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_osv_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -46939,8 +46277,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46950,7 +46287,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"osv\" - api_response = api_instance.index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_osv_get:\n") pprint(api_response) except Exception as e: @@ -46981,8 +46318,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47014,7 +46350,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_otrs_get** -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"otrs\" @@ -47041,10 +46377,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_otrs_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47079,8 +46415,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47090,7 +46425,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"otrs\" - api_response = api_instance.index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_otrs_get:\n") pprint(api_response) except Exception as e: @@ -47121,8 +46456,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47154,7 +46488,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_owncloud_get** -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"owncloud\" @@ -47181,10 +46515,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_own_cloud from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47219,8 +46553,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47230,7 +46563,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"owncloud\" - api_response = api_instance.index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_owncloud_get:\n") pprint(api_response) except Exception as e: @@ -47261,8 +46594,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47294,7 +46626,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_packetstorm_get** -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"packetstorm\" @@ -47321,10 +46653,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_packetsto from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47359,8 +46691,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47370,7 +46701,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"packetstorm\" - api_response = api_instance.index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_packetstorm_get:\n") pprint(api_response) except Exception as e: @@ -47401,8 +46732,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47434,7 +46764,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_palantir_get** -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"palantir\" @@ -47461,10 +46791,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_palantir_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47499,8 +46829,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47510,7 +46839,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"palantir\" - api_response = api_instance.index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_palantir_get:\n") pprint(api_response) except Exception as e: @@ -47541,8 +46870,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47574,7 +46902,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_palo_alto_get** -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"palo-alto\" @@ -47601,10 +46929,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_palo_alto from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47639,8 +46967,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47650,7 +46977,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"palo-alto\" - api_response = api_instance.index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_palo_alto_get:\n") pprint(api_response) except Exception as e: @@ -47681,8 +47008,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47714,7 +47040,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_panasonic_get** -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"panasonic\" @@ -47741,10 +47067,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_panasonic from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47779,8 +47105,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47790,7 +47115,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"panasonic\" - api_response = api_instance.index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_panasonic_get:\n") pprint(api_response) except Exception as e: @@ -47821,8 +47146,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47854,7 +47178,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_papercut_get** -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"papercut\" @@ -47881,10 +47205,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_paper_cut from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -47919,8 +47243,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47930,7 +47253,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"papercut\" - api_response = api_instance.index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_papercut_get:\n") pprint(api_response) except Exception as e: @@ -47961,8 +47284,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47994,7 +47316,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pega_get** -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pega\" @@ -48021,10 +47343,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_pega_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48059,8 +47381,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48070,7 +47391,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pega\" - api_response = api_instance.index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pega_get:\n") pprint(api_response) except Exception as e: @@ -48101,8 +47422,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48134,7 +47454,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_philips_get** -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"philips\" @@ -48161,10 +47481,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_philips_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48199,8 +47519,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48210,7 +47529,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"philips\" - api_response = api_instance.index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_philips_get:\n") pprint(api_response) except Exception as e: @@ -48241,8 +47560,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48274,7 +47592,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_phoenix_contact_get** -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"phoenix-contact\" @@ -48301,10 +47619,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_phoenix_c from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48339,8 +47657,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48350,7 +47667,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"phoenix-contact\" - api_response = api_instance.index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_phoenix_contact_get:\n") pprint(api_response) except Exception as e: @@ -48381,8 +47698,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48414,7 +47730,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_php_my_admin_get** -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"php-my-admin\" @@ -48441,10 +47757,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_phpmy_adm from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48479,8 +47795,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48490,7 +47805,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"php-my-admin\" - api_response = api_instance.index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_php_my_admin_get:\n") pprint(api_response) except Exception as e: @@ -48521,8 +47836,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48554,7 +47868,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pkcert_get** -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pkcert\" @@ -48581,10 +47895,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_pk_cert_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48619,8 +47933,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48630,7 +47943,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pkcert\" - api_response = api_instance.index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pkcert_get:\n") pprint(api_response) except Exception as e: @@ -48661,8 +47974,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48694,7 +48006,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_postgressql_get** -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"postgressql\" @@ -48721,10 +48033,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_postgres_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48759,8 +48071,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48770,7 +48081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"postgressql\" - api_response = api_instance.index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_postgressql_get:\n") pprint(api_response) except Exception as e: @@ -48801,8 +48112,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48834,7 +48144,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_powerdns_get** -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"powerdns\" @@ -48861,10 +48171,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_power_dns from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -48899,8 +48209,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48910,7 +48219,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"powerdns\" - api_response = api_instance.index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_powerdns_get:\n") pprint(api_response) except Exception as e: @@ -48941,8 +48250,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48974,7 +48282,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_progress_get** -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"progress\" @@ -49001,10 +48309,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_progress_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49039,8 +48347,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49050,7 +48357,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"progress\" - api_response = api_instance.index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_progress_get:\n") pprint(api_response) except Exception as e: @@ -49081,8 +48388,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49114,7 +48420,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_proofpoint_get** -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"proofpoint\" @@ -49141,10 +48447,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_proofpoin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49179,8 +48485,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49190,7 +48495,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"proofpoint\" - api_response = api_instance.index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_proofpoint_get:\n") pprint(api_response) except Exception as e: @@ -49221,8 +48526,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49254,7 +48558,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ptc_get** -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ptc\" @@ -49281,10 +48585,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ptc_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49319,8 +48623,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49330,7 +48633,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ptc\" - api_response = api_instance.index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ptc_get:\n") pprint(api_response) except Exception as e: @@ -49361,8 +48664,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49394,7 +48696,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pub_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pub\" @@ -49421,10 +48723,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49459,8 +48761,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49470,7 +48771,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pub\" - api_response = api_instance.index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pub_get:\n") pprint(api_response) except Exception as e: @@ -49501,8 +48802,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49534,7 +48834,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pure_storage_get** -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pure-storage\" @@ -49561,10 +48861,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_pure_stor from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49599,8 +48899,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49610,7 +48909,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pure-storage\" - api_response = api_instance.index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pure_storage_get:\n") pprint(api_response) except Exception as e: @@ -49641,8 +48940,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49674,7 +48972,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pypa_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pypa-advisories\" @@ -49701,10 +48999,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_py_pa_adv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49739,8 +49037,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49750,7 +49047,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pypa-advisories\" - api_response = api_instance.index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pypa_advisories_get:\n") pprint(api_response) except Exception as e: @@ -49781,8 +49078,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49814,7 +49110,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pypi_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pypi\" @@ -49841,10 +49137,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -49879,8 +49175,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49890,7 +49185,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pypi\" - api_response = api_instance.index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pypi_get:\n") pprint(api_response) except Exception as e: @@ -49921,8 +49216,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49954,7 +49248,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qnap_get** -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qnap\" @@ -49981,10 +49275,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qnap_advi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50019,8 +49313,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50030,7 +49323,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qnap\" - api_response = api_instance.index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qnap_get:\n") pprint(api_response) except Exception as e: @@ -50061,8 +49354,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50094,7 +49386,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qqids_get** -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qqids\" @@ -50121,10 +49413,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qqid_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50159,8 +49451,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50170,7 +49461,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qqids\" - api_response = api_instance.index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qqids_get:\n") pprint(api_response) except Exception as e: @@ -50201,8 +49492,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50234,7 +49524,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualcomm_get** -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualcomm\" @@ -50261,10 +49551,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualcomm_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50299,8 +49589,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50310,7 +49599,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualcomm\" - api_response = api_instance.index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualcomm_get:\n") pprint(api_response) except Exception as e: @@ -50341,8 +49630,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50374,7 +49662,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualys_get** -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualys\" @@ -50401,10 +49689,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50439,8 +49727,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50450,7 +49737,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualys\" - api_response = api_instance.index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualys_get:\n") pprint(api_response) except Exception as e: @@ -50481,8 +49768,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50514,7 +49800,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualys_qids_get** -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualys-qids\" @@ -50541,10 +49827,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qualys_qi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50579,8 +49865,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50590,7 +49875,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualys-qids\" - api_response = api_instance.index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualys_qids_get:\n") pprint(api_response) except Exception as e: @@ -50621,8 +49906,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50654,7 +49938,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qubes_qsb_get** -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qubes-qsb\" @@ -50681,10 +49965,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_qsb_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50719,8 +50003,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50730,7 +50013,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qubes-qsb\" - api_response = api_instance.index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qubes_qsb_get:\n") pprint(api_response) except Exception as e: @@ -50761,8 +50044,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50794,7 +50076,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ransomware_get** -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ransomware\" @@ -50821,10 +50103,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ransomwar from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50859,8 +50141,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50870,7 +50151,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ransomware\" - api_response = api_instance.index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ransomware_get:\n") pprint(api_response) except Exception as e: @@ -50901,8 +50182,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50934,7 +50214,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_red_lion_get** -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"red-lion\" @@ -50961,10 +50241,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_red_lion_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -50999,8 +50279,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51010,7 +50289,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"red-lion\" - api_response = api_instance.index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_red_lion_get:\n") pprint(api_response) except Exception as e: @@ -51041,8 +50320,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51074,7 +50352,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_redhat_cves_get** -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"redhat-cves\" @@ -51101,10 +50379,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_rhel_cve_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51139,8 +50417,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51150,7 +50427,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"redhat-cves\" - api_response = api_instance.index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_redhat_cves_get:\n") pprint(api_response) except Exception as e: @@ -51181,8 +50458,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51214,7 +50490,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_redhat_get** -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"redhat\" @@ -51241,10 +50517,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_redhat_cv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51279,8 +50555,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51290,7 +50565,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"redhat\" - api_response = api_instance.index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_redhat_get:\n") pprint(api_response) except Exception as e: @@ -51321,8 +50596,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51354,7 +50628,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_renesas_get** -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"renesas\" @@ -51381,10 +50655,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_renesas_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51419,8 +50693,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51430,7 +50703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"renesas\" - api_response = api_instance.index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_renesas_get:\n") pprint(api_response) except Exception as e: @@ -51461,8 +50734,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51494,7 +50766,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_revive_get** -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"revive\" @@ -51521,10 +50793,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_revive_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51559,8 +50831,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51570,7 +50841,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"revive\" - api_response = api_instance.index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_revive_get:\n") pprint(api_response) except Exception as e: @@ -51601,8 +50872,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51634,7 +50904,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_roche_get** -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"roche\" @@ -51661,10 +50931,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_roche_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51699,8 +50969,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51710,7 +50979,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"roche\" - api_response = api_instance.index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_roche_get:\n") pprint(api_response) except Exception as e: @@ -51741,8 +51010,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51774,7 +51042,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rockwell_get** -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rockwell\" @@ -51801,10 +51069,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_rockwell_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51839,8 +51107,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51850,7 +51117,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rockwell\" - api_response = api_instance.index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rockwell_get:\n") pprint(api_response) except Exception as e: @@ -51881,8 +51148,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51914,7 +51180,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_errata_get** -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky-errata\" @@ -51941,10 +51207,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_rocky_err from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -51979,8 +51245,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51990,7 +51255,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky-errata\" - api_response = api_instance.index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_errata_get:\n") pprint(api_response) except Exception as e: @@ -52021,8 +51286,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52054,7 +51318,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_get** -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiUpdatePaginatePagination index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky\" @@ -52081,10 +51345,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_update_paginat from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52119,8 +51383,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52130,7 +51393,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky\" - api_response = api_instance.index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_get:\n") pprint(api_response) except Exception as e: @@ -52161,8 +51424,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52194,7 +51456,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky-purls\" @@ -52221,10 +51483,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_purls_purl_respons from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52259,8 +51521,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52270,7 +51531,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky-purls\" - api_response = api_instance.index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_purls_get:\n") pprint(api_response) except Exception as e: @@ -52301,8 +51562,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52334,7 +51594,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rsync_get** -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rsync\" @@ -52361,10 +51621,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_rsync_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52399,8 +51659,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52410,7 +51669,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rsync\" - api_response = api_instance.index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rsync_get:\n") pprint(api_response) except Exception as e: @@ -52441,8 +51700,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52474,7 +51732,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ruckus_get** -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ruckus\" @@ -52501,10 +51759,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ruckus_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52539,8 +51797,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52550,7 +51807,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ruckus\" - api_response = api_instance.index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ruckus_get:\n") pprint(api_response) except Exception as e: @@ -52581,8 +51838,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52614,7 +51870,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rustsec_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rustsec-advisories\" @@ -52641,10 +51897,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_rustsec_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52679,8 +51935,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52690,7 +51945,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rustsec-advisories\" - api_response = api_instance.index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rustsec_advisories_get:\n") pprint(api_response) except Exception as e: @@ -52721,8 +51976,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52754,7 +52008,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sacert_get** -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sacert\" @@ -52781,10 +52035,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sa_adviso from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52819,8 +52073,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52830,7 +52083,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sacert\" - api_response = api_instance.index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sacert_get:\n") pprint(api_response) except Exception as e: @@ -52861,8 +52114,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52894,7 +52146,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_safran_get** -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"safran\" @@ -52921,10 +52173,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_safran_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -52959,8 +52211,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52970,7 +52221,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"safran\" - api_response = api_instance.index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_safran_get:\n") pprint(api_response) except Exception as e: @@ -53001,8 +52252,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53034,7 +52284,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_saint_get** -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"saint\" @@ -53061,10 +52311,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_saint_exp from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53099,8 +52349,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53110,7 +52359,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"saint\" - api_response = api_instance.index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_saint_get:\n") pprint(api_response) except Exception as e: @@ -53141,8 +52390,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53174,7 +52422,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_salesforce_get** -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"salesforce\" @@ -53201,10 +52449,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sales_for from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53239,8 +52487,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53250,7 +52497,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"salesforce\" - api_response = api_instance.index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_salesforce_get:\n") pprint(api_response) except Exception as e: @@ -53281,8 +52528,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53314,7 +52560,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_samba_get** -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"samba\" @@ -53341,10 +52587,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_samba_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53379,8 +52625,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53390,7 +52635,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"samba\" - api_response = api_instance.index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_samba_get:\n") pprint(api_response) except Exception as e: @@ -53421,8 +52666,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53454,7 +52698,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sandisk_get** -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sandisk\" @@ -53481,10 +52725,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sandisk_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53519,8 +52763,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53530,7 +52773,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sandisk\" - api_response = api_instance.index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sandisk_get:\n") pprint(api_response) except Exception as e: @@ -53561,8 +52804,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53594,7 +52836,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sans_dshield_get** -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sans-dshield\" @@ -53621,10 +52863,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sans_dshi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53659,8 +52901,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53670,7 +52911,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sans-dshield\" - api_response = api_instance.index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sans_dshield_get:\n") pprint(api_response) except Exception as e: @@ -53701,8 +52942,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53734,7 +52974,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sap_get** -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sap\" @@ -53761,10 +53001,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sap_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53799,8 +53039,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53810,7 +53049,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sap\" - api_response = api_instance.index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sap_get:\n") pprint(api_response) except Exception as e: @@ -53841,8 +53080,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53874,7 +53112,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_schneider_electric_get** -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"schneider-electric\" @@ -53901,10 +53139,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_schneider from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -53939,8 +53177,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53950,7 +53187,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"schneider-electric\" - api_response = api_instance.index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_schneider_electric_get:\n") pprint(api_response) except Exception as e: @@ -53981,8 +53218,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54014,7 +53250,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_schutzwerk_get** -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"schutzwerk\" @@ -54041,10 +53277,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_schutzwer from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54079,8 +53315,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54090,7 +53325,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"schutzwerk\" - api_response = api_instance.index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_schutzwerk_get:\n") pprint(api_response) except Exception as e: @@ -54121,8 +53356,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54154,7 +53388,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sec_consult_get** -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sec-consult\" @@ -54181,10 +53415,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sec_consu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54219,8 +53453,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54230,7 +53463,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sec-consult\" - api_response = api_instance.index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sec_consult_get:\n") pprint(api_response) except Exception as e: @@ -54261,8 +53494,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54294,7 +53526,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_securitylab_get** -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"securitylab\" @@ -54321,10 +53553,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_security_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54359,8 +53591,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54370,7 +53601,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"securitylab\" - api_response = api_instance.index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_securitylab_get:\n") pprint(api_response) except Exception as e: @@ -54401,8 +53632,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54434,7 +53664,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_seebug_get** -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"seebug\" @@ -54461,10 +53691,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_seebug_ex from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54499,8 +53729,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54510,7 +53739,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"seebug\" - api_response = api_instance.index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_seebug_get:\n") pprint(api_response) except Exception as e: @@ -54541,8 +53770,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54574,7 +53802,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sel_get** -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sel\" @@ -54601,10 +53829,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sel_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54639,8 +53867,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54650,7 +53877,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sel\" - api_response = api_instance.index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sel_get:\n") pprint(api_response) except Exception as e: @@ -54681,8 +53908,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54714,7 +53940,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sentinelone_get** -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sentinelone\" @@ -54741,10 +53967,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sentinel_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54779,8 +54005,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54790,7 +54015,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sentinelone\" - api_response = api_instance.index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sentinelone_get:\n") pprint(api_response) except Exception as e: @@ -54821,8 +54046,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54854,7 +54078,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_servicenow_get** -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"servicenow\" @@ -54881,10 +54105,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_service_n from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -54919,8 +54143,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54930,7 +54153,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"servicenow\" - api_response = api_instance.index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_servicenow_get:\n") pprint(api_response) except Exception as e: @@ -54961,8 +54184,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54994,7 +54216,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_shadowserver_exploited_get** -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"shadowserver-exploited\" @@ -55021,10 +54243,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_shadow_se from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55059,8 +54281,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55070,7 +54291,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"shadowserver-exploited\" - api_response = api_instance.index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_shadowserver_exploited_get:\n") pprint(api_response) except Exception as e: @@ -55101,8 +54322,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55134,7 +54354,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_shielder_get** -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"shielder\" @@ -55161,10 +54381,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_shielder_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55199,8 +54419,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55210,7 +54429,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"shielder\" - api_response = api_instance.index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_shielder_get:\n") pprint(api_response) except Exception as e: @@ -55241,8 +54460,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55274,7 +54492,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sick_get** -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sick\" @@ -55301,10 +54519,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sick_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55339,8 +54557,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55350,7 +54567,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sick\" - api_response = api_instance.index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sick_get:\n") pprint(api_response) except Exception as e: @@ -55381,8 +54598,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55414,7 +54630,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_siemens_get** -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"siemens\" @@ -55441,10 +54657,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_siemens_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55479,8 +54695,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55490,7 +54705,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"siemens\" - api_response = api_instance.index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_siemens_get:\n") pprint(api_response) except Exception as e: @@ -55521,8 +54736,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55554,7 +54768,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sierra_wireless_get** -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sierra-wireless\" @@ -55581,10 +54795,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sierra_wi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55619,8 +54833,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55630,7 +54843,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sierra-wireless\" - api_response = api_instance.index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sierra_wireless_get:\n") pprint(api_response) except Exception as e: @@ -55661,8 +54874,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55694,7 +54906,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sigmahq_sigma_rules_get** -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -55721,10 +54933,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sigma_rul from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55759,8 +54971,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55770,7 +54981,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sigmahq-sigma-rules\" - api_response = api_instance.index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sigmahq_sigma_rules_get:\n") pprint(api_response) except Exception as e: @@ -55801,8 +55012,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55834,7 +55044,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_singcert_get** -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"singcert\" @@ -55861,10 +55071,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sing_cert from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -55899,8 +55109,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55910,7 +55119,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"singcert\" - api_response = api_instance.index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_singcert_get:\n") pprint(api_response) except Exception as e: @@ -55941,8 +55150,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55974,7 +55182,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sitecore_get** -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sitecore\" @@ -56001,10 +55209,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sitecore_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56039,8 +55247,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56050,7 +55257,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sitecore\" - api_response = api_instance.index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sitecore_get:\n") pprint(api_response) except Exception as e: @@ -56081,8 +55288,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56114,7 +55320,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_slackware_get** -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"slackware\" @@ -56141,10 +55347,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_slackware from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56179,8 +55385,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56190,7 +55395,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"slackware\" - api_response = api_instance.index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_slackware_get:\n") pprint(api_response) except Exception as e: @@ -56221,8 +55426,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56254,7 +55458,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_solarwinds_get** -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"solarwinds\" @@ -56281,10 +55485,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_solar_win from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56319,8 +55523,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56330,7 +55533,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"solarwinds\" - api_response = api_instance.index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_solarwinds_get:\n") pprint(api_response) except Exception as e: @@ -56361,8 +55564,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56394,7 +55596,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_solr_get** -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"solr\" @@ -56421,10 +55623,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_solr_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56459,8 +55661,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56470,7 +55671,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"solr\" - api_response = api_instance.index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_solr_get:\n") pprint(api_response) except Exception as e: @@ -56501,8 +55702,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56534,7 +55734,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sonatype_get** -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sonatype\" @@ -56561,10 +55761,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sonatype_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56599,8 +55799,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56610,7 +55809,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sonatype\" - api_response = api_instance.index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sonatype_get:\n") pprint(api_response) except Exception as e: @@ -56641,8 +55840,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56674,7 +55872,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sonicwall_get** -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sonicwall\" @@ -56701,10 +55899,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sonic_wal from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56739,8 +55937,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56750,7 +55947,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sonicwall\" - api_response = api_instance.index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sonicwall_get:\n") pprint(api_response) except Exception as e: @@ -56781,8 +55978,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56814,7 +56010,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_spacelabs_healthcare_get** -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -56841,10 +56037,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_spacelabs from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -56879,8 +56075,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56890,7 +56085,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"spacelabs-healthcare\" - api_response = api_instance.index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_spacelabs_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -56921,8 +56116,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56954,7 +56148,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_splunk_get** -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"splunk\" @@ -56981,10 +56175,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_splunk_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57019,8 +56213,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57030,7 +56223,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"splunk\" - api_response = api_instance.index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_splunk_get:\n") pprint(api_response) except Exception as e: @@ -57061,8 +56254,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57094,7 +56286,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_spring_get** -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"spring\" @@ -57121,10 +56313,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_spring_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57159,8 +56351,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57170,7 +56361,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"spring\" - api_response = api_instance.index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_spring_get:\n") pprint(api_response) except Exception as e: @@ -57201,8 +56392,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57234,7 +56424,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ssd_get** -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ssd\" @@ -57261,10 +56451,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ssd_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57299,8 +56489,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57310,7 +56499,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ssd\" - api_response = api_instance.index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ssd_get:\n") pprint(api_response) except Exception as e: @@ -57341,8 +56530,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57374,7 +56562,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_stormshield_get** -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"stormshield\" @@ -57401,10 +56589,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_stormshie from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57439,8 +56627,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57450,7 +56637,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"stormshield\" - api_response = api_instance.index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_stormshield_get:\n") pprint(api_response) except Exception as e: @@ -57481,8 +56668,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57514,7 +56700,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_stryker_get** -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"stryker\" @@ -57541,10 +56727,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_stryker_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57579,8 +56765,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57590,7 +56775,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"stryker\" - api_response = api_instance.index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_stryker_get:\n") pprint(api_response) except Exception as e: @@ -57621,8 +56806,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57654,7 +56838,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sudo_get** -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sudo\" @@ -57681,10 +56865,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_sudo_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57719,8 +56903,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57730,7 +56913,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sudo\" - api_response = api_instance.index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sudo_get:\n") pprint(api_response) except Exception as e: @@ -57761,8 +56944,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57794,7 +56976,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_suse_get** -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"suse\" @@ -57821,10 +57003,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_cvrf_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57859,8 +57041,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57870,7 +57051,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"suse\" - api_response = api_instance.index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_suse_get:\n") pprint(api_response) except Exception as e: @@ -57901,8 +57082,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57934,7 +57114,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_suse_security_get** -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"suse-security\" @@ -57961,10 +57141,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_suse_secu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -57999,8 +57179,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58010,7 +57189,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"suse-security\" - api_response = api_instance.index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_suse_security_get:\n") pprint(api_response) except Exception as e: @@ -58041,8 +57220,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58074,7 +57252,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_swift_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"swift\" @@ -58101,10 +57279,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_oss_package_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58139,8 +57317,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58150,7 +57327,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"swift\" - api_response = api_instance.index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_swift_get:\n") pprint(api_response) except Exception as e: @@ -58181,8 +57358,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58214,7 +57390,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_swisslog_healthcare_get** -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"swisslog-healthcare\" @@ -58241,10 +57417,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_swisslog_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58279,8 +57455,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58290,7 +57465,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"swisslog-healthcare\" - api_response = api_instance.index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_swisslog_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -58321,8 +57496,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58354,7 +57528,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_symfony_get** -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"symfony\" @@ -58381,10 +57555,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_symfony_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58419,8 +57593,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58430,7 +57603,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"symfony\" - api_response = api_instance.index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_symfony_get:\n") pprint(api_response) except Exception as e: @@ -58461,8 +57634,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58494,7 +57666,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_synacktiv_get** -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"synacktiv\" @@ -58521,10 +57693,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_synacktiv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58559,8 +57731,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58570,7 +57741,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"synacktiv\" - api_response = api_instance.index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_synacktiv_get:\n") pprint(api_response) except Exception as e: @@ -58601,8 +57772,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58634,7 +57804,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_syncrosoft_get** -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"syncrosoft\" @@ -58661,10 +57831,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_syncro_so from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58699,8 +57869,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58710,7 +57879,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"syncrosoft\" - api_response = api_instance.index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_syncrosoft_get:\n") pprint(api_response) except Exception as e: @@ -58741,8 +57910,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58774,7 +57942,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_synology_get** -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"synology\" @@ -58801,10 +57969,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_synology_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58839,8 +58007,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58850,7 +58017,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"synology\" - api_response = api_instance.index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_synology_get:\n") pprint(api_response) except Exception as e: @@ -58881,8 +58048,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58914,7 +58080,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_syss_get** -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"syss\" @@ -58941,10 +58107,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_syss_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -58979,8 +58145,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58990,7 +58155,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"syss\" - api_response = api_instance.index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_syss_get:\n") pprint(api_response) except Exception as e: @@ -59021,8 +58186,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59054,7 +58218,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tailscale_get** -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tailscale\" @@ -59081,10 +58245,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tailscale from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59119,8 +58283,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59130,7 +58293,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tailscale\" - api_response = api_instance.index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tailscale_get:\n") pprint(api_response) except Exception as e: @@ -59161,8 +58324,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59194,7 +58356,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_teamviewer_get** -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"teamviewer\" @@ -59221,10 +58383,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_team_view from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59259,8 +58421,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59270,7 +58431,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"teamviewer\" - api_response = api_instance.index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_teamviewer_get:\n") pprint(api_response) except Exception as e: @@ -59301,8 +58462,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59334,7 +58494,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tenable_research_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tenable-research-advisories\" @@ -59361,10 +58521,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tenable_r from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59399,8 +58559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59410,7 +58569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tenable-research-advisories\" - api_response = api_instance.index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tenable_research_advisories_get:\n") pprint(api_response) except Exception as e: @@ -59441,8 +58600,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59474,7 +58632,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tencent_get** -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tencent\" @@ -59501,10 +58659,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tencent_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59539,8 +58697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59550,7 +58707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tencent\" - api_response = api_instance.index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tencent_get:\n") pprint(api_response) except Exception as e: @@ -59581,8 +58738,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59614,7 +58770,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_thales_get** -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"thales\" @@ -59641,10 +58797,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_thales_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59679,8 +58835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59690,7 +58845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"thales\" - api_response = api_instance.index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_thales_get:\n") pprint(api_response) except Exception as e: @@ -59721,8 +58876,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59754,7 +58908,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_themissinglink_get** -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"themissinglink\" @@ -59781,10 +58935,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_the_missi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59819,8 +58973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59830,7 +58983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"themissinglink\" - api_response = api_instance.index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_themissinglink_get:\n") pprint(api_response) except Exception as e: @@ -59861,8 +59014,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59894,7 +59046,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_thermo_fisher_get** -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"thermo-fisher\" @@ -59921,10 +59073,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_thermo_fi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -59959,8 +59111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59970,7 +59121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"thermo-fisher\" - api_response = api_instance.index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_thermo_fisher_get:\n") pprint(api_response) except Exception as e: @@ -60001,8 +59152,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60034,7 +59184,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_threat_actors_get** -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"threat-actors\" @@ -60061,10 +59211,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_threat_ac from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60099,8 +59249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60110,7 +59259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"threat-actors\" - api_response = api_instance.index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_threat_actors_get:\n") pprint(api_response) except Exception as e: @@ -60141,8 +59290,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60174,7 +59322,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ti_get** -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ti\" @@ -60201,10 +59349,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ti_pagina from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60239,8 +59387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60250,7 +59397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ti\" - api_response = api_instance.index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ti_get:\n") pprint(api_response) except Exception as e: @@ -60281,8 +59428,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60314,7 +59460,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tibco_get** -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tibco\" @@ -60341,10 +59487,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tibco_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60379,8 +59525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60390,7 +59535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tibco\" - api_response = api_instance.index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tibco_get:\n") pprint(api_response) except Exception as e: @@ -60421,8 +59566,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60454,7 +59598,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tp_link_get** -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tp-link\" @@ -60481,10 +59625,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tp_link_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60519,8 +59663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60530,7 +59673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tp-link\" - api_response = api_instance.index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tp_link_get:\n") pprint(api_response) except Exception as e: @@ -60561,8 +59704,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60594,7 +59736,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trane_technology_get** -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trane-technology\" @@ -60621,10 +59763,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_trane_tec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60659,8 +59801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60670,7 +59811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trane-technology\" - api_response = api_instance.index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trane_technology_get:\n") pprint(api_response) except Exception as e: @@ -60701,8 +59842,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60734,7 +59874,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trendmicro_get** -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trendmicro\" @@ -60761,10 +59901,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_trend_mic from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60799,8 +59939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60810,7 +59949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trendmicro\" - api_response = api_instance.index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trendmicro_get:\n") pprint(api_response) except Exception as e: @@ -60841,8 +59980,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60874,7 +60012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trustwave_get** -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trustwave\" @@ -60901,10 +60039,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_trustwave from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -60939,8 +60077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60950,7 +60087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trustwave\" - api_response = api_instance.index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trustwave_get:\n") pprint(api_response) except Exception as e: @@ -60981,8 +60118,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61014,7 +60150,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_twcert_get** -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"twcert\" @@ -61041,10 +60177,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_tw_cert_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61079,8 +60215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61090,7 +60225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"twcert\" - api_response = api_instance.index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_twcert_get:\n") pprint(api_response) except Exception as e: @@ -61121,8 +60256,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61154,7 +60288,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubiquiti_get** -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubiquiti\" @@ -61181,10 +60315,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ubiquiti_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61219,8 +60353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61230,7 +60363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubiquiti\" - api_response = api_instance.index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubiquiti_get:\n") pprint(api_response) except Exception as e: @@ -61261,8 +60394,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61294,7 +60426,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubuntu_get** -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubuntu\" @@ -61321,10 +60453,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_ubuntu_cv from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61359,8 +60491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61370,7 +60501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubuntu\" - api_response = api_instance.index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubuntu_get:\n") pprint(api_response) except Exception as e: @@ -61401,8 +60532,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61434,7 +60564,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubuntu_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubuntu-purls\" @@ -61461,10 +60591,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_purls_purl_respons from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61499,8 +60629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61510,7 +60639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubuntu-purls\" - api_response = api_instance.index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubuntu_purls_get:\n") pprint(api_response) except Exception as e: @@ -61541,8 +60670,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61574,7 +60702,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_unify_get** -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"unify\" @@ -61601,10 +60729,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_unify_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61639,8 +60767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61650,7 +60777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"unify\" - api_response = api_instance.index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_unify_get:\n") pprint(api_response) except Exception as e: @@ -61681,8 +60808,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61714,7 +60840,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_unisoc_get** -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"unisoc\" @@ -61741,10 +60867,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_unisoc_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61779,8 +60905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61790,7 +60915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"unisoc\" - api_response = api_instance.index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_unisoc_get:\n") pprint(api_response) except Exception as e: @@ -61821,8 +60946,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61854,7 +60978,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_usd_get** -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"usd\" @@ -61881,10 +61005,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_usd_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -61919,8 +61043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61930,7 +61053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"usd\" - api_response = api_instance.index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_usd_get:\n") pprint(api_response) except Exception as e: @@ -61961,8 +61084,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61994,7 +61116,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_usom_get** -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"usom\" @@ -62021,10 +61143,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_usom_advi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62059,8 +61181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62070,7 +61191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"usom\" - api_response = api_instance.index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_usom_get:\n") pprint(api_response) except Exception as e: @@ -62101,8 +61222,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62134,7 +61254,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vandyke_get** -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vandyke\" @@ -62161,10 +61281,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_van_dyke_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62199,8 +61319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62210,7 +61329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vandyke\" - api_response = api_instance.index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vandyke_get:\n") pprint(api_response) except Exception as e: @@ -62241,8 +61360,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62274,7 +61392,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vapidlabs_get** -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vapidlabs\" @@ -62301,10 +61419,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vapid_lab from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62339,8 +61457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62350,7 +61467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vapidlabs\" - api_response = api_instance.index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vapidlabs_get:\n") pprint(api_response) except Exception as e: @@ -62381,8 +61498,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62414,7 +61530,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vc_cpe_dictionary_get** -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -62441,10 +61557,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vccpe_dic from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62479,8 +61595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62490,7 +61605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vc-cpe-dictionary\" - api_response = api_instance.index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vc_cpe_dictionary_get:\n") pprint(api_response) except Exception as e: @@ -62521,8 +61636,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62554,7 +61668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vde_get** -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vde\" @@ -62581,10 +61695,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vde_advis from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62619,8 +61733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62630,7 +61743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vde\" - api_response = api_instance.index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vde_get:\n") pprint(api_response) except Exception as e: @@ -62661,8 +61774,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62694,7 +61806,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_veeam_get** -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"veeam\" @@ -62721,10 +61833,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_veeam_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62759,8 +61871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62770,7 +61881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"veeam\" - api_response = api_instance.index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_veeam_get:\n") pprint(api_response) except Exception as e: @@ -62801,8 +61912,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62834,7 +61944,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_veritas_get** -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"veritas\" @@ -62861,10 +61971,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_veritas_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -62899,8 +62009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62910,7 +62019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"veritas\" - api_response = api_instance.index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_veritas_get:\n") pprint(api_response) except Exception as e: @@ -62941,8 +62050,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62974,7 +62082,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_virtuozzo_get** -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"virtuozzo\" @@ -63001,10 +62109,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_virtuozzo from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63039,8 +62147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63050,7 +62157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"virtuozzo\" - api_response = api_instance.index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_virtuozzo_get:\n") pprint(api_response) except Exception as e: @@ -63081,8 +62188,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63114,7 +62220,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vlc_get** -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vlc\" @@ -63141,10 +62247,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vlc_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63179,8 +62285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63190,7 +62295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vlc\" - api_response = api_instance.index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vlc_get:\n") pprint(api_response) except Exception as e: @@ -63221,8 +62326,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63254,7 +62358,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vmware_get** -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vmware\" @@ -63281,10 +62385,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vm_ware_a from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63319,8 +62423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63330,7 +62433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vmware\" - api_response = api_instance.index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vmware_get:\n") pprint(api_response) except Exception as e: @@ -63361,8 +62464,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63394,7 +62496,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_voidsec_get** -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"voidsec\" @@ -63421,10 +62523,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_void_sec_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63459,8 +62561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63470,7 +62571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"voidsec\" - api_response = api_instance.index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_voidsec_get:\n") pprint(api_response) except Exception as e: @@ -63501,8 +62602,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63534,7 +62634,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries10d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -63561,10 +62661,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vuln_check_can from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63592,8 +62692,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63603,7 +62703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-10d\" - api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries10d_get:\n") pprint(api_response) except Exception as e: @@ -63627,8 +62727,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63660,7 +62760,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries30d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -63687,10 +62787,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vuln_check_can from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63718,8 +62818,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63729,7 +62829,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-30d\" - api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries30d_get:\n") pprint(api_response) except Exception as e: @@ -63753,8 +62853,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63786,7 +62886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries3d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -63813,10 +62913,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vuln_check_can from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63844,8 +62944,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63855,7 +62955,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-3d\" - api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries3d_get:\n") pprint(api_response) except Exception as e: @@ -63879,8 +62979,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63912,7 +63012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries90d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -63939,10 +63039,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vuln_check_can from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -63970,8 +63070,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63981,7 +63081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-90d\" - api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries90d_get:\n") pprint(api_response) except Exception as e: @@ -64005,8 +63105,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64038,7 +63138,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries\" @@ -64065,10 +63165,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vuln_check_can from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64096,8 +63196,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64107,7 +63207,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries\" - api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries_get:\n") pprint(api_response) except Exception as e: @@ -64131,8 +63231,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64164,7 +63264,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_config_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-config\" @@ -64191,10 +63291,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vuln_chec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64229,8 +63329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64240,7 +63339,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-config\" - api_response = api_instance.index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_config_get:\n") pprint(api_response) except Exception as e: @@ -64271,8 +63370,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64304,7 +63402,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_cvelist_v5_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -64331,10 +63429,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vuln_chec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64369,8 +63467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64380,7 +63477,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - api_response = api_instance.index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_cvelist_v5_get:\n") pprint(api_response) except Exception as e: @@ -64411,8 +63508,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64444,7 +63540,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck\" @@ -64471,10 +63567,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vuln_chec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64509,8 +63605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64520,7 +63615,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck\" - api_response = api_instance.index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_get:\n") pprint(api_response) except Exception as e: @@ -64551,8 +63646,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64584,7 +63678,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_kev_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-kev\" @@ -64611,10 +63705,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vuln_chec from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64649,8 +63743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64660,7 +63753,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-kev\" - api_response = api_instance.index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_kev_get:\n") pprint(api_response) except Exception as e: @@ -64691,8 +63784,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64724,7 +63816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_nvd2_get** -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -64751,10 +63843,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_nvd20_cve_exte from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64789,8 +63881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64800,7 +63891,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-nvd2\" - api_response = api_instance.index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_nvd2_get:\n") pprint(api_response) except Exception as e: @@ -64831,8 +63922,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64864,7 +63954,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_nvd_get** -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-nvd\" @@ -64891,10 +63981,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_cve_items_exte from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -64929,8 +64019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64940,7 +64029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-nvd\" - api_response = api_instance.index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_nvd_get:\n") pprint(api_response) except Exception as e: @@ -64971,8 +64060,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65004,7 +64092,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulnerability_aliases_get** -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulnerability-aliases\" @@ -65031,10 +64119,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_api_vulnerability_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65069,8 +64157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65080,7 +64167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulnerability-aliases\" - api_response = api_instance.index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulnerability_aliases_get:\n") pprint(api_response) except Exception as e: @@ -65111,8 +64198,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65144,7 +64230,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulnrichment_get** -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulnrichment\" @@ -65171,10 +64257,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vulnrichm from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65209,8 +64295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65220,7 +64305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulnrichment\" - api_response = api_instance.index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulnrichment_get:\n") pprint(api_response) except Exception as e: @@ -65251,8 +64336,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65284,7 +64368,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vyaire_get** -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vyaire\" @@ -65311,10 +64395,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_vyaire_ad from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65349,8 +64433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65360,7 +64443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vyaire\" - api_response = api_instance.index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vyaire_get:\n") pprint(api_response) except Exception as e: @@ -65391,8 +64474,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65424,7 +64506,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_watchguard_get** -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"watchguard\" @@ -65451,10 +64533,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_watch_gua from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65489,8 +64571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65500,7 +64581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"watchguard\" - api_response = api_instance.index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_watchguard_get:\n") pprint(api_response) except Exception as e: @@ -65531,8 +64612,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65564,7 +64644,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_whatsapp_get** -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"whatsapp\" @@ -65591,10 +64671,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_whats_app from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65629,8 +64709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65640,7 +64719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"whatsapp\" - api_response = api_instance.index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_whatsapp_get:\n") pprint(api_response) except Exception as e: @@ -65671,8 +64750,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65704,7 +64782,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wibu_get** -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wibu\" @@ -65731,10 +64809,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wibu_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65769,8 +64847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65780,7 +64857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wibu\" - api_response = api_instance.index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wibu_get:\n") pprint(api_response) except Exception as e: @@ -65811,8 +64888,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65844,7 +64920,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wireshark_get** -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wireshark\" @@ -65871,10 +64947,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wireshark from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -65909,8 +64985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65920,7 +64995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wireshark\" - api_response = api_instance.index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wireshark_get:\n") pprint(api_response) except Exception as e: @@ -65951,8 +65026,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65984,7 +65058,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_with_secure_get** -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"with-secure\" @@ -66011,10 +65085,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_with_secu from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66049,8 +65123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66060,7 +65133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"with-secure\" - api_response = api_instance.index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_with_secure_get:\n") pprint(api_response) except Exception as e: @@ -66091,8 +65164,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66124,7 +65196,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wolfi_get** -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wolfi\" @@ -66151,10 +65223,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wolfi_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66189,8 +65261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66200,7 +65271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wolfi\" - api_response = api_instance.index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wolfi_get:\n") pprint(api_response) except Exception as e: @@ -66231,8 +65302,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66264,7 +65334,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wolfssl_get** -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wolfssl\" @@ -66291,10 +65361,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wolf_ssl_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66329,8 +65399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66340,7 +65409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wolfssl\" - api_response = api_instance.index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wolfssl_get:\n") pprint(api_response) except Exception as e: @@ -66371,8 +65440,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66404,7 +65472,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wordfence_get** -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wordfence\" @@ -66431,10 +65499,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_wordfence from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66469,8 +65537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66480,7 +65547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wordfence\" - api_response = api_instance.index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wordfence_get:\n") pprint(api_response) except Exception as e: @@ -66511,8 +65578,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66544,7 +65610,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xen_get** -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xen\" @@ -66571,10 +65637,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_xen_pagin from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66609,8 +65675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66620,7 +65685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xen\" - api_response = api_instance.index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xen_get:\n") pprint(api_response) except Exception as e: @@ -66651,8 +65716,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66684,7 +65748,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xerox_get** -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xerox\" @@ -66711,10 +65775,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_xerox_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66749,8 +65813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66760,7 +65823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xerox\" - api_response = api_instance.index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xerox_get:\n") pprint(api_response) except Exception as e: @@ -66791,8 +65854,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66824,7 +65886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xiaomi_get** -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xiaomi\" @@ -66851,10 +65913,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_xiaomi_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -66889,8 +65951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66900,7 +65961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xiaomi\" - api_response = api_instance.index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xiaomi_get:\n") pprint(api_response) except Exception as e: @@ -66931,8 +65992,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66964,7 +66024,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xylem_get** -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xylem\" @@ -66991,10 +66051,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_xylem_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67029,8 +66089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67040,7 +66099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xylem\" - api_response = api_instance.index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xylem_get:\n") pprint(api_response) except Exception as e: @@ -67071,8 +66130,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67104,7 +66162,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yamaha_get** -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yamaha\" @@ -67131,10 +66189,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_yamaha_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67169,8 +66227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67180,7 +66237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yamaha\" - api_response = api_instance.index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yamaha_get:\n") pprint(api_response) except Exception as e: @@ -67211,8 +66268,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67244,7 +66300,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yokogawa_get** -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yokogawa\" @@ -67271,10 +66327,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_yokogawa_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67309,8 +66365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67320,7 +66375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yokogawa\" - api_response = api_instance.index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yokogawa_get:\n") pprint(api_response) except Exception as e: @@ -67351,8 +66406,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67384,7 +66438,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yubico_get** -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yubico\" @@ -67411,10 +66465,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_yubico_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67449,8 +66503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67460,7 +66513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yubico\" - api_response = api_instance.index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yubico_get:\n") pprint(api_response) except Exception as e: @@ -67491,8 +66544,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67524,7 +66576,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zdi_get** -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zdi\" @@ -67551,10 +66603,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zero_day_ from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67589,8 +66641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67600,7 +66651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zdi\" - api_response = api_instance.index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zdi_get:\n") pprint(api_response) except Exception as e: @@ -67631,8 +66682,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67664,7 +66714,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zebra_get** -> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zebra\" @@ -67691,10 +66741,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zebra_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67729,8 +66779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67740,7 +66789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zebra\" - api_response = api_instance.index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zebra_get:\n") pprint(api_response) except Exception as e: @@ -67771,8 +66820,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67804,7 +66852,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zeroscience_get** -> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zeroscience\" @@ -67831,10 +66879,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zero_scie from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -67869,8 +66917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67880,7 +66927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zeroscience\" - api_response = api_instance.index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zeroscience_get:\n") pprint(api_response) except Exception as e: @@ -67911,8 +66958,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67944,7 +66990,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zimbra_get** -> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zimbra\" @@ -67971,10 +67017,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zimbra_pa from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -68009,8 +67055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68020,7 +67065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zimbra\" - api_response = api_instance.index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zimbra_get:\n") pprint(api_response) except Exception as e: @@ -68051,8 +67096,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68084,7 +67128,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zoom_get** -> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zoom\" @@ -68111,10 +67155,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zoom_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -68149,8 +67193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68160,7 +67203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zoom\" - api_response = api_instance.index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zoom_get:\n") pprint(api_response) except Exception as e: @@ -68191,8 +67234,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68224,7 +67266,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zscaler_get** -> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zscaler\" @@ -68251,10 +67293,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zscaler_p from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -68289,8 +67331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68300,7 +67341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zscaler\" - api_response = api_instance.index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zscaler_get:\n") pprint(api_response) except Exception as e: @@ -68331,8 +67372,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68364,7 +67404,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zuso_get** -> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zuso\" @@ -68391,10 +67431,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zuso_pagi from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -68429,8 +67469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68440,7 +67479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zuso\" - api_response = api_instance.index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zuso_get:\n") pprint(api_response) except Exception as e: @@ -68471,8 +67510,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68504,7 +67542,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zyxel_get** -> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zyxel\" @@ -68531,10 +67569,10 @@ from vulncheck_sdk.models.render_response_with_metadata_array_advisory_zyxel_pag from vulncheck_sdk.rest import ApiException from pprint import pprint -# Defining the host is optional and defaults to /v3 +# Defining the host is optional and defaults to https://api.vulncheck.com/v3 # See configuration.py for a list of all supported configuration parameters. configuration = vulncheck_sdk.Configuration( - host = "/v3" + host = "https://api.vulncheck.com/v3" ) # The client must configure the authentication and authorization parameters @@ -68569,8 +67607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68580,7 +67617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zyxel\" - api_response = api_instance.index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zyxel_get:\n") pprint(api_response) except Exception as e: @@ -68611,8 +67648,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] diff --git a/docs/ModelsEntitlements.md b/docs/ModelsEntitlements.md index 6b929ad8..96853d86 100644 --- a/docs/ModelsEntitlements.md +++ b/docs/ModelsEntitlements.md @@ -1,5 +1,6 @@ # ModelsEntitlements +models.Entitlements ## Properties diff --git a/docs/PaginateMatch.md b/docs/PaginateMatch.md index 79af7bfc..a2827ac7 100644 --- a/docs/PaginateMatch.md +++ b/docs/PaginateMatch.md @@ -1,5 +1,6 @@ # PaginateMatch +paginate.Match ## Properties diff --git a/docs/PaginatePagination.md b/docs/PaginatePagination.md index 05215d03..99bf2feb 100644 --- a/docs/PaginatePagination.md +++ b/docs/PaginatePagination.md @@ -1,5 +1,6 @@ # PaginatePagination +paginate.Pagination ## Properties diff --git a/docs/PaginateParam.md b/docs/PaginateParam.md index 7c39d559..33b80ea7 100644 --- a/docs/PaginateParam.md +++ b/docs/PaginateParam.md @@ -1,5 +1,6 @@ # PaginateParam +paginate.Param ## Properties diff --git a/docs/ParamsIndexBackup.md b/docs/ParamsIndexBackup.md index 8cb14c19..07027610 100644 --- a/docs/ParamsIndexBackup.md +++ b/docs/ParamsIndexBackup.md @@ -1,5 +1,6 @@ # ParamsIndexBackup +params.IndexBackup ## Properties diff --git a/docs/ParamsIndexBackupList.md b/docs/ParamsIndexBackupList.md index 408a2e13..b458d930 100644 --- a/docs/ParamsIndexBackupList.md +++ b/docs/ParamsIndexBackupList.md @@ -1,5 +1,6 @@ # ParamsIndexBackupList +params.IndexBackupList ## Properties diff --git a/docs/ParamsIndexList.md b/docs/ParamsIndexList.md index 017ab008..bb87e72e 100644 --- a/docs/ParamsIndexList.md +++ b/docs/ParamsIndexList.md @@ -1,5 +1,6 @@ # ParamsIndexList +params.IndexList ## Properties diff --git a/docs/PurlBatchVulnFinding.md b/docs/PurlBatchVulnFinding.md index 76b7e89e..b60ef0c7 100644 --- a/docs/PurlBatchVulnFinding.md +++ b/docs/PurlBatchVulnFinding.md @@ -1,5 +1,6 @@ # PurlBatchVulnFinding +purl.BatchVulnFinding ## Properties @@ -7,7 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cves** | **List[str]** | list of associated CVE 's | [optional] **purl** | **str** | the purl, ex. hex/coherence@0.1.2 | [optional] -**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | meta-data about the purl | [optional] +**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | | [optional] **research_attributes** | [**ApiOSSPackageResearchAttributes**](ApiOSSPackageResearchAttributes.md) | | [optional] **vulnerabilities** | [**List[ApiOSSPackageVulnerability]**](ApiOSSPackageVulnerability.md) | list of associated vulnerabilities | [optional] diff --git a/docs/PurlPackageURLJSON.md b/docs/PurlPackageURLJSON.md index 31663664..96eee60f 100644 --- a/docs/PurlPackageURLJSON.md +++ b/docs/PurlPackageURLJSON.md @@ -1,5 +1,6 @@ # PurlPackageURLJSON +meta-data about the purl ## Properties diff --git a/docs/PurlQualifierJSON.md b/docs/PurlQualifierJSON.md index 6ed4b40a..591166fd 100644 --- a/docs/PurlQualifierJSON.md +++ b/docs/PurlQualifierJSON.md @@ -1,5 +1,6 @@ # PurlQualifierJSON +purl.QualifierJSON ## Properties diff --git a/docs/PurlsPurlResponse.md b/docs/PurlsPurlResponse.md index 7bf418e3..37ebf76f 100644 --- a/docs/PurlsPurlResponse.md +++ b/docs/PurlsPurlResponse.md @@ -1,11 +1,12 @@ # PurlsPurlResponse +purls.PurlResponse ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**artifacts** | **object** | | [optional] +**artifacts** | **object** | purls.Artifact | [optional] **cves** | **List[str]** | | [optional] **licenses** | **List[str]** | | [optional] **name** | **str** | | [optional] diff --git a/docs/PurlsVulnerability.md b/docs/PurlsVulnerability.md index ed9a4028..98b8f50b 100644 --- a/docs/PurlsVulnerability.md +++ b/docs/PurlsVulnerability.md @@ -1,5 +1,6 @@ # PurlsVulnerability +purls.Vulnerability ## Properties diff --git a/docs/RenderResponseArrayParamsIndexBackupList.md b/docs/RenderResponseArrayParamsIndexBackupList.md index f9b59fa8..e4832451 100644 --- a/docs/RenderResponseArrayParamsIndexBackupList.md +++ b/docs/RenderResponseArrayParamsIndexBackupList.md @@ -1,5 +1,6 @@ # RenderResponseArrayParamsIndexBackupList +render.Response-array_params_IndexBackupList ## Properties diff --git a/docs/RenderResponseArrayParamsIndexList.md b/docs/RenderResponseArrayParamsIndexList.md index d126b32a..4c78636b 100644 --- a/docs/RenderResponseArrayParamsIndexList.md +++ b/docs/RenderResponseArrayParamsIndexList.md @@ -1,5 +1,6 @@ # RenderResponseArrayParamsIndexList +render.Response-array_params_IndexList ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination.md index 288d1cb3..28eca6ce 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination +render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination.md index 19d549db..872ba1c3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination.md index c3723e16..aaec6522 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination +render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination.md index 6826d724..c87b6037 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination +render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination.md index 7ec4ce40..569f7f50 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination +render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination.md index 6ce87c50..54aed9e5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination +render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination.md index 76727d54..1d0b1a81 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination.md index 03050e4a..ad0e8415 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination +render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination.md index 79d9da13..4ccda55f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination +render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination.md index ca71b697..70ccfd67 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination +render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination.md index 7f6e64f0..9d0f3431 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination +render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination.md index c8484fe6..11a1c708 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination +render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination.md index 06745bd1..5498375c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination.md index 66dc1a52..fc5dd09f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination +render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination.md index 186fa9e3..a91683ca 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination.md index edd12bac..c99630ca 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination +render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination.md index 5e3c7f5e..d0910033 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination +render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination.md index 85a889c3..658f24c1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination +render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination.md index ff8e5a04..56cb63d5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination +render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination.md index e71472fe..c58a1a08 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination +render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination.md index f0242d98..c631e1fa 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination +render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination.md index 2dc3d1cc..f66bce0c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination +render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination.md index 96d5e8ce..7e02670d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination.md index 27c75ee1..a1d87b83 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination.md index bf1557a3..55abaf2c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination.md index f684f46c..2eccb3cf 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination.md index 664bcafc..fea72fa3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination.md index 30abe2e7..e49adfff 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination.md index 1739b162..a8dca001 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination.md index e2a669a1..095cede9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination.md index c4c48003..978a6a29 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination.md index da256a4e..539ff107 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination.md index 65903e77..58bd6748 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination.md index a8b7f619..99357f4f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination.md index 1ce7d61d..5bb2c336 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination.md index f12b6c90..9187d77e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination.md index 4ce1e40c..680e530c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination.md index ca54a981..1a2d8ca6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination.md index a8ae5c5b..0922cdde 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination.md index 4dc4e00f..cbb5b225 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination.md index db4cc2e8..85fd9b8a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination +render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination.md index f66a7ca7..21ed50e0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination.md index f5ce65d9..5e22eb5f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination.md index b4ec7fd3..17b82fb1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination.md index 44db6490..26899126 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination.md index e249b9a6..3898b725 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination.md index 9d502d1b..9f7cf9d3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination.md index f8f9a55a..44c55a49 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination +render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination.md index 253b9b59..dd659d5c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination +render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination.md index 6eb98f45..16e7c507 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination +render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination.md index 3ae08fc1..e0eb7c7b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination.md index cff9eb3b..b4aaa0ca 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination +render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination.md index e0a695fc..98c8a184 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination +render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination.md index 954a0864..3c20e051 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination +render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination.md index be91ae5c..fb5559e9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination +render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination.md index e32a103b..274b5588 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination +render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination.md index 5aff8eee..7be18ddb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination +render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination.md index 7b8282ad..f2650383 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination +render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination.md index da700d83..8107657f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination.md index c56fb925..1e28ec2e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination +render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination.md index d30b3e1a..bc3bdd1d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination +render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination.md index e67072bf..53dac7b9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination +render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination.md index f3514de9..f539eb62 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination +render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination.md index f90e20d3..20d2c7af 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination +render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination.md index 1270f851..9a018338 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination +render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination.md index 89bc20d8..cf6f6f8f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination +render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination.md index 9cb757f7..fc889c48 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination +render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination.md index 3c29a0d3..b90955ae 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination +render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination.md index c16dfec7..e16e8d59 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination.md index 5e110a1e..8b507b95 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination.md index 786b44f8..789e3a22 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination +render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination.md index 7303857a..b8f9b958 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination +render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination.md index 380e5389..7c7886d6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination.md index 9176cf20..7bab9de1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination.md index 797dbb4f..9b304ebb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination +render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination.md index 1b06de87..0e0f3828 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination.md index cb0259f4..dd4a14fc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination.md index 5916b397..0d3b5ca9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination +render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination.md index d28b3ee8..556ad28b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination +render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination.md index e28e23ba..d51f23ab 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination +render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination.md index c51b02ea..db5d2fba 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination +render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination.md index 5386dcf7..242c4d7c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination.md index 513ac0da..2b123430 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination.md index 01f70d73..ac536e8a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination +render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination.md index dcc606e4..be2be4d6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination.md index 1c49974d..bf5293c4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination +render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination.md index 6302a582..d645b64a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination.md index f2146fb0..af8ed0df 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination +render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination.md index ba3ffba1..bd1f1bee 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination +render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination.md index 59f2f277..d282efce 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination +render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination.md index 2f79fbec..1a0ed483 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination +render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination.md index ccef5e1b..f1a85e0a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination +render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination.md index 952544a3..e9e90e06 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination.md index b16fcec7..5e983e63 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination.md index 6fc6c55c..a05ba69c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination +render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination.md index 6f8b161b..32107875 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination +render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination.md index 01e5d570..82e38c6d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination.md index 770e1831..60daa7c4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination +render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination.md index 76cb2d63..15e1aabc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination +render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination.md index f9b832de..18086c50 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination +render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination.md index b080480b..d3dcf00a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination +render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination.md index e6b6ff60..5cc92f61 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination +render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination.md index 5779e5b6..50d5ff13 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination +render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination.md index 00f1812d..fca40749 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination +render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination.md index 38b5cc99..aa834bbb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination +render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination.md index 1ecc9518..c4f72f12 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination +render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination.md index 24de4aaa..b2753f88 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination.md index b4f1384a..8beda99d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination +render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination.md index e5bea6f7..95819952 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination +render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination.md index a8080a85..ff95e264 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination.md index dc66656b..a0c30ef6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination +render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination.md index e674fa42..98875506 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination +render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination.md index 3f5de3f1..bcb0a470 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination.md index e9fc9747..d5938236 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination.md index 439b44a1..c63c482f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination +render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination.md index 23191fb7..cfba1e28 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination +render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination.md index 47b340b8..0d52f85e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination +render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination.md index f22748a8..62a09fa1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination.md index 98e115ca..1418749f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination +render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination.md index 35502d01..42ca7aaa 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination +render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination.md index 39d71493..e705e35f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination +render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination.md index bbda35ce..25673134 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination +render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination.md index 77eb215b..f16eff2a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination +render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination.md index 9150d95c..69aa00bb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination +render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination.md index e19fe42a..4897b41a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination +render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination.md index 5888ef29..66fa09bf 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination +render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination.md index 44468d23..9d3102fb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination +render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination.md index dbb10acd..a3c685c5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination +render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination.md index d04ae323..29b21763 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination.md index 58ff9f1c..fc64b4a2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination +render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination.md index db383017..238f14a7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination.md index b2fa10e9..c620796c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination +render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination.md index b6bdcaf2..260953bb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination +render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination.md index f3367ab5..0a1ef581 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination +render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination.md index 418631b6..7a0f593f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination.md index 9be67bac..048bc02d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination +render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination.md index 079d8d2e..093a72c8 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination +render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination.md index ebe39951..edab4844 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination +render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination.md index 299de0f0..102ced12 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination +render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination.md index c5de9996..aae94efd 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination +render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination.md index 521b68a7..2ce3fb22 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination +render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination.md index a856a95e..b98ea8e4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination.md index d2a9c9c4..b14cf555 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination +render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination.md index abe0ddd6..7b37ba94 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination +render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination.md index be200df0..f76258d6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination +render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination.md index fee51523..e4151023 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination.md index 5ea7fff6..ac120ffd 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination +render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination.md index 3a2836cb..371fa21b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination +render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination.md index f56ae050..a33cc690 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination +render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination.md index f96a4f60..91168fbc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination +render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination.md index fd222698..8e6636b5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination +render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination.md index 59d6804b..fb2bbf7a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination +render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination.md index d207c4f9..e985dbee 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination +render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination.md index d03084f8..2ceabb03 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination +render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination.md index 415797cb..a07035f5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination +render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination.md index addfedfc..cb08d103 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination +render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination.md index 570180c8..a3d22734 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination +render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination.md index 57171831..ffda5def 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination +render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination.md index eb53f83b..e2476c4c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination +render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination.md index 414b8b63..96c5b7cf 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination.md index 1112a738..8b3b8627 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination +render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination.md index 707437bc..f5917d41 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination +render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination.md index ecf88a9f..75a72bc3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination +render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination.md index 4ea823a5..8cca4bc8 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination +render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination.md index 5a5d3165..aa769858 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination +render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination.md index e8d409ae..38a614da 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination.md index a7a0f6b3..f07874a2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination +render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination.md index 69f645e8..6f056929 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination +render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination.md index 20575fe8..293fd1d7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination +render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination.md index 9e162952..fb09cd4d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination +render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination.md index db76d6a1..7373a8d7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination +render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination.md index 8e8f479c..b2a915c2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination +render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination.md index cf444bdc..513f8f22 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination +render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination.md index 21a92802..ca2c8fb5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination.md index 9de38400..fb225bf4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination.md index e870aa92..c0f3d465 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination.md index 715619f9..7737cfec 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination.md index 401904e3..afe5c6ee 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination +render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination.md index 97976937..aa98c42e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination +render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination.md index d44466cf..59a6c9a0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination +render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination.md index ae3a05ba..bfdf91d9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination +render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination.md index 01811c28..855363f2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination +render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md index ef67f378..a75054ca 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination +render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md index 0bf5dac9..7c44b2f6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination +render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md index e880fba4..efe0dda1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination +render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md index 4ad425a1..533c6840 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination +render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md index c7edae43..bd607bd5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination +render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md index 036a6d15..a9a9a481 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination +render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md index 882da7c9..a5edf271 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination +render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination.md index 354e8dd8..52917afc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination +render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination.md index b5af6ecc..0d4ea72a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination +render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination.md index 780787bb..86b4c339 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination.md index 41ffad4c..e2dd0f26 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination.md index 1ef51d99..24c3f026 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination +render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination.md index 0913a7d2..2898401b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination +render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination.md index 632ee3a9..71aa541a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination +render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination.md index c3b02349..9d2c84d1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination +render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination.md index eb45e72c..17c8a0c5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination +render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination.md index 492a4c7d..efc9e2b0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination +render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination.md index ac8e3755..01b9fdd4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination +render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination.md index b1cc0d6e..9511f753 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination +render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination.md index 61b9da59..cca9b260 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination.md index 49e0eb0a..0678b882 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination +render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination.md index 53cda2da..f8d01d7a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination +render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination.md index 72c52433..611c0096 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination.md index f9e7c364..fabae64c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination +render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination.md index f1c68f80..6aaa63dc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination +render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination.md index 709719d5..b32679fb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination +render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination.md index 23a85b82..e23f41c3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination +render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination.md index 3a5813d2..992d50f0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination +render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination.md index 564cc4f3..3d71042c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination +render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination.md index 56161aa4..b3b3c79e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination +render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination.md index e7b7532b..f63cd0c4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination +render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination.md index 295e16ea..782c2a53 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination.md index 89d6be6b..500e5080 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination +render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination.md index c06e0c95..b777e16b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination +render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination.md index 127a84d0..ac3c2c7c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination +render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination.md index 1fc35c26..99c3f6e0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination +render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination.md index 337c35b8..25305bab 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination +render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination.md index 06566aed..72e7edb0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination +render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination.md index 7138920e..71463020 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination +render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination.md index ceb2c8e7..9b4c0019 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination +render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination.md index 7fdb3f37..b4fb0b02 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination.md index 3960f18e..86d8f7e5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination.md index d7dc04a1..fa7c1098 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination +render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination.md index e5b3c12c..d7c7f5b3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination +render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination.md index 750a1ddd..b40f5733 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination +render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination.md index 2a8e9bc0..86f3aa27 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination +render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination.md index 7c409bda..034f07e6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination +render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination.md index b25986a9..0827b247 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination.md index 1455fc66..c0f59ec0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination +render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination.md index 727bf762..b1955219 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination +render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination.md index 2bab0b3b..7633aa88 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination +render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination.md index 5394f96f..162e831b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination +render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination.md index 0c461639..1b3b2e37 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination +render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination.md index ebb5ea56..a1e8f9e1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination +render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination.md index 55e8b738..aaac2c0d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination.md index fe681982..7f413ec8 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination +render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination.md index 441913a7..6edd0963 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination +render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination.md index d54b0272..e1bc4559 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination +render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination.md index 5e6603ad..27e8c06b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination.md index 87261fda..da5d93e8 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination +render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination.md index 347e19a8..36e6fa56 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination +render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination.md index d5f0c8ef..ff1023e4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination +render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination.md index a54f5187..8b20cea9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination.md index 2975f8a8..2d20170e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination +render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination.md index e5d17d2c..57d1a83c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination +render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination.md index f5db4fdf..7784102b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination +render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination.md index bbb1dd01..5c8adae7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination +render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination.md index 04d9e62f..c7751b9b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination +render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination.md index 09dee9c9..0609bc9e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination +render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination.md index fbb06e75..ee380ae4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination +render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination.md index 7a30dca5..0b78b9c5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination +render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination.md index f34e1d59..641fd93f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination +render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination.md index 0702f78a..8a6d9cf6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination.md index e1b2f148..fa065d75 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination +render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination.md index 00e5fefc..0d43919e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination.md index a73f01c3..9a1d8768 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination.md index b576db5f..600b33ed 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination +render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination.md index ea13c574..0b894827 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination +render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination.md index bad9b52c..967ca981 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination +render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination.md index dd64fdd0..8adc7804 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination +render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination.md index 0bfcc71f..6a58dc6a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination +render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination.md index 0173a5c7..a6cd5655 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination +render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination.md index 5edccc79..9e92ceae 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination +render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination.md index efffb1af..20d8f460 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination +render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination.md index 44b12da0..084ac01e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination.md index 3f3fa089..a188a43f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination +render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination.md index 470c22a6..32c3f6ba 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination +render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination.md index a09e4ffa..8870d4a6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination +render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination.md index c6677b4d..7d40a1b2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination +render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination.md index 7dc01277..14285fd4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination +render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination.md index 0beb4bb7..a5ed76d0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination +render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination.md index 87e90c78..cf215c67 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination +render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination.md index a0eac680..c408572a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination +render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination.md index c8c05512..aaa86816 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination.md index cebc18f4..39bde7de 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination +render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination.md index ead3e033..8fb747b9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination +render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination.md index 0465c1ab..5ffabf4b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination +render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination.md index 233fd543..944ea811 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination +render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination.md index f6650860..013c4c3c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination +render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination.md index 8074109b..c36dd14d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination +render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination.md index 70abd76e..8a924eb4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination +render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination.md index 45254d29..fc11da9f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination +render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination.md index 490111fb..c0d31423 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination +render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination.md index 46dec6a4..8f8814f4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination +render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination.md index b79cdef9..0abc3b2b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination +render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination.md index 68ad0292..56a791e7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination +render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination.md index 8b3c8a9c..dc9c440a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination.md index ede86a8d..d1dce88e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination.md index 5bbece7a..c8ae7b14 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination.md index c73b0bae..7f31d364 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination.md index 1f234bfc..985ecfe5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination.md index 5a08a085..09ac5699 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination +render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination.md index 043cbf03..4da3e1f0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination +render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination.md index 31368d87..7a860846 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination +render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination.md index f6627217..2045930d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination +render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination.md index 6508419e..bb21e640 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination +render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination.md index 4877b1fd..3a4173b6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination +render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination.md index 5ec4a310..c7bfafb2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination +render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination.md index 6f8e426f..b4567ce2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination +render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination.md index 76601cba..770c2903 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination.md index 6374f34c..4f5d82b7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination +render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination.md index 22e854ff..015001b9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination.md index 3ac9cd35..065aed9b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination +render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination.md index 57c4a940..9d5bdc2d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination +render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination.md index b8a2878d..e4c22e16 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination +render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination.md index 0aa437b1..e7dceeea 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination.md index 5c62d7d9..ab7592f0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination.md index e7f1f883..0f88419f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination +render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination.md index a4352a60..d51dbb14 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination +render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination.md index c05dc4b2..2f1ab406 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination +render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination.md index 0d1d53cf..e05ea19d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination +render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination.md index deab9433..2cac9e58 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination +render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination.md index 3be5e593..5f9d546a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination.md index c825bd0d..f51b4b9c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination.md index 53007949..bc1ac484 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination +render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination.md index 4fb1e0fa..726dd3ef 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination +render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination.md index d5558ded..f8e23c6a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination +render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md index c48ac412..a7a99890 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination +render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md index c80d1c0f..b010b965 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination +render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md index 4810b1c5..636318f4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md index 4b8d6228..2674546d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination +render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md index 1f0a445f..8120a07a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination +render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md index 7c54e232..a4225833 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination +render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md index 54b50372..6d265cda 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination +render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination.md index 4d854827..e6c42302 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination +render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination.md index 559ceff2..fbd8ea31 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination +render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination.md index a1510ce8..d1b16237 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination +render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination.md index 2653a54f..f3580b61 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination +render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination.md index 409feb21..a18d8918 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination +render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination.md index 4012aa2c..b42cd39d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination +render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination.md index db3eaa96..681f08d2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination.md index babe4db5..afd8946e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination.md index 0c4a79f7..d3bb8f01 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination +render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination.md index 96a6938d..a7e4b33d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination +render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination.md index 92197f89..d1048790 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination.md index a543a0d9..9c534d66 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination +render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination.md index 1c407034..646ff14d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination.md index 67ba6b5a..721b2549 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination +render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination.md index ec4fefc4..63ed2a1a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination +render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination.md index ef9ab9a5..68fc3cf9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination +render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination.md index eb433543..5b97b2fd 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination +render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination.md index 5175f7f6..a32b2c71 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination.md index 3281886e..2887dba9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination +render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination.md index 224e2e91..7f6da347 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination +render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination.md index c7bb85dd..8ca13a96 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination +render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination.md index 1f7081fb..91009323 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination +render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySelPaginatePagination.md index 0ff87d5a..f78e4aab 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySelPaginatePagination +render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination.md index b3657f5d..1ba1b78b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination +render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination.md index ae995e3b..c5a08d26 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination +render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination.md index f2ffd5a8..96ee6aa1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination +render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination.md index 1b8b3f4f..dc0b84e8 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination +render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination.md index 96160749..601908b3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination +render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySickPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySickPaginatePagination.md index 47b7ba84..253d3a84 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySickPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySickPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySickPaginatePagination +render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination.md index b0020943..f1e4b2dd 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination.md index e7dcdaf4..3b6d4888 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination +render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination.md index 0742e52f..f8bf9a19 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination +render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination.md index 37e835e8..a6f998d4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination +render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination.md index aa90a995..1ac13f88 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination +render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination.md index aab715fa..a1e5336a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination +render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination.md index 9b677614..817df594 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination.md index d7b01283..c2afdda5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination +render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination.md index 1709fc8b..eb5c5b3f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination +render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination.md index df98e80a..427745ba 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination.md index 17d6d8f5..081dbb9f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination.md index 3d9ace1d..89e9772c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination +render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination.md index 1f45099a..97984eaa 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination +render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination.md index 9259dc05..e9af53ce 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination +render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination.md index cb775ff9..fd0fe641 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination.md index fe877020..25402aa6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination +render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination.md index cec27215..da2af976 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination +render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination.md index 22df711f..cc7ad5d6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination.md index 484916e4..bdf4af38 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination +render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination.md index ba67c00b..dfa1fb9a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination +render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination.md index 606a5e32..37d7090c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination +render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination.md index c8bcc3a1..4020b5b6 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination +render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination.md index ddd9605e..b807be31 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination +render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination.md index f467e4be..4d8ca78e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination +render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination.md index b2580c7b..012b86bd 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination +render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination.md index 9dd5dbcc..1ca34329 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination.md index 1710a858..2279c5a4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination +render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination.md index 05a68c47..3861c572 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination.md index 193c12e8..4cc5d866 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination +render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination.md index 1479af3e..1d933cbc 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination.md index f828052b..557eafe1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination +render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination.md index 1b6293b7..336d0b63 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination +render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination.md index 4194abb5..67c35527 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination +render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination.md index 8bcb3429..3353db1e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination +render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination.md index 195a5481..347f028c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination +render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination.md index e1d19aed..82be9bb7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination +render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination.md index 7b3ee402..541d4baa 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination +render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination.md index e3584b21..8ad6e36b 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination +render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination.md index df16e73b..620b45b0 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination +render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination.md index 22dc45fe..2537cac5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination +render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination.md index 5f590912..fdb6f825 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination.md index 0444bca5..47dac128 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination +render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination.md index 12334947..1ecbe7e7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination +render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination.md index fb48d305..e28cbdf9 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination +render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination.md index e20d2dde..aa1c15d4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination +render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination.md index 54c5fc37..19cdb590 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination +render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination.md index 1e19cb75..77f75bd1 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination +render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination.md index fa992da6..22c2353c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination +render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination.md index e6afa87f..27143364 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination.md index 44aa9638..27228360 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination +render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination.md index ffed1f8c..b0c89fdb 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination.md index f497f3c8..5b4e5730 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination.md index 5801b448..68455791 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination +render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination.md index 1b856c26..e4228968 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination.md index 6fc9c7c6..a34471d3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination +render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination.md index d7548c26..d7f691a4 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination +render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination.md index b1da0c25..e7fb9621 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination +render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination.md index cbb31dda..6e13ddba 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination +render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination.md index 43c8f58d..ac0070b2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination +render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination.md index 637d364f..136a3b93 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination +render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination.md index fa82fc28..5646ce50 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination +render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination.md index d0ce6d06..ca589e84 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination +render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination.md index a74402f5..2bc2885a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination +render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination.md index 35698627..6e7a2a81 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination +render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination.md index 38440ce7..f18b6733 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination +render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination.md index c8e8e4b0..ec40145d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination +render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination.md index 04004fa8..82ed2468 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination +render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination.md index 547bd6dc..2880c1c5 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination +render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination.md index 6759f226..b35e0ec3 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination +render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination.md index 89912ca2..f40c5d96 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination +render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination.md index c47f87db..9af11e9c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination +render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination.md index a7d44033..2d8eac37 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination +render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination.md index 4a5f1c39..18615ebf 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination +render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination.md index aaa9033a..efb9a781 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination +render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination.md index 2415231c..d882f932 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination +render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination.md index 10c1cf60..030ad126 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination +render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination.md index f315d75a..ee4b7952 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination +render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination.md index 077958da..0e281854 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination +render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination.md index 04081bc8..a5ccc39c 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination.md index 6a2fd015..6cb8ec9e 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination +render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination.md index bbc16982..98139a3a 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination +render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination.md index 640938e4..72d477f7 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination.md index 70f555d5..c76188e2 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination +render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination.md index 85818ee7..182f180d 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination +render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination.md index 20bd9d77..6cc02122 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination +render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination.md index caa2ec3e..c5045a20 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination +render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination.md index 63e6d195..8d25c763 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination +render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination.md b/docs/RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination.md index 0d4f22d5..1eaa957f 100644 --- a/docs/RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination +render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiCWEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiCWEPaginatePagination.md index d47bd758..d367ea40 100644 --- a/docs/RenderResponseWithMetadataArrayApiCWEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiCWEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiCWEPaginatePagination +render.ResponseWithMetadata-array_api_CWE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination.md index 3ea21656..e4ff6ae8 100644 --- a/docs/RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination +render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiCveItemsPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiCveItemsPaginatePagination.md index c541581c..44a8e271 100644 --- a/docs/RenderResponseWithMetadataArrayApiCveItemsPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiCveItemsPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiCveItemsPaginatePagination +render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination.md index 876b8d90..1220f1e2 100644 --- a/docs/RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination +render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiExploitChainPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiExploitChainPaginatePagination.md index 8c8a21b9..440660cc 100644 --- a/docs/RenderResponseWithMetadataArrayApiExploitChainPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiExploitChainPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiExploitChainPaginatePagination +render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination.md index 6eaee6df..adf28394 100644 --- a/docs/RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination +render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination.md index fe2def33..519fb8d8 100644 --- a/docs/RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination +render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination.md index f954eb2a..56472132 100644 --- a/docs/RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination +render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination.md index c9ea6660..1b96d168 100644 --- a/docs/RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination +render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination.md index 7b08a599..d803f275 100644 --- a/docs/RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination +render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination.md index a176cc31..0fa01d9b 100644 --- a/docs/RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination +render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination.md index e07092d2..03673d85 100644 --- a/docs/RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination +render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination.md index 9623e2b6..1e878b5d 100644 --- a/docs/RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination +render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiUpdatePaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiUpdatePaginatePagination.md index 7ffb2ce2..4a2540bd 100644 --- a/docs/RenderResponseWithMetadataArrayApiUpdatePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiUpdatePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiUpdatePaginatePagination +render.ResponseWithMetadata-array_api_Update-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination.md index c70232e0..8d67b446 100644 --- a/docs/RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination +render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination.md b/docs/RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination.md index e7bf0243..f103f733 100644 --- a/docs/RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination +render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination.md b/docs/RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination.md index 4e801853..d9036186 100644 --- a/docs/RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination.md +++ b/docs/RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination +render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination ## Properties diff --git a/docs/RenderResponseWithMetadataArrayStringV3controllersResponseMetadata.md b/docs/RenderResponseWithMetadataArrayStringV3controllersResponseMetadata.md index 4a76d3d9..f22f6363 100644 --- a/docs/RenderResponseWithMetadataArrayStringV3controllersResponseMetadata.md +++ b/docs/RenderResponseWithMetadataArrayStringV3controllersResponseMetadata.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataArrayStringV3controllersResponseMetadata +render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata ## Properties diff --git a/docs/RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata.md b/docs/RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata.md index 81dab433..6639e114 100644 --- a/docs/RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata.md +++ b/docs/RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata +render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata ## Properties diff --git a/docs/RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata.md b/docs/RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata.md index 31be2711..ff907f8b 100644 --- a/docs/RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata.md +++ b/docs/RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata +render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata ## Properties diff --git a/docs/RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata.md b/docs/RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata.md index 2e8dde23..ccfec6dc 100644 --- a/docs/RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata.md +++ b/docs/RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata.md @@ -1,5 +1,6 @@ # RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata +render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata ## Properties diff --git a/docs/SearchErrorResponse.md b/docs/SearchErrorResponse.md new file mode 100644 index 00000000..ee4abc2d --- /dev/null +++ b/docs/SearchErrorResponse.md @@ -0,0 +1,31 @@ +# SearchErrorResponse + +search.ErrorResponse + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**error** | **bool** | | [optional] +**errors** | **List[str]** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.search_error_response import SearchErrorResponse + +# TODO update the JSON string below +json = "{}" +# create an instance of SearchErrorResponse from a JSON string +search_error_response_instance = SearchErrorResponse.from_json(json) +# print the JSON string representation of the object +print(SearchErrorResponse.to_json()) + +# convert the object into a dict +search_error_response_dict = search_error_response_instance.to_dict() +# create an instance of SearchErrorResponse from a dict +search_error_response_from_dict = SearchErrorResponse.from_dict(search_error_response_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SearchV4AdvisoryMeta.md b/docs/SearchV4AdvisoryMeta.md new file mode 100644 index 00000000..2f56d8f5 --- /dev/null +++ b/docs/SearchV4AdvisoryMeta.md @@ -0,0 +1,36 @@ +# SearchV4AdvisoryMeta + +search.V4AdvisoryMeta + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cursor** | **str** | | [optional] +**filtered** | **int** | | [optional] +**limit** | **int** | | [optional] +**next_cursor** | **str** | | [optional] +**page** | **int** | | [optional] +**pages** | **int** | | [optional] +**total** | **int** | | [optional] + +## Example + +```python +from vulncheck_sdk.models.search_v4_advisory_meta import SearchV4AdvisoryMeta + +# TODO update the JSON string below +json = "{}" +# create an instance of SearchV4AdvisoryMeta from a JSON string +search_v4_advisory_meta_instance = SearchV4AdvisoryMeta.from_json(json) +# print the JSON string representation of the object +print(SearchV4AdvisoryMeta.to_json()) + +# convert the object into a dict +search_v4_advisory_meta_dict = search_v4_advisory_meta_instance.to_dict() +# create an instance of SearchV4AdvisoryMeta from a dict +search_v4_advisory_meta_from_dict = SearchV4AdvisoryMeta.from_dict(search_v4_advisory_meta_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SearchV4AdvisoryReturnValue.md b/docs/SearchV4AdvisoryReturnValue.md new file mode 100644 index 00000000..8b4f80cd --- /dev/null +++ b/docs/SearchV4AdvisoryReturnValue.md @@ -0,0 +1,31 @@ +# SearchV4AdvisoryReturnValue + +search.V4AdvisoryReturnValue + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**meta** | [**SearchV4AdvisoryMeta**](SearchV4AdvisoryMeta.md) | | [optional] +**data** | [**List[AdvisoryMitreCVEListV5Ref]**](AdvisoryMitreCVEListV5Ref.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue + +# TODO update the JSON string below +json = "{}" +# create an instance of SearchV4AdvisoryReturnValue from a JSON string +search_v4_advisory_return_value_instance = SearchV4AdvisoryReturnValue.from_json(json) +# print the JSON string representation of the object +print(SearchV4AdvisoryReturnValue.to_json()) + +# convert the object into a dict +search_v4_advisory_return_value_dict = search_v4_advisory_return_value_instance.to_dict() +# create an instance of SearchV4AdvisoryReturnValue from a dict +search_v4_advisory_return_value_from_dict = SearchV4AdvisoryReturnValue.from_dict(search_v4_advisory_return_value_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AdvisoryCWENode.md b/docs/SearchV4FeedItem.md similarity index 50% rename from docs/AdvisoryCWENode.md rename to docs/SearchV4FeedItem.md index 230e55c5..7f414eba 100644 --- a/docs/AdvisoryCWENode.md +++ b/docs/SearchV4FeedItem.md @@ -1,31 +1,31 @@ -# AdvisoryCWENode +# SearchV4FeedItem +search.V4FeedItem ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**cweid** | **str** | | [optional] **description** | **str** | | [optional] -**id** | **str** | | [optional] +**href** | **str** | | [optional] **name** | **str** | | [optional] ## Example ```python -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode +from vulncheck_sdk.models.search_v4_feed_item import SearchV4FeedItem # TODO update the JSON string below json = "{}" -# create an instance of AdvisoryCWENode from a JSON string -advisory_cwe_node_instance = AdvisoryCWENode.from_json(json) +# create an instance of SearchV4FeedItem from a JSON string +search_v4_feed_item_instance = SearchV4FeedItem.from_json(json) # print the JSON string representation of the object -print(AdvisoryCWENode.to_json()) +print(SearchV4FeedItem.to_json()) # convert the object into a dict -advisory_cwe_node_dict = advisory_cwe_node_instance.to_dict() -# create an instance of AdvisoryCWENode from a dict -advisory_cwe_node_from_dict = AdvisoryCWENode.from_dict(advisory_cwe_node_dict) +search_v4_feed_item_dict = search_v4_feed_item_instance.to_dict() +# create an instance of SearchV4FeedItem from a dict +search_v4_feed_item_from_dict = SearchV4FeedItem.from_dict(search_v4_feed_item_dict) ``` [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/SearchV4ListFeedReturnValue.md b/docs/SearchV4ListFeedReturnValue.md new file mode 100644 index 00000000..00d62315 --- /dev/null +++ b/docs/SearchV4ListFeedReturnValue.md @@ -0,0 +1,30 @@ +# SearchV4ListFeedReturnValue + +search.V4ListFeedReturnValue + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**data** | [**List[SearchV4FeedItem]**](SearchV4FeedItem.md) | | [optional] + +## Example + +```python +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue + +# TODO update the JSON string below +json = "{}" +# create an instance of SearchV4ListFeedReturnValue from a JSON string +search_v4_list_feed_return_value_instance = SearchV4ListFeedReturnValue.from_json(json) +# print the JSON string representation of the object +print(SearchV4ListFeedReturnValue.to_json()) + +# convert the object into a dict +search_v4_list_feed_return_value_dict = search_v4_list_feed_return_value_instance.to_dict() +# create an instance of SearchV4ListFeedReturnValue from a dict +search_v4_list_feed_return_value_from_dict = SearchV4ListFeedReturnValue.from_dict(search_v4_list_feed_return_value_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/V3controllersBackupResponseMetadata.md b/docs/V3controllersBackupResponseMetadata.md index e25015fd..8a905b66 100644 --- a/docs/V3controllersBackupResponseMetadata.md +++ b/docs/V3controllersBackupResponseMetadata.md @@ -1,5 +1,6 @@ # V3controllersBackupResponseMetadata +v3controllers.BackupResponseMetadata ## Properties diff --git a/docs/V3controllersPurlResponseData.md b/docs/V3controllersPurlResponseData.md index 826e9cf4..05d89adf 100644 --- a/docs/V3controllersPurlResponseData.md +++ b/docs/V3controllersPurlResponseData.md @@ -1,5 +1,6 @@ # V3controllersPurlResponseData +v3controllers.PurlResponseData ## Properties diff --git a/docs/V3controllersPurlResponseMetadata.md b/docs/V3controllersPurlResponseMetadata.md index 276e97e8..2c3c7477 100644 --- a/docs/V3controllersPurlResponseMetadata.md +++ b/docs/V3controllersPurlResponseMetadata.md @@ -1,11 +1,12 @@ # V3controllersPurlResponseMetadata +v3controllers.PurlResponseMetadata ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | meta-data about the purl | [optional] +**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | | [optional] **timestamp** | **str** | time of the transaction | [optional] **total_documents** | **int** | number of results found | [optional] diff --git a/docs/V3controllersPurlsResponseMetadata.md b/docs/V3controllersPurlsResponseMetadata.md index 0f35021a..90246bab 100644 --- a/docs/V3controllersPurlsResponseMetadata.md +++ b/docs/V3controllersPurlsResponseMetadata.md @@ -1,5 +1,6 @@ # V3controllersPurlsResponseMetadata +v3controllers.PurlsResponseMetadata ## Properties diff --git a/docs/V3controllersResponseMetadata.md b/docs/V3controllersResponseMetadata.md index 6ed5f134..95dfb10e 100644 --- a/docs/V3controllersResponseMetadata.md +++ b/docs/V3controllersResponseMetadata.md @@ -1,5 +1,6 @@ # V3controllersResponseMetadata +v3controllers.ResponseMetadata ## Properties diff --git a/openapi.json b/openapi.json index 0367eabe..c888d97d 100644 --- a/openapi.json +++ b/openapi.json @@ -1 +1 @@ -{"basePath":"/v3","definitions":{"advisory.A10":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"reference":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array"},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.VulnrichmentMetric"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"description":"OK","items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"description":"OK","items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"description":"OK","items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"allOf":[{"$ref":"#/definitions/advisory.MProviderMetadata"}],"description":"OK"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"description":"OK","items":{"type":"string"},"type":"array"},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"properties":{"name":{"items":{"$ref":"#/definitions/advisory.IVal"},"type":"array"},"url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Acronis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"properties":{"adobe_cves":{"items":{"$ref":"#/definitions/advisory.AdobeCVE"},"type":"array"},"affected":{"items":{"$ref":"#/definitions/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/definitions/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/definitions/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"properties":{"bugzilla":{"$ref":"#/definitions/advisory.Bugzilla"},"cve":{"$ref":"#/definitions/advisory.OvalCVE"},"issued":{"$ref":"#/definitions/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array"},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/definitions/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.Range"},"type":"array"},"severity":{"items":{"$ref":"#/definitions/advisory.Severity"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AffectedChrome":{"properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRepository"},"type":"array"},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"properties":{"break_commit_url":{"items":{"type":"string"},"type":"array"},"fix_commit_url":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/definitions/advisory.UbuntuPackageReleaseStatus"},"type":"array"},"upstream_fix_url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AlephResearch":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"properties":{"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"properties":{"bs_repo_id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/definitions/advisory.AlmaDate"},"pkglist":{"$ref":"#/definitions/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AlmaReference"},"type":"array"},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/definitions/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlmaPackage"},"type":"array"},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDBPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecurityFix"},"type":"array"}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AmazonAffectedPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"override":{"$ref":"#/definitions/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AndroidAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AndroidReference"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.EcoSystem"},"package":{"$ref":"#/definitions/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.AndroidRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AndroidEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.AndroidEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.ApacheSubversion":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"properties":{"components":{"items":{"$ref":"#/definitions/advisory.AppleComponent"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"properties":{"bdu":{"items":{"type":"string"},"type":"array"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"properties":{"affected_version":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.AtlassianProducts"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Audiocodes":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/definitions/advisory.PrimeVersion"},"type":"array"},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/definitions/advisory.ZuluVersion"},"type":"array"}},"type":"object"},"advisory.BBraunAdvisory":{"properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BDUAdvisory":{"properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.BDUCvss"},"cvss3":{"$ref":"#/definitions/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/definitions/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array"},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/definitions/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"properties":{"os":{"$ref":"#/definitions/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/definitions/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"properties":{"soft":{"$ref":"#/definitions/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BeckmanCoulter":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/definitions/advisory.ProductsAffected"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.Bugzilla":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array"},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"properties":{"changed":{"items":{"type":"string"},"type":"array"},"featured":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array"},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.CPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"properties":{"document":{"allOf":[{"$ref":"#/definitions/advisory.DocumentMetadata"}],"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_tree":{"allOf":[{"$ref":"#/definitions/advisory.ProductBranch"}],"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/definitions/advisory.CSAFVulnerability"},"type":"array"}},"type":"object"},"advisory.CSAFDistribution":{"type":"object"},"advisory.CSAFNote":{"properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/definitions/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"properties":{"cvss_v2":{"$ref":"#/definitions/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/definitions/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CSAFVulnerability":{"properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/definitions/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/definitions/advisory.Flag"},"type":"array"},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/definitions/advisory.TrackingID"},"type":"array"},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/definitions/advisory.RemediationData"},"type":"array"},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/definitions/advisory.CSAFScore"},"type":"array"},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/definitions/advisory.ThreatData"},"type":"array"}},"type":"object"},"advisory.CVEDetail":{"properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVRFReference":{"properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"properties":{"cweid":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CanvasExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"properties":{"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CertFRAdvisory":{"properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.ChainGuardPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.ChainGuardSecFix"},"type":"array"}},"type":"object"},"advisory.ChainGuardSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AffectedChrome"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/definitions/advisory.VulnerableProduct"},"type":"array"}},"type":"object"},"advisory.CisaCsafAdv":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array"},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.CommVaultCVEDetails"},"type":"array"},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/definitions/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"$ref":"#/definitions/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProduct":{"properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/definitions/advisory.CommVaultImpactedProductDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/definitions/advisory.CommVaultResolutionDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultResolutionDetails":{"properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/definitions/advisory.COSUpdate"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"info":{"$ref":"#/definitions/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"properties":{"ranges":{"items":{"$ref":"#/definitions/advisory.CurlRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CurlCWE":{"properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.DocumentNote"},"type":"array"},"productTree":{"$ref":"#/definitions/advisory.ProductTree"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.DocumentTracking"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.Vulnerability"},"type":"array"}},"type":"object"},"advisory.CvsssV2_3":{"properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CWENode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.Cycle":{"properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"properties":{"CWE":{"$ref":"#/definitions/advisory.CurlCWE"},"award":{"$ref":"#/definitions/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.DanFossCVEDetails"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.DebianCVE":{"properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRelease"},"type":"array"},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedDebianPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/definitions/advisory.DellCVE"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"license":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/definitions/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/definitions/advisory.DistroVersion"},"type":"array"}},"type":"object"},"advisory.DistroVersion":{"properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.Publisher"},"references":{"items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/definitions/advisory.Tracking"}},"type":"object"},"advisory.DocumentNote":{"properties":{"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.DocumentPublisher":{"properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DocumentTracking":{"properties":{"currentReleaseDate":{"type":"string"},"id":{"type":"string"},"initialReleaseDate":{"type":"string"},"revisionHistory":{"items":{"$ref":"#/definitions/advisory.Revision"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.DotCMS":{"properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array"},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/definitions/advisory.EnisaIDProduct"},"type":"array"},"enisa_id_vendor":{"items":{"$ref":"#/definitions/advisory.EnisaIDVendor"},"type":"array"},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cycles":{"items":{"$ref":"#/definitions/advisory.Cycle"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array"},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.FlattSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.FoxitAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.GHCvss"},"cwes":{"$ref":"#/definitions/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/definitions/advisory.GHIdentifier"},"type":"array"},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHReference"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/definitions/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"properties":{"package":{"$ref":"#/definitions/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ghsa":{"$ref":"#/definitions/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/definitions/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GHSARange"},"type":"array"}},"type":"object"},"advisory.GHSADatabaseSpecific":{"properties":{"cwe_ids":{"items":{"type":"string"},"type":"array"},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"properties":{"affected_functions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GHSAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GHSAEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.GHNode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array"},"ghsa":{"items":{"type":"string"},"type":"array"},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array"},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array"},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"properties":{"database_specific":{"$ref":"#/definitions/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/definitions/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/definitions/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GoVulnRanges"},"type":"array"}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"properties":{"imports":{"items":{"$ref":"#/definitions/advisory.GoVulnImport"},"type":"array"}},"type":"object"},"advisory.GoVulnImport":{"properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GoVulnJSON":{"properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/definitions/advisory.GoVulnAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.GoCredits"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array"},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GoVulnReference"},"type":"array"}},"type":"object"},"advisory.GoVulnPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GoEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"related_tags":{"items":{"$ref":"#/definitions/advisory.GreyNoiseTags"},"type":"array"},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/definitions/advisory.HaskellVersion"},"type":"array"},"arch":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/definitions/advisory.HaskellAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"integer"},"type":"array"},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array"},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.HaskellVersion":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.IBM":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":true,"type":"object"},"advisory.Igel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"}},"type":"object"},"advisory.IncibeAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"feed_ids":{"items":{"type":"string"},"type":"array"},"hostnames":{"items":{"type":"string"},"type":"array"},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array"},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/definitions/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.Istio":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"properties":{"cpes":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.JNJAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"properties":{"cpe":{"items":{"$ref":"#/definitions/advisory.JVNCPE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"items":{"$ref":"#/definitions/advisory.CVSS"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.JVNReference"},"type":"array"},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array"},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.KoreLogic":{"properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array"},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"properties":{"affectedProducts":{"items":{"$ref":"#/definitions/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array"},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/definitions/advisory.MVersion"},"type":"array"}},"type":"object"},"advisory.MBranch":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"},"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.MNodes"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cpeApplicability":{"items":{"$ref":"#/definitions/advisory.MCPEApplicability"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.Credit"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"items":{"type":"string"},"type":"array"},"timeline":{"items":{"$ref":"#/definitions/advisory.Timeline"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADPContainer"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/definitions/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechnique"},"type":"array"}},"type":"object"},"advisory.MIdentification":{"properties":{"alias":{"$ref":"#/definitions/advisory.IVal"},"id":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MItem":{"properties":{"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.MCPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"properties":{"descriptions":{"items":{"$ref":"#/definitions/advisory.PTMDescriptions"},"type":"array"}},"type":"object"},"advisory.MProductStatus":{"properties":{"ProductID":{"items":{"type":"string"},"type":"array"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"}},"type":"object"},"advisory.MProviderMetadata":{"properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"properties":{"AffectedFiles":{"items":{"$ref":"#/definitions/advisory.AffectedFile"},"type":"array"},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array"},"RestartRequired":{"$ref":"#/definitions/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"properties":{"DocumentTitle":{"$ref":"#/definitions/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/definitions/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/definitions/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/definitions/advisory.RNote"},"type":"array"},"documentpublisher":{"$ref":"#/definitions/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/definitions/advisory.MVulnerability"},"type":"array"}},"type":"object"},"advisory.MSDocumentTitle":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"properties":{"ProductStatuses":{"items":{"$ref":"#/definitions/advisory.MProductStatus"},"type":"array"},"Remediations":{"items":{"$ref":"#/definitions/advisory.MRemediation"},"type":"array"},"Threats":{"items":{"$ref":"#/definitions/advisory.RThreat"},"type":"array"},"acknowledgments":{"items":{"$ref":"#/definitions/advisory.Acknowledgement"},"type":"array"},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/definitions/advisory.RScoreSet"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.Note"},"type":"array"},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"title":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/definitions/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/definitions/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/definitions/advisory.MEProduct"},"type":"array"},"Product_specific_details":{"items":{"$ref":"#/definitions/advisory.ProductSpecificDetail"},"type":"array"},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/definitions/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/definitions/advisory.McAfeeScore"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array"},"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"properties":{"advisory":{"$ref":"#/definitions/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.OvalReference"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"properties":{"cvssV2_0":{"$ref":"#/definitions/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/definitions/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/definitions/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/definitions/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/definitions/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/definitions/advisory.MetricScenario"},"type":"array"}},"type":"object"},"advisory.MetricScenario":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvrf":{"$ref":"#/definitions/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/definitions/advisory.ITW"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"allOf":[{"$ref":"#/definitions/advisory.MicrosoftFileMetadata"}],"description":"File-level metadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/definitions/advisory.Kb"},"type":"array"},"threat":{"$ref":"#/definitions/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array"},"cfr-target-category":{"items":{"type":"string"},"type":"array"},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array"},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"synonyms":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.MispRelatedItem":{"properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/definitions/advisory.NISTControl"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.MitreAttackRef"},"type":"array"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array"},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"properties":{"containers":{"$ref":"#/definitions/advisory.MContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ExternalReferences"},"type":"array"}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"properties":{"affected_components":{"items":{"$ref":"#/definitions/advisory.MozillaComponent"},"type":"array"},"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array"},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"properties":{"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"properties":{"cis_controls":{"items":{"$ref":"#/definitions/advisory.CISControl"},"type":"array"},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.NVD20Node"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/definitions/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array"},"v3AcceptanceLevel":{"$ref":"#/definitions/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"properties":{"cpe":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array"},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.NodeAuthor":{"properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"properties":{"affected_environments":{"items":{"type":"string"},"type":"array"},"author":{"$ref":"#/definitions/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.CurlAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.CurlCredit"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/definitions/advisory.Affected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.OSVReference"},"type":"array"},"related":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"properties":{"affected_platforms":{"items":{"type":"string"},"type":"array"},"affected_services":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/definitions/advisory.OpenJDKCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.OpenSSLVulnerability"},"type":"array"}},"type":"object"},"advisory.OpenSSLVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"$ref":"#/definitions/advisory.FixAff"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"properties":{"affects":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.GHSAAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHSAReference"},"type":"array"},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/definitions/advisory.GHSASeverity"},"type":"array"},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"properties":{"_annotation":{"$ref":"#/definitions/advisory.OverrideAnnotation"},"cve":{"$ref":"#/definitions/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/definitions/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"properties":{"configurations":{"items":{"$ref":"#/definitions/advisory.OverrideConfiguration"},"type":"array"}},"type":"object"},"advisory.OverrideConfiguration":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CPENode"},"type":"array"}},"type":"object"},"advisory.OwnCloud":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PostgresSQL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/definitions/advisory.PGFix"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.ProductBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.Product"},"relationships":{"items":{"$ref":"#/definitions/advisory.CSAFRelationship"},"type":"array"}},"type":"object"},"advisory.ProductSpecificDetail":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductTree":{"properties":{"relationships":{"items":{"$ref":"#/definitions/advisory.Relationship"},"type":"array"}},"type":"object"},"advisory.ProductsAffected":{"properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/definitions/advisory.PyPAAffected"},"type":"array"},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/definitions/advisory.PyPAReference"},"type":"array"},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"properties":{"package":{"$ref":"#/definitions/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.PyPARange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PyPAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.PyPAEvent"},"type":"array"},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"properties":{"chipsets":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"cvss_v3":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/definitions/advisory.Patch"},"type":"array"},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/definitions/advisory.VendorRef"},"type":"array"}},"type":"object"},"advisory.RDescription":{"properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"properties":{"date":{"type":"string"},"description":{"$ref":"#/definitions/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array"},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.Event"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.RecordType":{"properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array"},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array"},"affected_release":{"items":{"$ref":"#/definitions/advisory.AffectedRel"},"type":"array"},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/definitions/advisory.PackageStat"},"type":"array"},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Relationship":{"properties":{"productReference":{"type":"string"},"relatesToProductReference":{"type":"string"},"relationType":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array"},"group_ids":{"items":{"type":"string"},"type":"array"},"product_ids":{"items":{"type":"string"},"type":"array"},"restart_required":{"$ref":"#/definitions/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.Revision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"number":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/definitions/advisory.RocheCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"properties":{"affected_products":{"items":{"$ref":"#/definitions/advisory.RockwellAffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"properties":{"affectedProducts":{"items":{"type":"string"},"type":"array"},"buildReferences":{"items":{"type":"string"},"type":"array"},"cves":{"items":{"$ref":"#/definitions/advisory.RockyCve"},"type":"array"},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/definitions/advisory.RockyFix"},"type":"array"},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"rpms":{"$ref":"#/definitions/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.RockyPackage"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/definitions/advisory.RockyVersion"},"type":"object"},"advisory.RockyVersion":{"properties":{"nvras":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Rsync":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/definitions/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/definitions/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array"},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array"},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array"},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array"},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array"},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"properties":{"patched":{"items":{"type":"string"},"type":"array"},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SAAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"properties":{"document":{"$ref":"#/definitions/advisory.SiemensDocument"},"product_tree":{"$ref":"#/definitions/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.SiemensVulnerability"},"type":"array"}},"type":"object"},"advisory.SSDAdvisory":{"properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Sandisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/definitions/advisory.SchneiderCVE"},"type":"array"},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ScoreSet":{"properties":{"baseScore":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.SecFix":{"properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvedetails":{"items":{"$ref":"#/definitions/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/definitions/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/definitions/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/definitions/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"properties":{"names":{"items":{"type":"string"},"type":"array"},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"ssa":{"$ref":"#/definitions/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"properties":{"text":{"type":"string"},"tlp":{"$ref":"#/definitions/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"properties":{"acknowledgments":{"items":{"$ref":"#/definitions/advisory.SiemensAcknowledgments"},"type":"array"},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"properties":{"engine":{"$ref":"#/definitions/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"properties":{"model_numbers":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductStatus":{"properties":{"known_affected":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductTree":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensBranch"},"type":"array"}},"type":"object"},"advisory.SiemensPublisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"properties":{"cvss_v3":{"$ref":"#/definitions/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensSubBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/definitions/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.SiemensRevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/definitions/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"product_status":{"$ref":"#/definitions/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"remediations":{"items":{"$ref":"#/definitions/advisory.SiemensRemediation"},"type":"array"},"scores":{"items":{"$ref":"#/definitions/advisory.SiemensScore"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array"},"sigma_rule":{"$ref":"#/definitions/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":true,"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array"},"fields":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/definitions/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"related":{"items":{"$ref":"#/definitions/advisory.RelatedRule"},"type":"array"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/definitions/advisory.SplunkProduct"},"type":"array"},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Status":{"properties":{"productID":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Threat":{"properties":{"severity":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/definitions/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/definitions/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/definitions/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"},"vendor_names_for_threat_actors":{"items":{"$ref":"#/definitions/advisory.VendorNameForThreatActor"},"type":"array"},"vendors_and_products_targeted":{"items":{"$ref":"#/definitions/advisory.VendorProduct"},"type":"array"}},"type":"object"},"advisory.ThreatData":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Tibco":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ToolRef"},"type":"array"}},"type":"object"},"advisory.ToolRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.RevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"properties":{"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Trustwave":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array"},"products":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedUbuntuPackage"},"type":"array"},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array"},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array"},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.V3AcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VCVulnerableCPEs":{"properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VDEAdvisory":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"properties":{"affecting":{"items":{"type":"string"},"type":"array"},"credit":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"properties":{"config":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/definitions/advisory.ReportedExploit"},"type":"array"},"vulncheck_xdb":{"items":{"$ref":"#/definitions/advisory.XDB"},"type":"array"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnerability":{"properties":{"cve":{"type":"string"},"cvssscoreSets":{"$ref":"#/definitions/advisory.ScoreSet"},"description":{"type":"string"},"packages":{"description":"vulncheck addition","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"productStatuses":{"items":{"$ref":"#/definitions/advisory.Status"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"threats":{"items":{"$ref":"#/definitions/advisory.Threat"},"type":"array"}},"type":"object"},"advisory.VulnerableDebianPackage":{"properties":{"associated_cves":{"items":{"$ref":"#/definitions/advisory.DebianCVE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"properties":{"containers":{"$ref":"#/definitions/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADP"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/definitions/advisory.VulnrichmentOption"},"type":"array"},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"properties":{"other":{"$ref":"#/definitions/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"properties":{"content":{"$ref":"#/definitions/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.WolfiPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.WolfiSecFix"},"type":"array"}},"type":"object"},"advisory.WolfiSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array"},"filter_ids_dv":{"items":{"type":"string"},"type":"array"},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.ZDIProduct"},"type":"array"},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/definitions/advisory.ZDIResponse"},"type":"array"},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/definitions/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/definitions/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/definitions/api.CPEName"},"type":"array"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemType"},"references":{"$ref":"#/definitions/api.References"}},"type":"object"},"api.CVEDataMeta":{"properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemTypeExtended"},"references":{"$ref":"#/definitions/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"properties":{"tags":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.ClientFingerprints":{"properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"}},"type":"object"},"api.CveItems":{"properties":{"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVE"},"impact":{"$ref":"#/definitions/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.CveItemsExtended":{"properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/definitions/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vulnerable_cpes":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"api.Description":{"properties":{"description_data":{"items":{"$ref":"#/definitions/api.DescriptionData"},"type":"array"}},"type":"object"},"api.DescriptionData":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"properties":{"cves":{"items":{"$ref":"#/definitions/api.ExploitChainCVE"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/definitions/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"allOf":[{"$ref":"#/definitions/api.EPSS"}],"description":"exclude EPSS from changelog"},"exploits":{"items":{"$ref":"#/definitions/api.NormalizedExploitV3Entry"},"type":"array"},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/definitions/api.NormalizedReportV3Entry"},"type":"array"},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/definitions/api.ExploitsV3Timeline"},"trending":{"$ref":"#/definitions/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"properties":{"changes":{"items":{"$ref":"#/definitions/api.ExploitsChange"},"type":"array"},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"metricV40":{"allOf":[{"$ref":"#/definitions/advisory.CVSSV40"}],"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics"}},"type":"object"},"api.ImpactExtended":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"epss":{"$ref":"#/definitions/api.EPSS"},"metricV40":{"$ref":"#/definitions/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalMetricV2":{"$ref":"#/definitions/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/definitions/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/definitions/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/definitions/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/definitions/api.InitialAccessArtifact"},"type":"array"},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array"}},"type":"object"},"api.InitialAccessArtifact":{"properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array"},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array"},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array"},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array"},"fofaRawQueries":{"items":{"type":"string"},"type":"array"},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array"},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array"},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array"},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array"},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array"},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array"},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array"},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array"},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.MitreAttackTech":{"properties":{"d3fendmapping":{"items":{"$ref":"#/definitions/api.MitreMitigation2D3fendMapping"},"type":"array"},"detections":{"items":{"$ref":"#/definitions/api.MitreDetectionTech"},"type":"array"},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/definitions/api.MitreMitigationTech"},"type":"array"},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"properties":{"cve_list":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"technique_id":{"$ref":"#/definitions/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"properties":{"d3fendtechniques":{"items":{"$ref":"#/definitions/api.MitreD3fendTechnique"},"type":"array"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/definitions/api.NVD20CPEName"},"type":"array"},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20Reference"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20Weakness"},"type":"array"}},"type":"object"},"api.NVD20CVEExtended":{"properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20ReferenceExtended"},"type":"array"},"relatedAttackPatterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20WeaknessExtended"},"type":"array"}},"type":"object"},"api.NVD20CvssDataV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"properties":{"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"properties":{"cvssData":{"$ref":"#/definitions/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"}},"type":"object"},"api.NVD20MetricExtended":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"},"epss":{"$ref":"#/definitions/api.EPSS"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalCVSSV2":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"type":"array"},"temporalCVSSV30":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"temporalCVSSV31":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"threatCVSSV40":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"type":"array"}},"type":"object"},"api.NVD20Reference":{"properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"properties":{"associatedBaseMetricV2":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"properties":{"associatedBaseMetricV3":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"properties":{"associatedBaseMetricV40":{"$ref":"#/definitions/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20WeaknessDescExtended"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"properties":{"children":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"},"cpe_match":{"items":{"$ref":"#/definitions/api.CPEMatch"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"properties":{"artifacts":{"$ref":"#/definitions/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"api.OSSPackageArtifacts":{"properties":{"binary":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"},"source":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"}},"type":"object"},"api.OSSPackageDownloadInfo":{"properties":{"hashes":{"items":{"$ref":"#/definitions/api.OSSPackageHashInfo"},"type":"array"},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeData"},"type":"array"}},"type":"object"},"api.ProblemTypeData":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescription"},"type":"array"}},"type":"object"},"api.ProblemTypeDataExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescriptionExtended"},"type":"array"}},"type":"object"},"api.ProblemTypeDescription":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeDataExtended"},"type":"array"}},"type":"object"},"api.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.References":{"properties":{"reference_data":{"items":{"$ref":"#/definitions/api.ReferenceData"},"type":"array"}},"type":"object"},"api.ReferencesExtended":{"properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/definitions/api.ReferenceDataExtended"},"type":"array"}},"type":"object"},"api.RelatedAttackPattern":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"properties":{"cvssV2":{"$ref":"#/definitions/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/api.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/api.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/definitions/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/definitions/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/definitions/paginate.Match"},"type":"array"},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array"},"parameters":{"items":{"$ref":"#/definitions/paginate.Param"},"type":"array"},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array"}},"type":"object"},"paginate.Param":{"properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"purl.PackageURLJSON":{"properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/definitions/purl.QualifierJSON"},"type":"array"},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"type":"object"},"purls.PurlResponse":{"properties":{"artifacts":{"$ref":"#/definitions/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/purls.Vulnerability"},"type":"array"}},"type":"object"},"purls.Vulnerability":{"properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexBackupList"},"type":"array"}},"type":"object"},"render.Response-array_params_IndexList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.A10"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ABBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AIX"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ASRG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVEVAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVIDMLAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AWS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Abbott"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Absolute"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Acronis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdobeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advantech"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdvisoryRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlephResearch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Alibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlmaLinuxUpdate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AmazonCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AnchoreNVDOverride"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AndroidAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheActiveMQ"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArchiva"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArrow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCamel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCommons"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCouchDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheFlink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheGuacamole"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHTTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHadoop"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheJSPWiki"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheKafka"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheLoggingServices"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheNiFi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOFBiz"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenMeetings"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApachePulsar"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheShiro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSpark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheStruts"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSubversion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSuperset"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheTomcat"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheZooKeeper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Appgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppleAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ArchIssue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Arista"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Aruba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AssetNote"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asterisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Astra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianVuln"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Atredis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Audiocodes"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AusCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Autodesk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avaya"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avigilon"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Axis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Azul"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BBraunAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BDUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Bandr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BaxterAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckhoffAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckmanCoulter"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BectonDickinsonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeldenAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeyondTrust"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Binarly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BitDefender"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BlackBerry"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BoschAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BostonScientificAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Botnet"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CACyberCentreAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CBLMariner"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CERTEUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CESA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CISAAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNNVDEntryJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDFlaw"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CanvasExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CarestreamAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Carrier"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertBE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertFRAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIRSecurityAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertSE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertUA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ChainGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CheckPoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Chrome"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ciena"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CisaCsafAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoKnownGoodValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CitrixAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ClarotyVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudBees"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudVulnDBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CodesysAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CommVault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CompassSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ContainerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CoreImpactExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Crestron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CrowdSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Curl"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Cvrf"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DFNCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DNN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dahua"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Danfoss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dassault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DebianSecurityAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DeltaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DistroPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Django"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DotCMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DragosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Draytek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Drupal"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLAlibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLMicrosoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLReleaseData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EUVD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EatonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elastic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elspec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmergingThreatsSnort"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmersonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EndOfLife"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Endress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExodusIntel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExploitDBExploitv2"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.F5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fanuc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fastly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Festo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileZilla"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FlattSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ForgeRock"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Foxit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fresenius"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GCP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEGas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHAdvisoryJSONLean"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHSA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GMOCyberSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gallagher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Genetec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gigabyte"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitHubExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitLabExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GiteeExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitlabAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Glibc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GnuTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GoVulnJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Grafana"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GreyNoiseDetection"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HCL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HIKVision"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HPE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hacktivity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HarmonyOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HashiCorp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HaskellSADBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HillromAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hitachi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HitachiEnergy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Honeywell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Huawei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiEulerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IAVA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IBM"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ITWExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Idemia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Igel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IncibeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Intel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IpIntelRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Istio"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ivanti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IvantiRSS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JFrog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JNJAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVNAdvisoryItem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Jenkins"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JetBrains"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JohnsonControls"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Juniper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.K8S"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KEVCatalogVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KRCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KasperskyICSCERTAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KoreLogic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Kunbus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lantronix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lenovo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LexmarkAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LibreOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Linux"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LolAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MACert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MFiles"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MaliciousPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ManageEngineAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MbedTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.McAfee"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mediatek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MedtronicAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mendix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaAdvisories"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetasploitExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCVRF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftDriverBlockList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftKb"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mikrotik"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mindray"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MispValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mitel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitreCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitsubishiElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MongoDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MoxaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MozillaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSCCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NEC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NHS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVD20Source"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVDCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NZAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Naver"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nessus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NetApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netatalk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netskope"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nexpose"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NginxAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeJS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nokia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NotePadPlusPlus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nozomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nuclei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OSV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OTRS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OctopusDeploy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Okta"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Omron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OneE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenBSD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenCVDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenJDK"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSH"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSLSecAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenStack"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Opengear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPU"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPUCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OwnCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PHPMyAdmin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PTC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PacketstormExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Palantir"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaloAltoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Panasonic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaperCut"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Pega"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhilipsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhoenixContactAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PostgresSQL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PowerDNS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Progress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Proofpoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PureStorage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PyPAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QNAPAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QSB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualcomm"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualys"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QualysQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RansomwareExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedLion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedhatCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Renesas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Revive"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RhelCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Roche"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rockwell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RockyErrata"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rsync"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ruckus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RustsecAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SECConsult"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SSDAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Safran"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SaintExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SalesForce"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Samba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sandisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SansDshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SchneiderElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Schutzwerk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityLab"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SeebugExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SentinelOne"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ServiceNow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SevenZip"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ShadowServerExploitedVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Shielder"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sick"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SiemensAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SierraWireless"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SigmaRule"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SingCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sitecore"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Slackware"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SolarWindsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Solr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sonatype"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SonicWallAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SpacelabsHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Splunk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Spring"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Stormshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.StrykerAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sudo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SuseSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SwisslogHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Symfony"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synacktiv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SyncroSoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Syss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TPLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TWCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tailscale"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TalosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TeamViewer"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TenableResearchAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tencent"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Thales"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TheMissingLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThermoFisher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThreatActorWithExternalObjects"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tibco"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TraneTechnology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TrendMicro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Trustwave"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USOMAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ubiquiti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.UbuntuCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unify"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unisoc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCVulnerableCPEs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VDEAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VLC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VMWareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VYAIREAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VanDyke"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VapidLabsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veeam"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veritas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Virtuozzo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VoidSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckConfig"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckKEV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnerableDebianPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Vulnrichment"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WRT"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WatchGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WhatsApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wibu"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wireshark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WithSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WolfSSL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wolfi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wordfence"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xerox"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xiaomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xylem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yamaha"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.YokogawaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yubico"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zebra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroDayAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroScienceAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zimbra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zoom"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zscaler"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zuso"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zyxel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CWE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItems"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItemsExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.EPSSData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitChain"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitV3Result"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitsChangelog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.InitialAccess"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.MitreAttackToCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CPEMatch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVEExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.OSSPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnCheckCanary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnerabilityAlias"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/purls.PurlResponse"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/definitions/params.IndexBackup"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/definitions/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/definitions/purl.BatchVulnFinding"},"type":"array"}},"type":"object"},"v3controllers.BackupResponseMetadata":{"properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"v3controllers.PurlResponseMetadata":{"properties":{"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/definitions/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"Version 3 of the VulnCheck API","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"3.0"},"paths":{"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexBackupList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"in":"path","name":"index","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"type":"string"},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/models.Entitlements"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"additionalProperties":true,"type":"object"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","parameters":[{"description":"PURL strings used to identify and locate software packages","in":"body","name":"purls","required":true,"schema":{"items":{"type":"string"},"type":"array"}}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","enum":["snort","suricata"],"in":"path","name":"type","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"securityDefinitions":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}},"swagger":"2.0"} \ No newline at end of file +{"components":{"schemas":{"advisory.A10":{"description":"advisory.A10","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"description":"advisory.ABBAdvisory","properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"description":"advisory.ADP","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"description":"advisory.ADPContainer","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"description":"advisory.AIX","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"description":"advisory.AMD","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"description":"advisory.AMI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"description":"advisory.ASRG","properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"description":"advisory.AVEVAAdvisory","properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"description":"advisory.AVIDMLAdvs","properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"description":"advisory.AWS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"description":"advisory.Abbott","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"description":"advisory.Absolute","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"description":"advisory.Acknowledgement","properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"description":"advisory.Acronis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"description":"advisory.AdobeAdvisory","properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"description":"advisory.AdobeAffected","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"description":"advisory.AdobeCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"description":"advisory.AdobeSolution","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"description":"advisory.Advantech","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"description":"advisory.Advisory","properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"description":"advisory.AdvisoryDetails","properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"description":"advisory.AdvisoryRecord","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"description":"advisory.Affected","properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"description":"advisory.AffectedChrome","properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"description":"advisory.AffectedDebianPackage","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"description":"advisory.AffectedDebianRelease","properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"description":"advisory.AffectedDebianRepository","properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"description":"advisory.AffectedFile","properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"description":"advisory.AffectedProduct","properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"description":"advisory.AffectedRel","properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"description":"advisory.AffectedUbuntuPackage","properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"description":"advisory.AlephResearch","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"description":"advisory.Alibaba","properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"description":"advisory.AlmaDate","properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"description":"advisory.AlmaLinuxUpdate","properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"description":"advisory.AlmaObjectID","properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"description":"advisory.AlmaPackage","properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"description":"advisory.AlmaPackageList","properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"description":"advisory.AlmaReference","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"description":"advisory.AlpineLinuxSecDB","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"description":"advisory.AlpineLinuxSecDBPackage","properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"description":"advisory.AlpineLinuxSecurityFix","properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"description":"advisory.AmazonAffectedPackage","properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"description":"advisory.AmazonCVE","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"description":"advisory.AnchoreNVDOverride","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"description":"advisory.AndroidAdvisory","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"description":"advisory.AndroidAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"description":"advisory.AndroidEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"description":"advisory.AndroidPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"description":"advisory.AndroidRange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"description":"advisory.AndroidReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"description":"advisory.ApacheActiveMQ","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"description":"advisory.ApacheArchiva","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"description":"advisory.ApacheArrow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"description":"advisory.ApacheCamel","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"description":"advisory.ApacheCommons","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"description":"advisory.ApacheCouchDB","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"description":"advisory.ApacheFlink","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"description":"advisory.ApacheGuacamole","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"description":"advisory.ApacheHTTP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"description":"advisory.ApacheHadoop","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"description":"advisory.ApacheJSPWiki","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"description":"advisory.ApacheKafka","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"description":"advisory.ApacheLoggingServices","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"description":"advisory.ApacheNiFi","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"description":"advisory.ApacheOFBiz","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"description":"advisory.ApacheOpenMeetings","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"description":"advisory.ApacheOpenOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"description":"advisory.ApachePulsar","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"description":"advisory.ApacheShiro","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"description":"advisory.ApacheSpark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"description":"advisory.ApacheStruts","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"description":"advisory.ApacheSubversion","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"description":"advisory.ApacheSuperset","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"description":"advisory.ApacheTomcat","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"description":"advisory.ApacheZooKeeper","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"description":"advisory.AppCheck","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"description":"advisory.Appgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"description":"advisory.AppleAdvisory","properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"description":"advisory.AppleComponent","properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"description":"advisory.ArchIssue","properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"description":"advisory.Arista","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"description":"advisory.Aruba","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"description":"advisory.AssetNote","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"description":"advisory.Asterisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"description":"advisory.Astra","properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"description":"advisory.Asus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"description":"advisory.AtlassianAdvisory","properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"description":"advisory.AtlassianProducts","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"description":"advisory.AtlassianVuln","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"description":"advisory.Atredis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"description":"advisory.Audiocodes","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"description":"advisory.AusCert","properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"description":"advisory.Autodesk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"description":"advisory.Avaya","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"description":"advisory.Avigilon","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"description":"advisory.Award","properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"description":"advisory.Axis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"description":"advisory.Azul","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"description":"advisory.BBraunAdvisory","properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"description":"advisory.BDUAdvisory","properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"description":"advisory.BDUCvss","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"description":"advisory.BDUCvss3","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"description":"advisory.BDUEnvironment","properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"description":"advisory.BDUOs","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"description":"advisory.BDUSoft","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"description":"advisory.BDUTypes","properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"description":"advisory.BDUVector","properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"description":"advisory.BDUVulnerableSoftware","properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"description":"advisory.BLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"description":"advisory.Bandr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"description":"advisory.BaxterAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"description":"advisory.BeckhoffAdvisory","properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"description":"advisory.BeckmanCoulter","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"description":"advisory.BectonDickinsonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"description":"advisory.BeldenAdvisory","properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"description":"advisory.BeyondTrust","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"description":"advisory.Binarly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"description":"advisory.BitDefender","properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"description":"advisory.BlackBerry","properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"description":"advisory.BoschAdvisory","properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"description":"advisory.BostonScientificAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"description":"advisory.Botnet","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"description":"advisory.Bugzilla","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"description":"advisory.CACyberCentreAdvisory","properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"description":"advisory.CBLMariner","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"description":"advisory.CERTEUAdvisory","properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"description":"advisory.CESA","properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"description":"advisory.CISAAlert","properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"description":"advisory.CISControl","properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"description":"advisory.CNNVDEntryJSON","properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"description":"advisory.CNVDBulletin","properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"description":"advisory.CNVDFlaw","properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"description":"advisory.COSUpdate","properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"description":"advisory.CPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"description":"advisory.CPENode","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"description":"advisory.CSAF","properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"description":"advisory.CSAFDistribution","type":"object"},"advisory.CSAFNote":{"description":"advisory.CSAFNote","properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"description":"advisory.CSAFReference","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"description":"advisory.CSAFRelationship","properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"description":"advisory.CSAFScore","properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"description":"advisory.CSAFVulnerability","properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"description":"advisory.CVEDetail","properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"description":"advisory.CVEDetailsLink","properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"description":"advisory.CVEReference","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"description":"advisory.CVSS","properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"description":"advisory.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"description":"advisory.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"description":"advisory.CVSSV40Threat","properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"description":"advisory.CWENode","type":"object"},"advisory.CanvasExploit":{"description":"advisory.CanvasExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"description":"advisory.Capec","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"description":"advisory.CarestreamAdvisory","properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"description":"advisory.Carrier","properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"description":"advisory.CentosPackage","properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"description":"advisory.CertBE","properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"description":"advisory.CertFRAdvisory","properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"description":"advisory.CertIN","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"description":"advisory.CertIRSecurityAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"description":"advisory.CertSE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"description":"advisory.CertUA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"description":"advisory.ChainGuard","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"description":"advisory.ChainGuardPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"description":"advisory.ChainGuardSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"description":"advisory.CheckPoint","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"description":"advisory.Chrome","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"description":"advisory.Ciena","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"description":"advisory.CisaCsafAdv","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"description":"advisory.CiscoAdvisory","properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"description":"advisory.CiscoCSAF","properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"description":"advisory.CiscoKnownGoodValue","properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"description":"advisory.CitrixAdvisory","properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"description":"advisory.ClarotyVulnerability","properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"description":"advisory.CloudBees","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"description":"advisory.CloudVulnDBAdvisory","properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"description":"advisory.CodesysAdvisory","properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"description":"advisory.CommVault","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"description":"advisory.CommVaultCVEDetails","properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"description":"advisory.CommVaultImpactedProduct","properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"description":"advisory.CommVaultImpactedProductDetails","properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"description":"advisory.CommVaultResolution","properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"description":"advisory.CommVaultResolutionDetails","properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"description":"advisory.CompassSecurity","properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"description":"advisory.ContainerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"description":"advisory.CoreImpactExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"description":"advisory.Correction","properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"description":"advisory.Credit","properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"description":"advisory.Crestron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"description":"advisory.CrowdSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"description":"advisory.Curl","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"description":"advisory.CurlAffected","properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"description":"advisory.CurlCWE","properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"description":"advisory.CurlCredit","properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"description":"advisory.CurlRange","properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"description":"advisory.Cvrf","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"description":"advisory.CvsssV2_3","properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"description":"advisory.Cwe","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"description":"advisory.CweAcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"description":"advisory.CweData","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"description":"advisory.Cwes","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"description":"advisory.Cycle","properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"description":"advisory.DBSpecific","properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"description":"advisory.DFNCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"description":"advisory.DLink","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"description":"advisory.DNN","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"description":"advisory.Dahua","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"description":"advisory.DanFossCVEDetails","properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"description":"advisory.Danfoss","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"description":"advisory.Dassault","properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"description":"advisory.DateTime","type":"object"},"advisory.DebianCVE":{"description":"advisory.DebianCVE","properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"description":"advisory.DebianSecurityAdvisory","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"description":"advisory.Dell","properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"description":"advisory.DellCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"description":"advisory.DeltaAdvisory","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"description":"advisory.DistroPackage","properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"description":"advisory.DistroVersion","properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"description":"advisory.Django","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"description":"advisory.DocumentPublisher","properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"description":"advisory.DotCMS","properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"description":"advisory.DragosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"description":"advisory.Draytek","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"description":"advisory.Drupal","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"description":"advisory.EOLAlibaba","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"description":"advisory.EOLMicrosoft","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"description":"advisory.EOLReleaseData","properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"description":"advisory.EUVD","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"description":"advisory.EatonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"description":"advisory.EcoSystem","properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"description":"advisory.Elastic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"description":"advisory.Elspec","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"description":"advisory.EmergingThreatsSnort","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"description":"advisory.EmersonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"description":"advisory.EndOfLife","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"description":"advisory.Endress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"description":"advisory.EnisaIDProduct","properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"description":"advisory.EnisaIDVendor","properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"description":"advisory.Event","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"description":"advisory.ExodusIntel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"description":"advisory.ExploitDBExploitv2","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"description":"advisory.ExternalReferences","properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"description":"advisory.F5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"description":"advisory.FSecure","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"description":"advisory.Fanuc","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"description":"advisory.Fastly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"description":"advisory.Festo","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"description":"advisory.FileCloud","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"description":"advisory.FileZilla","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"description":"advisory.FixAff","properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"description":"advisory.Flag","properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"description":"advisory.FlattSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"description":"advisory.ForgeRock","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"description":"advisory.FortinetAdvisory","properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"description":"advisory.FortinetIPS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"description":"advisory.Foxit","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"description":"advisory.FoxitAffected","properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"description":"advisory.Fresenius","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"description":"advisory.GCP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"description":"advisory.GEGas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"description":"advisory.GEHealthcareAdvisory","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"description":"advisory.GHAdvisoryJSONLean","properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"description":"advisory.GHCvss","properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"description":"advisory.GHIdentifier","properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"description":"advisory.GHNode","properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"description":"advisory.GHPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"description":"advisory.GHReference","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"description":"advisory.GHSA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"description":"advisory.GHSAAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"description":"advisory.GHSADatabaseSpecific","properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"description":"advisory.GHSAEcoSystemSpecific","properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"description":"advisory.GHSAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"description":"advisory.GHSAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"description":"advisory.GHSARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"description":"advisory.GHSAReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"description":"advisory.GHSASeverity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"description":"advisory.GHVulnerabilities","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"description":"advisory.GMOCyberSecurity","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"description":"advisory.Gallagher","properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"description":"advisory.Gen","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"description":"advisory.Genetec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"description":"advisory.Gigabyte","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"description":"advisory.GitHubExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"description":"advisory.GitLabExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"description":"advisory.GiteeExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"description":"advisory.GitlabAdvisory","properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"description":"advisory.Glibc","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"description":"advisory.GnuTLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"description":"advisory.GoCredits","properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"description":"advisory.GoEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"description":"advisory.GoVulnAffected","properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"description":"advisory.GoVulnDatabaseSpecific","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"description":"advisory.GoVulnEcosystemSpecific","properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"description":"advisory.GoVulnImport","properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"description":"advisory.GoVulnJSON","properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"description":"advisory.GoVulnPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"description":"advisory.GoVulnRanges","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"description":"advisory.GoVulnReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"description":"advisory.Grafana","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"description":"advisory.GreyNoiseDetection","properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"description":"advisory.GreyNoiseTags","properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"description":"advisory.HCL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"description":"advisory.HIKVision","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"description":"advisory.HKCert","properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"description":"advisory.HMS","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"description":"advisory.HP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"description":"advisory.HPE","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"description":"advisory.Hacktivity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"description":"advisory.HardwareUpdate","properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"description":"advisory.HarmonyOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"description":"advisory.HashiCorp","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"description":"advisory.HaskellAffected","properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"description":"advisory.HaskellSADBAdvisory","properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.HaskellVersion":{"description":"advisory.HaskellVersion","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"description":"advisory.HillromAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"description":"advisory.Hitachi","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"description":"advisory.HitachiEnergy","properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"description":"advisory.Honeywell","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"description":"advisory.Huawei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"description":"advisory.HuaweiEulerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"description":"advisory.HuaweiIPS","properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"description":"advisory.IAVA","properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"description":"advisory.IBM","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"description":"advisory.ITW","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"description":"advisory.ITWExploit","properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"description":"advisory.IVal","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"description":"advisory.Idemia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"description":"advisory.IdentificationHelper","type":"object"},"advisory.Igel":{"description":"advisory.Igel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"description":"advisory.Impact","properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"description":"advisory.IncibeAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"description":"advisory.Intel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"description":"advisory.IpIntelRecord","properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"description":"advisory.IsraeliAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"description":"advisory.IsraeliVulnerability","properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"description":"advisory.Issued","type":"object"},"advisory.Istio":{"description":"advisory.Istio","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"description":"advisory.Ivanti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"description":"advisory.IvantiRSS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"description":"advisory.JFrog","properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"description":"advisory.JNJAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"description":"advisory.JVN","properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"description":"advisory.JVNAdvisoryItem","properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"description":"advisory.JVNCPE","properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"description":"advisory.JVNReference","properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"description":"advisory.Jenkins","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"description":"advisory.JetBrains","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"description":"advisory.JohnsonControls","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"description":"advisory.Juniper","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"description":"advisory.K8S","properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"description":"advisory.KEVCatalogVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"description":"advisory.KRCertAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"description":"advisory.KasperskyICSCERTAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"description":"advisory.Kb","properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"description":"advisory.KbThreatDescription","properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"description":"advisory.KoreLogic","properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"description":"advisory.Kunbus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"description":"advisory.LG","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"description":"advisory.Lantronix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"description":"advisory.Lenovo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"description":"advisory.LexmarkAdvisory","properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"description":"advisory.LibreOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"description":"advisory.Linux","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"description":"advisory.LogSource","properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"description":"advisory.LolAdvs","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"description":"advisory.MACert","properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"description":"advisory.MAffected","properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"description":"advisory.MBranch","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"description":"advisory.MCPEApplicability","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"description":"advisory.MCPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"description":"advisory.MCna","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"description":"advisory.MContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"description":"advisory.MCveMetadata","properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"description":"advisory.MCvssV20","properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"description":"advisory.MCvssV30","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"description":"advisory.MCvssV31","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"description":"advisory.MCvssV40","properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"description":"advisory.MDescriptions","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"description":"advisory.MDocumentTracking","properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"description":"advisory.MEProduct","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"description":"advisory.MFiles","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"description":"advisory.MFullProductName","properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"description":"advisory.MISPValueNoID","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"description":"advisory.MITREAttackGroupNoID","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"description":"advisory.MIdentification","properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"description":"advisory.MItem","properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"description":"advisory.MNodes","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"description":"advisory.MProblemTypes","properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"description":"advisory.MProductStatus","properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"description":"advisory.MProductTree","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"description":"advisory.MReference","properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"description":"advisory.MRemediation","properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"description":"advisory.MSCVRF","properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"description":"advisory.MSDocumentTitle","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"description":"advisory.MVersion","properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"description":"advisory.MVulnerability","properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"description":"advisory.MaliciousPackage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"description":"advisory.ManageEngine","properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"description":"advisory.ManageEngineAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"description":"advisory.MbedTLS","properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"description":"advisory.McAfee","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"description":"advisory.McAfeeScore","properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"description":"advisory.Mediatek","properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"description":"advisory.MedtronicAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"description":"advisory.Mendix","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"description":"advisory.MetaAdvisories","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"description":"advisory.MetaData","properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"description":"advisory.MetasploitExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"description":"advisory.Metric","properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"description":"advisory.MetricScenario","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"description":"advisory.MetricsOther","properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"description":"advisory.MicrosoftCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"description":"advisory.MicrosoftCVRF","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"description":"advisory.MicrosoftDriverBlockList","properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"description":"advisory.MicrosoftKb","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"description":"advisory.Mikrotik","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"description":"advisory.Mindray","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"description":"advisory.MispMeta","properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"description":"advisory.MispRelatedItem","properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"description":"advisory.MispValue","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"description":"advisory.Mitel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"description":"advisory.MitreAttackRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"description":"advisory.MitreAttackTechWithRefs","properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"description":"advisory.MitreAttackTechnique","properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"description":"advisory.MitreCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"description":"advisory.MitreCVEListV5Ref","properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"description":"advisory.MitreGroupCTI","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"description":"advisory.MitsubishiElectricAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"description":"advisory.MongoDB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"description":"advisory.MoxaAdvisory","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"description":"advisory.MozillaAdvisory","properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"description":"advisory.MozillaComponent","properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"description":"advisory.NCSC","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"description":"advisory.NCSCCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"description":"advisory.NEC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"description":"advisory.NHS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"description":"advisory.NI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"description":"advisory.NISTControl","properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"description":"advisory.NTP","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"description":"advisory.NVD20CVECPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"description":"advisory.NVD20Configuration","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"description":"advisory.NVD20Node","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"description":"advisory.NVD20Source","properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"description":"advisory.NVDCPEDictionary","properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"description":"advisory.NZAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"description":"advisory.Naver","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"description":"advisory.Nessus","properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"description":"advisory.NetApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"description":"advisory.Netatalk","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"description":"advisory.Netgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"description":"advisory.Netgear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"description":"advisory.Netskope","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"description":"advisory.Nexpose","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"description":"advisory.NginxAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"description":"advisory.NodeAuthor","properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"description":"advisory.NodeJS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"description":"advisory.NodeSecurity","properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"description":"advisory.Nokia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"description":"advisory.Note","properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"description":"advisory.NotePadPlusPlus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"description":"advisory.Nozomi","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"description":"advisory.Nuclei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"description":"advisory.NvidiaRevision","properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"description":"advisory.OCurl","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"description":"advisory.OSV","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"description":"advisory.OSVObj","properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"description":"advisory.OSVPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"description":"advisory.OSVReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"description":"advisory.OTRS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"description":"advisory.OctopusDeploy","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"description":"advisory.Okta","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"description":"advisory.Omron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"description":"advisory.OneE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"description":"advisory.OpenBSD","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"description":"advisory.OpenCVDB","properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"description":"advisory.OpenJDK","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"description":"advisory.OpenJDKCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"description":"advisory.OpenSSH","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"description":"advisory.OpenSSLSecAdv","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"description":"advisory.OpenSSLVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"description":"advisory.OpenStack","properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"description":"advisory.Opengear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"description":"advisory.OracleCPU","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"description":"advisory.OracleCPUCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"description":"advisory.OriginalGHSA","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"description":"advisory.OvalCVE","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"description":"advisory.OvalReference","properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"description":"advisory.Override","properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"description":"advisory.OverrideAnnotation","properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"description":"advisory.OverrideCVE","properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"description":"advisory.OverrideConfiguration","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"description":"advisory.OwnCloud","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"description":"advisory.PGFix","properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"description":"advisory.PHPMyAdmin","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"description":"advisory.PKCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"description":"advisory.PTC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"description":"advisory.PTMDescriptions","properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"description":"advisory.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"description":"advisory.PackageStat","properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"description":"advisory.PacketstormExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"description":"advisory.Palantir","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"description":"advisory.PaloAltoAdvisory","properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"description":"advisory.Panasonic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"description":"advisory.PaperCut","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"description":"advisory.Patch","properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"description":"advisory.Pega","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"description":"advisory.PhilipsAdvisory","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"description":"advisory.PhoenixContactAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"description":"advisory.PostgresSQL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"description":"advisory.PowerDNS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"description":"advisory.PrimeVersion","properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"description":"advisory.Product","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"description":"advisory.ProductSpecificDetail","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"description":"advisory.ProductsAffected","properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"description":"advisory.Progress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"description":"advisory.Proofpoint","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"description":"advisory.Publisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"description":"advisory.PureStorage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"description":"advisory.PyPAAdvisory","properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"description":"advisory.PyPAAffected","properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"description":"advisory.PyPAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"description":"advisory.PyPAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"description":"advisory.PyPARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"description":"advisory.PyPAReference","properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"description":"advisory.QNAPAdvisory","properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"description":"advisory.QQID","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"description":"advisory.QSB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"description":"advisory.Qualcomm","properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"description":"advisory.Qualys","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"description":"advisory.QualysQID","properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"description":"advisory.RDescription","properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"description":"advisory.RNote","properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"description":"advisory.RRevision","properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"description":"advisory.RScoreSet","properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"description":"advisory.RThreat","properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"description":"advisory.Range","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"description":"advisory.RansomwareExploit","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"description":"advisory.RecordType","properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"description":"advisory.RedLion","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"description":"advisory.RedhatCVE","properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"description":"advisory.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"description":"advisory.RelatedRule","properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"description":"advisory.RemediationData","properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"description":"advisory.Renesas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"description":"advisory.ReportedExploit","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"description":"advisory.RestartData","properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"description":"advisory.RevisionHistory","properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"description":"advisory.Revive","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"description":"advisory.RhelCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"description":"advisory.Roche","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"description":"advisory.RocheCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"description":"advisory.Rockwell","properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"description":"advisory.RockwellAffectedProduct","properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"description":"advisory.RockyAdvisory","properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"description":"advisory.RockyCve","properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"description":"advisory.RockyErrata","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"description":"advisory.RockyFix","properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"description":"advisory.RockyPackage","properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"description":"advisory.RockyRpms","type":"object"},"advisory.RockyVersion":{"description":"advisory.RockyVersion","properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"description":"advisory.Rsync","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"description":"advisory.Ruckus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"description":"advisory.RustsecAdvisory","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"description":"advisory.RustsecAffected","properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"description":"advisory.RustsecFrontMatterAdvisory","properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"description":"advisory.RustsecFrontMatterVersions","properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"description":"advisory.SAAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"description":"advisory.SAP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"description":"advisory.SECConsult","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"description":"advisory.SSASource","properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"description":"advisory.SSDAdvisory","properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"description":"advisory.Safran","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"description":"advisory.SaintExploit","properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"description":"advisory.SalesForce","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"description":"advisory.Samba","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Sandisk":{"description":"advisory.Sandisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"description":"advisory.SansDshield","properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"description":"advisory.SchneiderCVE","properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"description":"advisory.SchneiderElectricAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"description":"advisory.Schutzwerk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"description":"advisory.SecFix","properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"description":"advisory.SecurityBulletin","properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"description":"advisory.SecurityLab","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"description":"advisory.SeebugExploit","properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"description":"advisory.Sel","properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"description":"advisory.SentinelOne","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"description":"advisory.ServiceNow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"description":"advisory.SevenZip","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"description":"advisory.Severity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"description":"advisory.ShadowServerExploitedVulnerability","properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"description":"advisory.Shielder","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"description":"advisory.Sick","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"description":"advisory.SiemensAcknowledgments","properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"description":"advisory.SiemensAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"description":"advisory.SiemensBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"description":"advisory.SiemensCVSSV3","properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"description":"advisory.SiemensCWE","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"description":"advisory.SiemensDistribution","properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"description":"advisory.SiemensDocument","properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"description":"advisory.SiemensEngine","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"description":"advisory.SiemensGenerator","properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"description":"advisory.SiemensNotes","properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"description":"advisory.SiemensProduct","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"description":"advisory.SiemensProductIdentificationHelper","properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"description":"advisory.SiemensProductStatus","properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"description":"advisory.SiemensProductTree","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"description":"advisory.SiemensPublisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"description":"advisory.SiemensReferences","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"description":"advisory.SiemensRemediation","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"description":"advisory.SiemensRevisionHistory","properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"description":"advisory.SiemensScore","properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"description":"advisory.SiemensSubBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"description":"advisory.SiemensSubSubBranch","properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"description":"advisory.SiemensTLP","properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"description":"advisory.SiemensTracking","properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"description":"advisory.SiemensVulnerability","properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"description":"advisory.SierraWireless","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"description":"advisory.SigmaRule","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"description":"advisory.SigmaRuleRule","properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"description":"advisory.SingCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"description":"advisory.Sitecore","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"description":"advisory.Slackware","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"description":"advisory.SoftwareUpdate","properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"description":"advisory.SolarWindsAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"description":"advisory.Solr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"description":"advisory.Sonatype","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"description":"advisory.SonicWallAdvisory","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"description":"advisory.SpacelabsHealthcareAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"description":"advisory.Splunk","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"description":"advisory.SplunkProduct","properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"description":"advisory.Spring","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"description":"advisory.Stormshield","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"description":"advisory.StrykerAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"description":"advisory.Sudo","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"description":"advisory.SuseSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"description":"advisory.SwisslogHealthcareAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"description":"advisory.Symfony","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"description":"advisory.Synacktiv","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"description":"advisory.SyncroSoft","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"description":"advisory.Synology","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"description":"advisory.Syss","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"description":"advisory.TI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"description":"advisory.TPLink","properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"description":"advisory.TWCertAdvisory","properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"description":"advisory.Tailscale","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"description":"advisory.TalosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"description":"advisory.TeamViewer","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"description":"advisory.TenableResearchAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"description":"advisory.Tencent","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"description":"advisory.Thales","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"description":"advisory.TheMissingLink","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"description":"advisory.ThermoFisher","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"description":"advisory.ThreatActorWithExternalObjects","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"description":"advisory.ThreatData","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"description":"advisory.Tibco","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"description":"advisory.Timeline","properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"description":"advisory.Tool","properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"description":"advisory.ToolRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"description":"advisory.Tracking","properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"description":"advisory.TrackingID","properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"description":"advisory.TraneTechnology","properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"description":"advisory.TrendMicro","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"description":"advisory.TriageNotes","properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"description":"advisory.Trustwave","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"description":"advisory.USD","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"description":"advisory.USOMAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"description":"advisory.Ubiquiti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"description":"advisory.UbuntuCVE","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"description":"advisory.UbuntuPackageReleaseStatus","properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"description":"advisory.Unify","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"description":"advisory.Unisoc","properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"description":"advisory.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"description":"advisory.Updated","type":"object"},"advisory.V3AcceptanceLevel":{"description":"advisory.V3AcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"description":"advisory.VCCPEDictionary","properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"description":"advisory.VCVulnerableCPEs","properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"description":"advisory.VDEAdvisory","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"description":"advisory.VLC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"description":"advisory.VMWareAdvisory","properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"description":"advisory.VYAIREAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"description":"advisory.VanDyke","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"description":"advisory.VapidLabsAdvisory","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"description":"advisory.Veeam","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"description":"advisory.VendorNameForThreatActor","properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"description":"advisory.VendorProduct","properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"description":"advisory.VendorRef","properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"description":"advisory.Veritas","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"description":"advisory.Virtuozzo","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"description":"advisory.VoidSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"description":"advisory.VulnCheck","properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"description":"advisory.VulnCheckCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"description":"advisory.VulnCheckConfig","properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"description":"advisory.VulnCheckKEV","properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"description":"advisory.VulnCheckPackage","properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"description":"advisory.VulnerableDebianPackage","properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"description":"advisory.VulnerableProduct","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"description":"advisory.Vulnrichment","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"description":"advisory.VulnrichmentCVERef","properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"description":"advisory.VulnrichmentContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"description":"advisory.VulnrichmentContent","properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"description":"advisory.VulnrichmentMetric","properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"description":"advisory.VulnrichmentOption","properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"description":"advisory.VulnrichmentOther","properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"description":"advisory.WRT","properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"description":"advisory.WatchGuard","properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"description":"advisory.WhatsApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"description":"advisory.Wibu","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"description":"advisory.Wireshark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"description":"advisory.WithSecure","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"description":"advisory.WolfSSL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"description":"advisory.Wolfi","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"description":"advisory.WolfiPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"description":"advisory.WolfiSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"description":"advisory.Wordfence","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"description":"advisory.XDB","properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"description":"advisory.Xen","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"description":"advisory.Xerox","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"description":"advisory.Xiaomi","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"description":"advisory.Xylem","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"description":"advisory.Yamaha","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"description":"advisory.YokogawaAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"description":"advisory.Yubico","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"description":"advisory.ZDI","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"description":"advisory.ZDIProduct","properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"description":"advisory.ZDIResponse","properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"description":"advisory.ZDIResponseVendor","properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"description":"advisory.ZDIVendor","properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"description":"advisory.Zebra","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"description":"advisory.ZeroDayAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"description":"advisory.ZeroScienceAdvisory","properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"description":"advisory.Zimbra","properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"description":"advisory.Zoom","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"description":"advisory.Zscaler","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"description":"advisory.ZuluVersion","properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"description":"advisory.Zuso","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"description":"advisory.Zyxel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"description":"api.BaseMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"description":"api.BaseMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"description":"api.CPE","properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"description":"api.CPEMatch","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"description":"api.CPEName","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"description":"api.CVE","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"description":"api.CVEDataMeta","properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"description":"api.CVEDataMetaExtended","properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"description":"api.CVEExtended","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"description":"api.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"description":"api.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"description":"api.CWE","properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"description":"api.CategorizationExtended","properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"description":"api.ClientFingerprints","properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"description":"api.Configurations","properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"description":"api.CveItems","properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"description":"api.CveItemsExtended","properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"description":"api.DateTime","type":"object"},"api.Description":{"description":"api.Description","properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"description":"api.DescriptionData","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"description":"api.EPSSData","properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"description":"api.ExploitChain","properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"description":"api.ExploitChainCVE","properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"description":"api.ExploitV3Result","properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"description":"api.ExploitsChange","properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"description":"api.ExploitsChangelog","properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"description":"api.ExploitsTrending","properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"description":"api.ExploitsV3Count","properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"description":"api.ExploitsV3Timeline","properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"description":"api.HTTPDetails","properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"description":"api.Impact","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"description":"api.ImpactExtended","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"description":"api.InitialAccess","properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"description":"api.InitialAccessArtifact","properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"description":"api.MitreAttackTech","properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"description":"api.MitreAttackToCVE","properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"description":"api.MitreD3fendTechnique","properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"description":"api.MitreDetectionTech","properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"description":"api.MitreMitigation2D3fendMapping","properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"description":"api.MitreMitigationTech","properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"description":"api.NVD20CPEMatch","properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"description":"api.NVD20CPEName","properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"description":"api.NVD20CVE","properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"description":"api.NVD20CVEExtended","properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"description":"api.NVD20CvssDataV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"description":"api.NVD20CvssDataV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"description":"api.NVD20CvssMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"description":"api.NVD20CvssMetricV3","properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"description":"api.NVD20CvssMetricV40","properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"description":"api.NVD20Description","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"description":"api.NVD20Metric","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"description":"api.NVD20MetricExtended","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"description":"api.NVD20Reference","properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"description":"api.NVD20ReferenceExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"description":"api.NVD20TemporalAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"description":"api.NVD20TemporalCVSSV2","properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"description":"api.NVD20TemporalCVSSV3","properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"description":"api.NVD20ThreatAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"description":"api.NVD20ThreatCVSSV40","properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"description":"api.NVD20VendorComment","properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"description":"api.NVD20Weakness","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"description":"api.NVD20WeaknessDescExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"description":"api.NVD20WeaknessExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"description":"api.Nodes","properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"description":"api.NormalizedExploitV3Entry","properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"description":"api.NormalizedReportV3Entry","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"description":"api.OSSPackage","properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"description":"api.OSSPackageArtifacts","properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"description":"api.OSSPackageDownloadInfo","properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"description":"api.OSSPackageHashInfo","properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"description":"api.OSSPackageResearchAttributes","properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"description":"api.OSSPackageVulnerability","properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"description":"api.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"description":"api.ProblemType","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"description":"api.ProblemTypeData","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"description":"api.ProblemTypeDataExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"description":"api.ProblemTypeDescription","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"description":"api.ProblemTypeDescriptionExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"description":"api.ProblemTypeExtended","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"description":"api.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"description":"api.ReferenceData","properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"description":"api.ReferenceDataExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"description":"api.References","properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"description":"api.ReferencesExtended","properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"description":"api.RelatedAttackPattern","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"description":"api.SSVC","properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"description":"api.TemporalCVSSV2","properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"description":"api.TemporalCVSSV3","properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"description":"api.TemporalMetricV2","properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"description":"api.TemporalMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"description":"api.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"description":"api.VulnCheckCanary","properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"description":"api.VulnerabilityAlias","properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"description":"models.Entitlements","properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"description":"paginate.Match","properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"description":"paginate.Pagination","properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"description":"paginate.Param","properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"description":"params.IndexBackup","properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"description":"params.IndexBackupList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"description":"params.IndexList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"description":"purl.BatchVulnFinding","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"description":"purl.QualifierJSON","properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"description":"purls.Artifact","type":"object"},"purls.PurlResponse":{"description":"purls.PurlResponse","properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"description":"purls.Vulnerability","properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"description":"render.Response-array_params_IndexBackupList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"description":"render.Response-array_params_IndexList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"description":"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"search.ErrorResponse":{"description":"search.ErrorResponse","properties":{"error":{"type":"boolean"},"errors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4AdvisoryMeta":{"description":"search.V4AdvisoryMeta","properties":{"cursor":{"type":"string"},"filtered":{"type":"integer"},"limit":{"type":"integer"},"next_cursor":{"type":"string"},"page":{"type":"integer"},"pages":{"type":"integer"},"total":{"type":"integer"}},"type":"object"},"search.V4AdvisoryReturnValue":{"description":"search.V4AdvisoryReturnValue","properties":{"_meta":{"$ref":"#/components/schemas/search.V4AdvisoryMeta"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4FeedItem":{"description":"search.V4FeedItem","properties":{"description":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"search.V4ListFeedReturnValue":{"description":"search.V4ListFeedReturnValue","properties":{"data":{"items":{"$ref":"#/components/schemas/search.V4FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"description":"v3controllers.BackupResponseMetadata","properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"description":"v3controllers.PurlResponseData","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"description":"v3controllers.PurlResponseMetadata","properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"description":"v3controllers.PurlsResponseMetadata","properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"description":"v3controllers.ResponseMetadata","properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"VulnCheck API (v3 + v4)","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"latest"},"openapi":"3.1.0","paths":{"/advisory":{"get":{"description":"Query the VulnCheck v4 advisory index","parameters":[{"description":"Filter by advisory feed name (e.g. 'vulncheck')","in":"query","name":"name","schema":{"type":"string"}},{"description":"Filter by CVE ID (e.g. 'CVE-2024-1234')","in":"query","name":"cve_id","schema":{"type":"string"}},{"description":"Filter by vendor name","in":"query","name":"vendor","schema":{"type":"string"}},{"description":"Filter by product name","in":"query","name":"product","schema":{"type":"string"}},{"description":"Filter by OS/platform","in":"query","name":"platform","schema":{"type":"string"}},{"description":"Filter by product version (semver-aware)","in":"query","name":"version","schema":{"type":"string"}},{"description":"Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')","in":"query","name":"cpe","schema":{"type":"string"}},{"description":"Filter by package name","in":"query","name":"package_name","schema":{"type":"string"}},{"description":"Filter by package URL (PURL)","in":"query","name":"purl","schema":{"type":"string"}},{"description":"Filter by reference URL","in":"query","name":"reference_url","schema":{"type":"string"}},{"description":"Filter by reference tag (e.g. 'patch', 'advisory')","in":"query","name":"reference_tag","schema":{"type":"string"}},{"description":"Filter by description language (e.g. 'en')","in":"query","name":"description_lang","schema":{"type":"string"}},{"description":"Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')","in":"query","name":"updatedAfter","schema":{"type":"string"}},{"description":"Return advisories updated before this date (RFC3339 or date-math)","in":"query","name":"updatedBefore","schema":{"type":"string"}},{"description":"Page number (default: 1)","in":"query","name":"page","schema":{"type":"integer"}},{"description":"Results per page, max 100 (default: 10)","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)","in":"query","name":"start_cursor","schema":{"type":"string"}},{"description":"Cursor from previous response _meta.next_cursor to fetch the next page","in":"query","name":"cursor","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4AdvisoryReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v4"}],"summary":"Query advisories","tags":["advisory"]}},"/advisory/list":{"get":{"description":"Return a list of available advisory feed names","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4ListFeedReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v4"}],"summary":"List advisory feeds","tags":["advisory"]}},"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com/v3"}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"servers":[{"url":"https://api.vulncheck.com/v3"},{"url":"https://api.vulncheck.com/v4"}]} \ No newline at end of file diff --git a/pyproject.toml b/pyproject.toml index 1a5d9aa4..6f4778eb 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "vulncheck_sdk" -version = "0.0.41" +version = "0.0.42" description = "VulnCheck API" authors = [ {name = "VulnCheck API Support",email = "support@vulncheck.com"}, diff --git a/python-generator-config.yaml b/python-generator-config.yaml index 3d6ede8d..595c5b23 100644 --- a/python-generator-config.yaml +++ b/python-generator-config.yaml @@ -2,4 +2,4 @@ additionalProperties: projectName: "vulncheck-sdk" packageName: "vulncheck_sdk" packageUrl: "https://github.com/vulncheck-oss/sdk-python/tree/main" - packageVersion: "0.0.41" + packageVersion: "0.0.42" diff --git a/setup.py b/setup.py index 6f0c5b49..b4122eac 100644 --- a/setup.py +++ b/setup.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -22,7 +22,7 @@ # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools NAME = "vulncheck-sdk" -VERSION = "0.0.41" +VERSION = "0.0.42" PYTHON_REQUIRES = ">= 3.9" REQUIRES = [ "aiohttp_retry >= 2.8.3", @@ -46,7 +46,7 @@ include_package_data=True, long_description_content_type='text/markdown', long_description="""\ - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) """, # noqa: E501 package_data={"vulncheck_sdk": ["py.typed"]}, ) \ No newline at end of file diff --git a/test/aio/test_advisory_a10.py b/test/aio/test_advisory_a10.py index 35b4bbee..07769c78 100644 --- a/test/aio/test_advisory_a10.py +++ b/test/aio/test_advisory_a10.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_abb_advisory.py b/test/aio/test_advisory_abb_advisory.py index 88ba17d8..872d316d 100644 --- a/test/aio/test_advisory_abb_advisory.py +++ b/test/aio/test_advisory_abb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_abbott.py b/test/aio/test_advisory_abbott.py index 0124c44f..9bc46132 100644 --- a/test/aio/test_advisory_abbott.py +++ b/test/aio/test_advisory_abbott.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_absolute.py b/test/aio/test_advisory_absolute.py index 74839339..6cb0727b 100644 --- a/test/aio/test_advisory_absolute.py +++ b/test/aio/test_advisory_absolute.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_acknowledgement.py b/test/aio/test_advisory_acknowledgement.py index e9ab7bae..3da1ef18 100644 --- a/test/aio/test_advisory_acknowledgement.py +++ b/test/aio/test_advisory_acknowledgement.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_acronis.py b/test/aio/test_advisory_acronis.py index 725c68d5..20a48114 100644 --- a/test/aio/test_advisory_acronis.py +++ b/test/aio/test_advisory_acronis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adobe_advisory.py b/test/aio/test_advisory_adobe_advisory.py index bbae0886..9efb888c 100644 --- a/test/aio/test_advisory_adobe_advisory.py +++ b/test/aio/test_advisory_adobe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adobe_affected.py b/test/aio/test_advisory_adobe_affected.py index ddae460e..b2ff7a00 100644 --- a/test/aio/test_advisory_adobe_affected.py +++ b/test/aio/test_advisory_adobe_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adobe_cve.py b/test/aio/test_advisory_adobe_cve.py index 0d3f03ae..a1db748a 100644 --- a/test/aio/test_advisory_adobe_cve.py +++ b/test/aio/test_advisory_adobe_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adobe_solution.py b/test/aio/test_advisory_adobe_solution.py index d9bb197f..6df21f94 100644 --- a/test/aio/test_advisory_adobe_solution.py +++ b/test/aio/test_advisory_adobe_solution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adp.py b/test/aio/test_advisory_adp.py index 775eda60..0b458d60 100644 --- a/test/aio/test_advisory_adp.py +++ b/test/aio/test_advisory_adp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_adp_container.py b/test/aio/test_advisory_adp_container.py index dc27b84e..af78d86b 100644 --- a/test/aio/test_advisory_adp_container.py +++ b/test/aio/test_advisory_adp_container.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_advantech.py b/test/aio/test_advisory_advantech.py index 3732a484..f2823d87 100644 --- a/test/aio/test_advisory_advantech.py +++ b/test/aio/test_advisory_advantech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_advisory.py b/test/aio/test_advisory_advisory.py index 68230494..04a779f9 100644 --- a/test/aio/test_advisory_advisory.py +++ b/test/aio/test_advisory_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_advisory_details.py b/test/aio/test_advisory_advisory_details.py index 2187c3f3..4c0674b6 100644 --- a/test/aio/test_advisory_advisory_details.py +++ b/test/aio/test_advisory_advisory_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,11 +44,9 @@ def make_instance(self, include_optional) -> AdvisoryAdvisoryDetails: href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = None, severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ) + updated = None ) else: return AdvisoryAdvisoryDetails( diff --git a/test/aio/test_advisory_advisory_record.py b/test/aio/test_advisory_advisory_record.py index 15182632..0cb30330 100644 --- a/test/aio/test_advisory_advisory_record.py +++ b/test/aio/test_advisory_advisory_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected.py b/test/aio/test_advisory_affected.py index 048827c2..76fcb588 100644 --- a/test/aio/test_advisory_affected.py +++ b/test/aio/test_advisory_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_chrome.py b/test/aio/test_advisory_affected_chrome.py index cbc151f9..26dad7cd 100644 --- a/test/aio/test_advisory_affected_chrome.py +++ b/test/aio/test_advisory_affected_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_debian_package.py b/test/aio/test_advisory_affected_debian_package.py index 0c33508c..a598d695 100644 --- a/test/aio/test_advisory_affected_debian_package.py +++ b/test/aio/test_advisory_affected_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_debian_release.py b/test/aio/test_advisory_affected_debian_release.py index abbf3b42..dbd42512 100644 --- a/test/aio/test_advisory_affected_debian_release.py +++ b/test/aio/test_advisory_affected_debian_release.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_debian_repository.py b/test/aio/test_advisory_affected_debian_repository.py index 3c4c4a2f..e2f03d0f 100644 --- a/test/aio/test_advisory_affected_debian_repository.py +++ b/test/aio/test_advisory_affected_debian_repository.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_file.py b/test/aio/test_advisory_affected_file.py index 77377cc6..4e31d43e 100644 --- a/test/aio/test_advisory_affected_file.py +++ b/test/aio/test_advisory_affected_file.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_product.py b/test/aio/test_advisory_affected_product.py index 68d81275..6d58ea08 100644 --- a/test/aio/test_advisory_affected_product.py +++ b/test/aio/test_advisory_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_rel.py b/test/aio/test_advisory_affected_rel.py index 91d7af7e..e81d76c1 100644 --- a/test/aio/test_advisory_affected_rel.py +++ b/test/aio/test_advisory_affected_rel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_affected_ubuntu_package.py b/test/aio/test_advisory_affected_ubuntu_package.py index b21c968e..b832965d 100644 --- a/test/aio/test_advisory_affected_ubuntu_package.py +++ b/test/aio/test_advisory_affected_ubuntu_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aix.py b/test/aio/test_advisory_aix.py index 0357bcf7..74856cb2 100644 --- a/test/aio/test_advisory_aix.py +++ b/test/aio/test_advisory_aix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aleph_research.py b/test/aio/test_advisory_aleph_research.py index c6f32b15..4129c370 100644 --- a/test/aio/test_advisory_aleph_research.py +++ b/test/aio/test_advisory_aleph_research.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alibaba.py b/test/aio/test_advisory_alibaba.py index e261cee7..452a2f5a 100644 --- a/test/aio/test_advisory_alibaba.py +++ b/test/aio/test_advisory_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_date.py b/test/aio/test_advisory_alma_date.py index 078fed28..05a45dc8 100644 --- a/test/aio/test_advisory_alma_date.py +++ b/test/aio/test_advisory_alma_date.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_linux_update.py b/test/aio/test_advisory_alma_linux_update.py index 84408e54..81c59360 100644 --- a/test/aio/test_advisory_alma_linux_update.py +++ b/test/aio/test_advisory_alma_linux_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_object_id.py b/test/aio/test_advisory_alma_object_id.py index c3d90a8e..f0ab3410 100644 --- a/test/aio/test_advisory_alma_object_id.py +++ b/test/aio/test_advisory_alma_object_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_package.py b/test/aio/test_advisory_alma_package.py index 87b852f4..fd84227e 100644 --- a/test/aio/test_advisory_alma_package.py +++ b/test/aio/test_advisory_alma_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_package_list.py b/test/aio/test_advisory_alma_package_list.py index d55ea710..ca5460fa 100644 --- a/test/aio/test_advisory_alma_package_list.py +++ b/test/aio/test_advisory_alma_package_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alma_reference.py b/test/aio/test_advisory_alma_reference.py index 187f760f..d0346e06 100644 --- a/test/aio/test_advisory_alma_reference.py +++ b/test/aio/test_advisory_alma_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alpine_linux_sec_db.py b/test/aio/test_advisory_alpine_linux_sec_db.py index 50939d1e..7e53243b 100644 --- a/test/aio/test_advisory_alpine_linux_sec_db.py +++ b/test/aio/test_advisory_alpine_linux_sec_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alpine_linux_sec_db_package.py b/test/aio/test_advisory_alpine_linux_sec_db_package.py index c00181ca..69c088ed 100644 --- a/test/aio/test_advisory_alpine_linux_sec_db_package.py +++ b/test/aio/test_advisory_alpine_linux_sec_db_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_alpine_linux_security_fix.py b/test/aio/test_advisory_alpine_linux_security_fix.py index 29a4be22..5f4f3673 100644 --- a/test/aio/test_advisory_alpine_linux_security_fix.py +++ b/test/aio/test_advisory_alpine_linux_security_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_amazon_affected_package.py b/test/aio/test_advisory_amazon_affected_package.py index 750a3a52..cca762d7 100644 --- a/test/aio/test_advisory_amazon_affected_package.py +++ b/test/aio/test_advisory_amazon_affected_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_amazon_cve.py b/test/aio/test_advisory_amazon_cve.py index 0757a693..6a6a9056 100644 --- a/test/aio/test_advisory_amazon_cve.py +++ b/test/aio/test_advisory_amazon_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_amd.py b/test/aio/test_advisory_amd.py index b2036ebf..6d71ca90 100644 --- a/test/aio/test_advisory_amd.py +++ b/test/aio/test_advisory_amd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ami.py b/test/aio/test_advisory_ami.py index 6afdab20..7956d7e0 100644 --- a/test/aio/test_advisory_ami.py +++ b/test/aio/test_advisory_ami.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_anchore_nvd_override.py b/test/aio/test_advisory_anchore_nvd_override.py index 8ebe29f6..594e3d8d 100644 --- a/test/aio/test_advisory_anchore_nvd_override.py +++ b/test/aio/test_advisory_anchore_nvd_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_advisory.py b/test/aio/test_advisory_android_advisory.py index 37d4e5ef..654688c4 100644 --- a/test/aio/test_advisory_android_advisory.py +++ b/test/aio/test_advisory_android_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_affected.py b/test/aio/test_advisory_android_affected.py index 2210f73e..1381c7a9 100644 --- a/test/aio/test_advisory_android_affected.py +++ b/test/aio/test_advisory_android_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_event.py b/test/aio/test_advisory_android_event.py index 46d431b5..5522ca35 100644 --- a/test/aio/test_advisory_android_event.py +++ b/test/aio/test_advisory_android_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_package.py b/test/aio/test_advisory_android_package.py index 0cd17991..9b632f11 100644 --- a/test/aio/test_advisory_android_package.py +++ b/test/aio/test_advisory_android_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_range.py b/test/aio/test_advisory_android_range.py index 2e624584..1ecf26e6 100644 --- a/test/aio/test_advisory_android_range.py +++ b/test/aio/test_advisory_android_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_android_reference.py b/test/aio/test_advisory_android_reference.py index 7024524f..a1b18971 100644 --- a/test/aio/test_advisory_android_reference.py +++ b/test/aio/test_advisory_android_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_active_mq.py b/test/aio/test_advisory_apache_active_mq.py index d8152ead..1fe2c851 100644 --- a/test/aio/test_advisory_apache_active_mq.py +++ b/test/aio/test_advisory_apache_active_mq.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_archiva.py b/test/aio/test_advisory_apache_archiva.py index a3048781..a6bce5a0 100644 --- a/test/aio/test_advisory_apache_archiva.py +++ b/test/aio/test_advisory_apache_archiva.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_arrow.py b/test/aio/test_advisory_apache_arrow.py index b5705a61..8f35dc8a 100644 --- a/test/aio/test_advisory_apache_arrow.py +++ b/test/aio/test_advisory_apache_arrow.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_camel.py b/test/aio/test_advisory_apache_camel.py index 296e099d..7525145a 100644 --- a/test/aio/test_advisory_apache_camel.py +++ b/test/aio/test_advisory_apache_camel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_commons.py b/test/aio/test_advisory_apache_commons.py index ac256583..63f33249 100644 --- a/test/aio/test_advisory_apache_commons.py +++ b/test/aio/test_advisory_apache_commons.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_couch_db.py b/test/aio/test_advisory_apache_couch_db.py index 8bc40c60..c97f2c2d 100644 --- a/test/aio/test_advisory_apache_couch_db.py +++ b/test/aio/test_advisory_apache_couch_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_flink.py b/test/aio/test_advisory_apache_flink.py index 689059cb..8a05bb1c 100644 --- a/test/aio/test_advisory_apache_flink.py +++ b/test/aio/test_advisory_apache_flink.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_guacamole.py b/test/aio/test_advisory_apache_guacamole.py index f8dcc235..f26ea18e 100644 --- a/test/aio/test_advisory_apache_guacamole.py +++ b/test/aio/test_advisory_apache_guacamole.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_hadoop.py b/test/aio/test_advisory_apache_hadoop.py index b4ccc285..602bfa58 100644 --- a/test/aio/test_advisory_apache_hadoop.py +++ b/test/aio/test_advisory_apache_hadoop.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_http.py b/test/aio/test_advisory_apache_http.py index 1b732979..243536d7 100644 --- a/test/aio/test_advisory_apache_http.py +++ b/test/aio/test_advisory_apache_http.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_jsp_wiki.py b/test/aio/test_advisory_apache_jsp_wiki.py index c8544d0d..75432f4a 100644 --- a/test/aio/test_advisory_apache_jsp_wiki.py +++ b/test/aio/test_advisory_apache_jsp_wiki.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_kafka.py b/test/aio/test_advisory_apache_kafka.py index 6fc219a8..f645efd9 100644 --- a/test/aio/test_advisory_apache_kafka.py +++ b/test/aio/test_advisory_apache_kafka.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_logging_services.py b/test/aio/test_advisory_apache_logging_services.py index 82a1f30b..a5ed6759 100644 --- a/test/aio/test_advisory_apache_logging_services.py +++ b/test/aio/test_advisory_apache_logging_services.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_ni_fi.py b/test/aio/test_advisory_apache_ni_fi.py index 5c4afa54..7a715c91 100644 --- a/test/aio/test_advisory_apache_ni_fi.py +++ b/test/aio/test_advisory_apache_ni_fi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_of_biz.py b/test/aio/test_advisory_apache_of_biz.py index 5d83fae8..f43aa934 100644 --- a/test/aio/test_advisory_apache_of_biz.py +++ b/test/aio/test_advisory_apache_of_biz.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_open_meetings.py b/test/aio/test_advisory_apache_open_meetings.py index d2b31371..e8889c76 100644 --- a/test/aio/test_advisory_apache_open_meetings.py +++ b/test/aio/test_advisory_apache_open_meetings.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_open_office.py b/test/aio/test_advisory_apache_open_office.py index 6385de40..eaffe960 100644 --- a/test/aio/test_advisory_apache_open_office.py +++ b/test/aio/test_advisory_apache_open_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_pulsar.py b/test/aio/test_advisory_apache_pulsar.py index b13bfc60..c3fe099e 100644 --- a/test/aio/test_advisory_apache_pulsar.py +++ b/test/aio/test_advisory_apache_pulsar.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_shiro.py b/test/aio/test_advisory_apache_shiro.py index 5036daea..5cb0ee7a 100644 --- a/test/aio/test_advisory_apache_shiro.py +++ b/test/aio/test_advisory_apache_shiro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_spark.py b/test/aio/test_advisory_apache_spark.py index 3b5a17a8..843f8dae 100644 --- a/test/aio/test_advisory_apache_spark.py +++ b/test/aio/test_advisory_apache_spark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_struts.py b/test/aio/test_advisory_apache_struts.py index aed82db5..e84dcc48 100644 --- a/test/aio/test_advisory_apache_struts.py +++ b/test/aio/test_advisory_apache_struts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_subversion.py b/test/aio/test_advisory_apache_subversion.py index 00171952..5855e3bc 100644 --- a/test/aio/test_advisory_apache_subversion.py +++ b/test/aio/test_advisory_apache_subversion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_superset.py b/test/aio/test_advisory_apache_superset.py index ce98b9bc..6005c607 100644 --- a/test/aio/test_advisory_apache_superset.py +++ b/test/aio/test_advisory_apache_superset.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_tomcat.py b/test/aio/test_advisory_apache_tomcat.py index 0c8165eb..aadcccd2 100644 --- a/test/aio/test_advisory_apache_tomcat.py +++ b/test/aio/test_advisory_apache_tomcat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apache_zoo_keeper.py b/test/aio/test_advisory_apache_zoo_keeper.py index ee8f72b2..9875171c 100644 --- a/test/aio/test_advisory_apache_zoo_keeper.py +++ b/test/aio/test_advisory_apache_zoo_keeper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_api.py b/test/aio/test_advisory_api.py new file mode 100644 index 00000000..8b270db4 --- /dev/null +++ b/test/aio/test_advisory_api.py @@ -0,0 +1,46 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.api.advisory_api import AdvisoryApi + + +class TestAdvisoryApi(unittest.IsolatedAsyncioTestCase): + """AdvisoryApi unit test stubs""" + + async def asyncSetUp(self) -> None: + self.api = AdvisoryApi() + + async def asyncTearDown(self) -> None: + await self.api.api_client.close() + + async def test_advisory_get(self) -> None: + """Test case for advisory_get + + Query advisories + """ + pass + + async def test_advisory_list_get(self) -> None: + """Test case for advisory_list_get + + List advisory feeds + """ + pass + + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_app_check.py b/test/aio/test_advisory_app_check.py index ee9ab5a5..11c359b2 100644 --- a/test/aio/test_advisory_app_check.py +++ b/test/aio/test_advisory_app_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_appgate.py b/test/aio/test_advisory_appgate.py index f19cf4f2..63bb5e02 100644 --- a/test/aio/test_advisory_appgate.py +++ b/test/aio/test_advisory_appgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apple_advisory.py b/test/aio/test_advisory_apple_advisory.py index 38dad30e..a565665c 100644 --- a/test/aio/test_advisory_apple_advisory.py +++ b/test/aio/test_advisory_apple_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_apple_component.py b/test/aio/test_advisory_apple_component.py index 2df95829..58c6c4c5 100644 --- a/test/aio/test_advisory_apple_component.py +++ b/test/aio/test_advisory_apple_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_arch_issue.py b/test/aio/test_advisory_arch_issue.py index 684d878c..8cfeb450 100644 --- a/test/aio/test_advisory_arch_issue.py +++ b/test/aio/test_advisory_arch_issue.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_arista.py b/test/aio/test_advisory_arista.py index 6416ad1b..37513a5c 100644 --- a/test/aio/test_advisory_arista.py +++ b/test/aio/test_advisory_arista.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aruba.py b/test/aio/test_advisory_aruba.py index 6fa6a908..f6cc55b1 100644 --- a/test/aio/test_advisory_aruba.py +++ b/test/aio/test_advisory_aruba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_asrg.py b/test/aio/test_advisory_asrg.py index cd8d805f..58a4513b 100644 --- a/test/aio/test_advisory_asrg.py +++ b/test/aio/test_advisory_asrg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_asset_note.py b/test/aio/test_advisory_asset_note.py index 314698b0..9c1994d8 100644 --- a/test/aio/test_advisory_asset_note.py +++ b/test/aio/test_advisory_asset_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_asterisk.py b/test/aio/test_advisory_asterisk.py index 7e503598..1849607b 100644 --- a/test/aio/test_advisory_asterisk.py +++ b/test/aio/test_advisory_asterisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_astra.py b/test/aio/test_advisory_astra.py index 8d13276f..43ac75ec 100644 --- a/test/aio/test_advisory_astra.py +++ b/test/aio/test_advisory_astra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_asus.py b/test/aio/test_advisory_asus.py index 43adb41e..2afab183 100644 --- a/test/aio/test_advisory_asus.py +++ b/test/aio/test_advisory_asus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_atlassian_advisory.py b/test/aio/test_advisory_atlassian_advisory.py index 80a6ec40..d9b40321 100644 --- a/test/aio/test_advisory_atlassian_advisory.py +++ b/test/aio/test_advisory_atlassian_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_atlassian_products.py b/test/aio/test_advisory_atlassian_products.py index fb387e8b..5f819528 100644 --- a/test/aio/test_advisory_atlassian_products.py +++ b/test/aio/test_advisory_atlassian_products.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_atlassian_vuln.py b/test/aio/test_advisory_atlassian_vuln.py index 76e39f5b..f54eccf7 100644 --- a/test/aio/test_advisory_atlassian_vuln.py +++ b/test/aio/test_advisory_atlassian_vuln.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_atredis.py b/test/aio/test_advisory_atredis.py index a5fd585c..0daa22cc 100644 --- a/test/aio/test_advisory_atredis.py +++ b/test/aio/test_advisory_atredis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_audiocodes.py b/test/aio/test_advisory_audiocodes.py index 1e1e652d..9fa1fcd2 100644 --- a/test/aio/test_advisory_audiocodes.py +++ b/test/aio/test_advisory_audiocodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aus_cert.py b/test/aio/test_advisory_aus_cert.py index b2065a95..cd8b2174 100644 --- a/test/aio/test_advisory_aus_cert.py +++ b/test/aio/test_advisory_aus_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_autodesk.py b/test/aio/test_advisory_autodesk.py index e1e95b43..1818f6a9 100644 --- a/test/aio/test_advisory_autodesk.py +++ b/test/aio/test_advisory_autodesk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_avaya.py b/test/aio/test_advisory_avaya.py index a4421dd2..cbf58d95 100644 --- a/test/aio/test_advisory_avaya.py +++ b/test/aio/test_advisory_avaya.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aveva_advisory.py b/test/aio/test_advisory_aveva_advisory.py index 27980b83..3e42e1a6 100644 --- a/test/aio/test_advisory_aveva_advisory.py +++ b/test/aio/test_advisory_aveva_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_avidml_advs.py b/test/aio/test_advisory_avidml_advs.py index 2cfcf7c9..47a453eb 100644 --- a/test/aio/test_advisory_avidml_advs.py +++ b/test/aio/test_advisory_avidml_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_avigilon.py b/test/aio/test_advisory_avigilon.py index 7fccdbef..27f8ce31 100644 --- a/test/aio/test_advisory_avigilon.py +++ b/test/aio/test_advisory_avigilon.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_award.py b/test/aio/test_advisory_award.py index b0e1c04c..426b217c 100644 --- a/test/aio/test_advisory_award.py +++ b/test/aio/test_advisory_award.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_aws.py b/test/aio/test_advisory_aws.py index 8aaf1d50..4fb80bbf 100644 --- a/test/aio/test_advisory_aws.py +++ b/test/aio/test_advisory_aws.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_axis.py b/test/aio/test_advisory_axis.py index 12c68376..ffd3b941 100644 --- a/test/aio/test_advisory_axis.py +++ b/test/aio/test_advisory_axis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_azul.py b/test/aio/test_advisory_azul.py index cbcf8482..5348b96e 100644 --- a/test/aio/test_advisory_azul.py +++ b/test/aio/test_advisory_azul.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_b_braun_advisory.py b/test/aio/test_advisory_b_braun_advisory.py index d7b870ed..34f90038 100644 --- a/test/aio/test_advisory_b_braun_advisory.py +++ b/test/aio/test_advisory_b_braun_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bandr.py b/test/aio/test_advisory_bandr.py index 32419385..3be6e044 100644 --- a/test/aio/test_advisory_bandr.py +++ b/test/aio/test_advisory_bandr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_baxter_advisory.py b/test/aio/test_advisory_baxter_advisory.py index 44fe2014..0c1d0ce8 100644 --- a/test/aio/test_advisory_baxter_advisory.py +++ b/test/aio/test_advisory_baxter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_advisory.py b/test/aio/test_advisory_bdu_advisory.py index 6f0077d3..ce4f307a 100644 --- a/test/aio/test_advisory_bdu_advisory.py +++ b/test/aio/test_advisory_bdu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_cvss.py b/test/aio/test_advisory_bdu_cvss.py index cbf88564..3c9b7470 100644 --- a/test/aio/test_advisory_bdu_cvss.py +++ b/test/aio/test_advisory_bdu_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_cvss3.py b/test/aio/test_advisory_bdu_cvss3.py index 47730663..5fb7124b 100644 --- a/test/aio/test_advisory_bdu_cvss3.py +++ b/test/aio/test_advisory_bdu_cvss3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_environment.py b/test/aio/test_advisory_bdu_environment.py index c668c59a..9a36a14f 100644 --- a/test/aio/test_advisory_bdu_environment.py +++ b/test/aio/test_advisory_bdu_environment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_soft.py b/test/aio/test_advisory_bdu_soft.py index 9f465419..951173f9 100644 --- a/test/aio/test_advisory_bdu_soft.py +++ b/test/aio/test_advisory_bdu_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_types.py b/test/aio/test_advisory_bdu_types.py index d73f5905..8f10ab83 100644 --- a/test/aio/test_advisory_bdu_types.py +++ b/test/aio/test_advisory_bdu_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_vector.py b/test/aio/test_advisory_bdu_vector.py index c8d22425..747d48b1 100644 --- a/test/aio/test_advisory_bdu_vector.py +++ b/test/aio/test_advisory_bdu_vector.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bdu_vulnerable_software.py b/test/aio/test_advisory_bdu_vulnerable_software.py index 7c5144ad..1a88f586 100644 --- a/test/aio/test_advisory_bdu_vulnerable_software.py +++ b/test/aio/test_advisory_bdu_vulnerable_software.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bduos.py b/test/aio/test_advisory_bduos.py index 5cda3e98..2962ba7b 100644 --- a/test/aio/test_advisory_bduos.py +++ b/test/aio/test_advisory_bduos.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_beckhoff_advisory.py b/test/aio/test_advisory_beckhoff_advisory.py index 56569aa0..7f299a0b 100644 --- a/test/aio/test_advisory_beckhoff_advisory.py +++ b/test/aio/test_advisory_beckhoff_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_beckman_coulter.py b/test/aio/test_advisory_beckman_coulter.py index d64ba8bf..a18733ea 100644 --- a/test/aio/test_advisory_beckman_coulter.py +++ b/test/aio/test_advisory_beckman_coulter.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_becton_dickinson_advisory.py b/test/aio/test_advisory_becton_dickinson_advisory.py index 0ce652d6..ac385a3a 100644 --- a/test/aio/test_advisory_becton_dickinson_advisory.py +++ b/test/aio/test_advisory_becton_dickinson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_belden_advisory.py b/test/aio/test_advisory_belden_advisory.py index 5705386b..da320850 100644 --- a/test/aio/test_advisory_belden_advisory.py +++ b/test/aio/test_advisory_belden_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_beyond_trust.py b/test/aio/test_advisory_beyond_trust.py index a469dc18..7bfd85e1 100644 --- a/test/aio/test_advisory_beyond_trust.py +++ b/test/aio/test_advisory_beyond_trust.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_binarly.py b/test/aio/test_advisory_binarly.py index 78e49cb2..fdb2da4d 100644 --- a/test/aio/test_advisory_binarly.py +++ b/test/aio/test_advisory_binarly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bit_defender.py b/test/aio/test_advisory_bit_defender.py index 71655170..5cd2f704 100644 --- a/test/aio/test_advisory_bit_defender.py +++ b/test/aio/test_advisory_bit_defender.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_black_berry.py b/test/aio/test_advisory_black_berry.py index fef9006b..9543c09a 100644 --- a/test/aio/test_advisory_black_berry.py +++ b/test/aio/test_advisory_black_berry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bls.py b/test/aio/test_advisory_bls.py index 219e05f4..45f4f1f5 100644 --- a/test/aio/test_advisory_bls.py +++ b/test/aio/test_advisory_bls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bosch_advisory.py b/test/aio/test_advisory_bosch_advisory.py index fa8bf871..d7a3b6f4 100644 --- a/test/aio/test_advisory_bosch_advisory.py +++ b/test/aio/test_advisory_bosch_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_boston_scientific_advisory.py b/test/aio/test_advisory_boston_scientific_advisory.py index cc8a3f29..94b63eea 100644 --- a/test/aio/test_advisory_boston_scientific_advisory.py +++ b/test/aio/test_advisory_boston_scientific_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_botnet.py b/test/aio/test_advisory_botnet.py index 8a674d42..98c7f5aa 100644 --- a/test/aio/test_advisory_botnet.py +++ b/test/aio/test_advisory_botnet.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_bugzilla.py b/test/aio/test_advisory_bugzilla.py index f5f79a24..e91fed18 100644 --- a/test/aio/test_advisory_bugzilla.py +++ b/test/aio/test_advisory_bugzilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ca_cyber_centre_advisory.py b/test/aio/test_advisory_ca_cyber_centre_advisory.py index b5310894..277f69b5 100644 --- a/test/aio/test_advisory_ca_cyber_centre_advisory.py +++ b/test/aio/test_advisory_ca_cyber_centre_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_canvas_exploit.py b/test/aio/test_advisory_canvas_exploit.py index f45a50ae..5e489689 100644 --- a/test/aio/test_advisory_canvas_exploit.py +++ b/test/aio/test_advisory_canvas_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_capec.py b/test/aio/test_advisory_capec.py index 142f1692..cfde25f6 100644 --- a/test/aio/test_advisory_capec.py +++ b/test/aio/test_advisory_capec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_carestream_advisory.py b/test/aio/test_advisory_carestream_advisory.py index 172203c5..74853ac0 100644 --- a/test/aio/test_advisory_carestream_advisory.py +++ b/test/aio/test_advisory_carestream_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_carrier.py b/test/aio/test_advisory_carrier.py index c29b2a16..19933b4d 100644 --- a/test/aio/test_advisory_carrier.py +++ b/test/aio/test_advisory_carrier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cbl_mariner.py b/test/aio/test_advisory_cbl_mariner.py index 87dd6222..c9ce0acb 100644 --- a/test/aio/test_advisory_cbl_mariner.py +++ b/test/aio/test_advisory_cbl_mariner.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_centos_package.py b/test/aio/test_advisory_centos_package.py index 243307f0..730e4be0 100644 --- a/test/aio/test_advisory_centos_package.py +++ b/test/aio/test_advisory_centos_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_be.py b/test/aio/test_advisory_cert_be.py index 9b790024..fd98c45a 100644 --- a/test/aio/test_advisory_cert_be.py +++ b/test/aio/test_advisory_cert_be.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_fr_advisory.py b/test/aio/test_advisory_cert_fr_advisory.py index fe1c834a..8188f22a 100644 --- a/test/aio/test_advisory_cert_fr_advisory.py +++ b/test/aio/test_advisory_cert_fr_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_in.py b/test/aio/test_advisory_cert_in.py index 3655ce4c..20f9d14c 100644 --- a/test/aio/test_advisory_cert_in.py +++ b/test/aio/test_advisory_cert_in.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_ir_security_alert.py b/test/aio/test_advisory_cert_ir_security_alert.py index 8e986ef1..3a76e04d 100644 --- a/test/aio/test_advisory_cert_ir_security_alert.py +++ b/test/aio/test_advisory_cert_ir_security_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_se.py b/test/aio/test_advisory_cert_se.py index 99d446b0..70b83fe6 100644 --- a/test/aio/test_advisory_cert_se.py +++ b/test/aio/test_advisory_cert_se.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cert_ua.py b/test/aio/test_advisory_cert_ua.py index 62147315..163b152c 100644 --- a/test/aio/test_advisory_cert_ua.py +++ b/test/aio/test_advisory_cert_ua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_certeu_advisory.py b/test/aio/test_advisory_certeu_advisory.py index 7a2b625b..b81936fe 100644 --- a/test/aio/test_advisory_certeu_advisory.py +++ b/test/aio/test_advisory_certeu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cesa.py b/test/aio/test_advisory_cesa.py index ac304d0c..575a7fc6 100644 --- a/test/aio/test_advisory_cesa.py +++ b/test/aio/test_advisory_cesa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_chain_guard.py b/test/aio/test_advisory_chain_guard.py index 5d629fe2..fd4154f7 100644 --- a/test/aio/test_advisory_chain_guard.py +++ b/test/aio/test_advisory_chain_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_chain_guard_package.py b/test/aio/test_advisory_chain_guard_package.py index 07a85d39..bb45013c 100644 --- a/test/aio/test_advisory_chain_guard_package.py +++ b/test/aio/test_advisory_chain_guard_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_chain_guard_sec_fix.py b/test/aio/test_advisory_chain_guard_sec_fix.py index 2cd4ec0b..56cd1226 100644 --- a/test/aio/test_advisory_chain_guard_sec_fix.py +++ b/test/aio/test_advisory_chain_guard_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_check_point.py b/test/aio/test_advisory_check_point.py index 620e2368..7c6eb3af 100644 --- a/test/aio/test_advisory_check_point.py +++ b/test/aio/test_advisory_check_point.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_chrome.py b/test/aio/test_advisory_chrome.py index b00d83c3..fb6759a3 100644 --- a/test/aio/test_advisory_chrome.py +++ b/test/aio/test_advisory_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ciena.py b/test/aio/test_advisory_ciena.py index dfafac78..efb3533c 100644 --- a/test/aio/test_advisory_ciena.py +++ b/test/aio/test_advisory_ciena.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cis_control.py b/test/aio/test_advisory_cis_control.py index 90330492..1573ef63 100644 --- a/test/aio/test_advisory_cis_control.py +++ b/test/aio/test_advisory_cis_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cisa_alert.py b/test/aio/test_advisory_cisa_alert.py index 3be46ed2..da043ed1 100644 --- a/test/aio/test_advisory_cisa_alert.py +++ b/test/aio/test_advisory_cisa_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cisa_csaf_adv.py b/test/aio/test_advisory_cisa_csaf_adv.py index 4b91efb9..5f9b105f 100644 --- a/test/aio/test_advisory_cisa_csaf_adv.py +++ b/test/aio/test_advisory_cisa_csaf_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: if include_optional: return AdvisoryCisaCsafAdv( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_cisco_advisory.py b/test/aio/test_advisory_cisco_advisory.py index 8a4e5d21..dbea545d 100644 --- a/test/aio/test_advisory_cisco_advisory.py +++ b/test/aio/test_advisory_cisco_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cisco_csaf.py b/test/aio/test_advisory_cisco_csaf.py index e7bfccdf..b6bbeefb 100644 --- a/test/aio/test_advisory_cisco_csaf.py +++ b/test/aio/test_advisory_cisco_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cisco_known_good_value.py b/test/aio/test_advisory_cisco_known_good_value.py index 7aec37ce..be8b2ebc 100644 --- a/test/aio/test_advisory_cisco_known_good_value.py +++ b/test/aio/test_advisory_cisco_known_good_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_citrix_advisory.py b/test/aio/test_advisory_citrix_advisory.py index 747da272..52d692be 100644 --- a/test/aio/test_advisory_citrix_advisory.py +++ b/test/aio/test_advisory_citrix_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_claroty_vulnerability.py b/test/aio/test_advisory_claroty_vulnerability.py index e3b732ae..21b9c408 100644 --- a/test/aio/test_advisory_claroty_vulnerability.py +++ b/test/aio/test_advisory_claroty_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cloud_bees.py b/test/aio/test_advisory_cloud_bees.py index 57b39e20..d853679c 100644 --- a/test/aio/test_advisory_cloud_bees.py +++ b/test/aio/test_advisory_cloud_bees.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cloud_vuln_db_advisory.py b/test/aio/test_advisory_cloud_vuln_db_advisory.py index fb465c89..6df8ca3e 100644 --- a/test/aio/test_advisory_cloud_vuln_db_advisory.py +++ b/test/aio/test_advisory_cloud_vuln_db_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cnnvd_entry_json.py b/test/aio/test_advisory_cnnvd_entry_json.py index 5eea145d..cd676286 100644 --- a/test/aio/test_advisory_cnnvd_entry_json.py +++ b/test/aio/test_advisory_cnnvd_entry_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cnvd_bulletin.py b/test/aio/test_advisory_cnvd_bulletin.py index 7109ea75..293bf0a1 100644 --- a/test/aio/test_advisory_cnvd_bulletin.py +++ b/test/aio/test_advisory_cnvd_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cnvd_flaw.py b/test/aio/test_advisory_cnvd_flaw.py index 8af77d9b..a9af8b7d 100644 --- a/test/aio/test_advisory_cnvd_flaw.py +++ b/test/aio/test_advisory_cnvd_flaw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_codesys_advisory.py b/test/aio/test_advisory_codesys_advisory.py index 0c534d60..86b05b6e 100644 --- a/test/aio/test_advisory_codesys_advisory.py +++ b/test/aio/test_advisory_codesys_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault.py b/test/aio/test_advisory_comm_vault.py index 1c004639..a9a9737c 100644 --- a/test/aio/test_advisory_comm_vault.py +++ b/test/aio/test_advisory_comm_vault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault_cve_details.py b/test/aio/test_advisory_comm_vault_cve_details.py index 2df961fc..0d6f07fe 100644 --- a/test/aio/test_advisory_comm_vault_cve_details.py +++ b/test/aio/test_advisory_comm_vault_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault_impacted_product.py b/test/aio/test_advisory_comm_vault_impacted_product.py index f766db8e..9e3bc616 100644 --- a/test/aio/test_advisory_comm_vault_impacted_product.py +++ b/test/aio/test_advisory_comm_vault_impacted_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault_impacted_product_details.py b/test/aio/test_advisory_comm_vault_impacted_product_details.py index c947dc9c..ac79c3b6 100644 --- a/test/aio/test_advisory_comm_vault_impacted_product_details.py +++ b/test/aio/test_advisory_comm_vault_impacted_product_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault_resolution.py b/test/aio/test_advisory_comm_vault_resolution.py index 8563d8e3..fdeeb6b5 100644 --- a/test/aio/test_advisory_comm_vault_resolution.py +++ b/test/aio/test_advisory_comm_vault_resolution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_comm_vault_resolution_details.py b/test/aio/test_advisory_comm_vault_resolution_details.py index 2992de05..2dc6b90e 100644 --- a/test/aio/test_advisory_comm_vault_resolution_details.py +++ b/test/aio/test_advisory_comm_vault_resolution_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_compass_security.py b/test/aio/test_advisory_compass_security.py index c86ddcd9..193d2341 100644 --- a/test/aio/test_advisory_compass_security.py +++ b/test/aio/test_advisory_compass_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_container_os.py b/test/aio/test_advisory_container_os.py index c7e3d9ee..39f7bf7e 100644 --- a/test/aio/test_advisory_container_os.py +++ b/test/aio/test_advisory_container_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_core_impact_exploit.py b/test/aio/test_advisory_core_impact_exploit.py index 3c6af5a4..4af75a22 100644 --- a/test/aio/test_advisory_core_impact_exploit.py +++ b/test/aio/test_advisory_core_impact_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_correction.py b/test/aio/test_advisory_correction.py index 3efd7266..3731ea9b 100644 --- a/test/aio/test_advisory_correction.py +++ b/test/aio/test_advisory_correction.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cos_update.py b/test/aio/test_advisory_cos_update.py index 8167e727..d0c5d5ef 100644 --- a/test/aio/test_advisory_cos_update.py +++ b/test/aio/test_advisory_cos_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cpe_match.py b/test/aio/test_advisory_cpe_match.py index 6f987237..1569b001 100644 --- a/test/aio/test_advisory_cpe_match.py +++ b/test/aio/test_advisory_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cpe_node.py b/test/aio/test_advisory_cpe_node.py index ac57e611..72342919 100644 --- a/test/aio/test_advisory_cpe_node.py +++ b/test/aio/test_advisory_cpe_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_credit.py b/test/aio/test_advisory_credit.py index 432e7d65..196ea519 100644 --- a/test/aio/test_advisory_credit.py +++ b/test/aio/test_advisory_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_crestron.py b/test/aio/test_advisory_crestron.py index bc84f1c6..eb10a01e 100644 --- a/test/aio/test_advisory_crestron.py +++ b/test/aio/test_advisory_crestron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_crowd_sec.py b/test/aio/test_advisory_crowd_sec.py index b9569b6d..1713cf83 100644 --- a/test/aio/test_advisory_crowd_sec.py +++ b/test/aio/test_advisory_crowd_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_csaf.py b/test/aio/test_advisory_csaf.py index a5df1eb9..946d2b1d 100644 --- a/test/aio/test_advisory_csaf.py +++ b/test/aio/test_advisory_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -88,7 +88,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', diff --git a/test/aio/test_advisory_csaf_note.py b/test/aio/test_advisory_csaf_note.py index f2751951..65d118b4 100644 --- a/test/aio/test_advisory_csaf_note.py +++ b/test/aio/test_advisory_csaf_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_csaf_reference.py b/test/aio/test_advisory_csaf_reference.py index 2d930fde..22f33535 100644 --- a/test/aio/test_advisory_csaf_reference.py +++ b/test/aio/test_advisory_csaf_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_csaf_relationship.py b/test/aio/test_advisory_csaf_relationship.py index bafddd1a..e0bdbc70 100644 --- a/test/aio/test_advisory_csaf_relationship.py +++ b/test/aio/test_advisory_csaf_relationship.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -40,7 +40,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAFRelationship: full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '' ) diff --git a/test/aio/test_advisory_csaf_score.py b/test/aio/test_advisory_csaf_score.py index f95f3a57..7e020309 100644 --- a/test/aio/test_advisory_csaf_score.py +++ b/test/aio/test_advisory_csaf_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_csaf_vulnerability.py b/test/aio/test_advisory_csaf_vulnerability.py index 0d1f912a..872eeb0f 100644 --- a/test/aio/test_advisory_csaf_vulnerability.py +++ b/test/aio/test_advisory_csaf_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_curl.py b/test/aio/test_advisory_curl.py index 2adde470..ac90e89c 100644 --- a/test/aio/test_advisory_curl.py +++ b/test/aio/test_advisory_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_curl_affected.py b/test/aio/test_advisory_curl_affected.py index be96b34a..268cd91c 100644 --- a/test/aio/test_advisory_curl_affected.py +++ b/test/aio/test_advisory_curl_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_curl_credit.py b/test/aio/test_advisory_curl_credit.py index 88c6a7a9..b39e9d88 100644 --- a/test/aio/test_advisory_curl_credit.py +++ b/test/aio/test_advisory_curl_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_curl_cwe.py b/test/aio/test_advisory_curl_cwe.py index 13651034..511add5c 100644 --- a/test/aio/test_advisory_curl_cwe.py +++ b/test/aio/test_advisory_curl_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_curl_range.py b/test/aio/test_advisory_curl_range.py index 231b3c6a..7e0e2ddc 100644 --- a/test/aio/test_advisory_curl_range.py +++ b/test/aio/test_advisory_curl_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cve_detail.py b/test/aio/test_advisory_cve_detail.py index eb7438ed..86a1e150 100644 --- a/test/aio/test_advisory_cve_detail.py +++ b/test/aio/test_advisory_cve_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cve_details_link.py b/test/aio/test_advisory_cve_details_link.py index f985bd4c..c5ea796e 100644 --- a/test/aio/test_advisory_cve_details_link.py +++ b/test/aio/test_advisory_cve_details_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cve_reference.py b/test/aio/test_advisory_cve_reference.py index a9959ea4..15fc4057 100644 --- a/test/aio/test_advisory_cve_reference.py +++ b/test/aio/test_advisory_cve_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvrf.py b/test/aio/test_advisory_cvrf.py index cc97a264..209a809d 100644 --- a/test/aio/test_advisory_cvrf.py +++ b/test/aio/test_advisory_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,72 +38,6 @@ def make_instance(self, include_optional) -> AdvisoryCvrf: return AdvisoryCvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.aio.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.aio.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.aio.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.aio.models.advisory/vulnerability.advisory.Vulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ] ) else: diff --git a/test/aio/test_advisory_cvrf_reference.py b/test/aio/test_advisory_cvrf_reference.py deleted file mode 100644 index e09eead9..00000000 --- a/test/aio/test_advisory_cvrf_reference.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference - -class TestAdvisoryCVRFReference(unittest.TestCase): - """AdvisoryCVRFReference unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCVRFReference: - """Test AdvisoryCVRFReference - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCVRFReference` - """ - model = AdvisoryCVRFReference() - if include_optional: - return AdvisoryCVRFReference( - description = '', - url = '' - ) - else: - return AdvisoryCVRFReference( - ) - """ - - def testAdvisoryCVRFReference(self): - """Test AdvisoryCVRFReference""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_cvss.py b/test/aio/test_advisory_cvss.py index 638f3214..6f261259 100644 --- a/test/aio/test_advisory_cvss.py +++ b/test/aio/test_advisory_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvsss_v23.py b/test/aio/test_advisory_cvsss_v23.py index ee78c257..48f9b1d2 100644 --- a/test/aio/test_advisory_cvsss_v23.py +++ b/test/aio/test_advisory_cvsss_v23.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvssv2.py b/test/aio/test_advisory_cvssv2.py index 736dbdf6..dff272a3 100644 --- a/test/aio/test_advisory_cvssv2.py +++ b/test/aio/test_advisory_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvssv3.py b/test/aio/test_advisory_cvssv3.py index 94e2bd3f..78fd7f26 100644 --- a/test/aio/test_advisory_cvssv3.py +++ b/test/aio/test_advisory_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvssv40.py b/test/aio/test_advisory_cvssv40.py index e170f272..5cec57fa 100644 --- a/test/aio/test_advisory_cvssv40.py +++ b/test/aio/test_advisory_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cvssv40_threat.py b/test/aio/test_advisory_cvssv40_threat.py index 70399ddd..2f4b023a 100644 --- a/test/aio/test_advisory_cvssv40_threat.py +++ b/test/aio/test_advisory_cvssv40_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cwe.py b/test/aio/test_advisory_cwe.py index 6a171a36..c96b0d66 100644 --- a/test/aio/test_advisory_cwe.py +++ b/test/aio/test_advisory_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cwe_acceptance_level.py b/test/aio/test_advisory_cwe_acceptance_level.py index a413739f..815f5590 100644 --- a/test/aio/test_advisory_cwe_acceptance_level.py +++ b/test/aio/test_advisory_cwe_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cwe_data.py b/test/aio/test_advisory_cwe_data.py index 7b98029f..f0ce1996 100644 --- a/test/aio/test_advisory_cwe_data.py +++ b/test/aio/test_advisory_cwe_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_cwes.py b/test/aio/test_advisory_cwes.py index 4ab3661a..ca745352 100644 --- a/test/aio/test_advisory_cwes.py +++ b/test/aio/test_advisory_cwes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,13 +37,8 @@ def make_instance(self, include_optional) -> AdvisoryCwes: if include_optional: return AdvisoryCwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56 + vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode() + ] ) else: return AdvisoryCwes( diff --git a/test/aio/test_advisory_cycle.py b/test/aio/test_advisory_cycle.py index f856b37b..3313324a 100644 --- a/test/aio/test_advisory_cycle.py +++ b/test/aio/test_advisory_cycle.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_d_link.py b/test/aio/test_advisory_d_link.py index 7281c0c3..4a42a315 100644 --- a/test/aio/test_advisory_d_link.py +++ b/test/aio/test_advisory_d_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dahua.py b/test/aio/test_advisory_dahua.py index 26874012..e8e9667c 100644 --- a/test/aio/test_advisory_dahua.py +++ b/test/aio/test_advisory_dahua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dan_foss_cve_details.py b/test/aio/test_advisory_dan_foss_cve_details.py index aab1a6f0..c8374c09 100644 --- a/test/aio/test_advisory_dan_foss_cve_details.py +++ b/test/aio/test_advisory_dan_foss_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_danfoss.py b/test/aio/test_advisory_danfoss.py index 3402d1b8..ffdbe483 100644 --- a/test/aio/test_advisory_danfoss.py +++ b/test/aio/test_advisory_danfoss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dassault.py b/test/aio/test_advisory_dassault.py index 1a9e5539..5af215d5 100644 --- a/test/aio/test_advisory_dassault.py +++ b/test/aio/test_advisory_dassault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_date_time.py b/test/aio/test_advisory_date_time.py deleted file mode 100644 index 08435a51..00000000 --- a/test/aio/test_advisory_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime - -class TestAdvisoryDateTime(unittest.TestCase): - """AdvisoryDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDateTime: - """Test AdvisoryDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDateTime` - """ - model = AdvisoryDateTime() - if include_optional: - return AdvisoryDateTime( - var_date = '' - ) - else: - return AdvisoryDateTime( - ) - """ - - def testAdvisoryDateTime(self): - """Test AdvisoryDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_db_specific.py b/test/aio/test_advisory_db_specific.py index bcf7f270..8ddcff77 100644 --- a/test/aio/test_advisory_db_specific.py +++ b/test/aio/test_advisory_db_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_debian_cve.py b/test/aio/test_advisory_debian_cve.py index e5e3d72a..af75715f 100644 --- a/test/aio/test_advisory_debian_cve.py +++ b/test/aio/test_advisory_debian_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_debian_security_advisory.py b/test/aio/test_advisory_debian_security_advisory.py index fae102ef..feb690db 100644 --- a/test/aio/test_advisory_debian_security_advisory.py +++ b/test/aio/test_advisory_debian_security_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dell.py b/test/aio/test_advisory_dell.py index 5168517e..923ce9ba 100644 --- a/test/aio/test_advisory_dell.py +++ b/test/aio/test_advisory_dell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dell_cve.py b/test/aio/test_advisory_dell_cve.py index 5163995c..2e4cbb83 100644 --- a/test/aio/test_advisory_dell_cve.py +++ b/test/aio/test_advisory_dell_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_delta_advisory.py b/test/aio/test_advisory_delta_advisory.py index 148ed745..716250d4 100644 --- a/test/aio/test_advisory_delta_advisory.py +++ b/test/aio/test_advisory_delta_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dfn_cert.py b/test/aio/test_advisory_dfn_cert.py index 88604d12..e518f7c8 100644 --- a/test/aio/test_advisory_dfn_cert.py +++ b/test/aio/test_advisory_dfn_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_distro_package.py b/test/aio/test_advisory_distro_package.py index 94f04633..a47151d6 100644 --- a/test/aio/test_advisory_distro_package.py +++ b/test/aio/test_advisory_distro_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_distro_version.py b/test/aio/test_advisory_distro_version.py index 9dbfd52a..3ff7d7ba 100644 --- a/test/aio/test_advisory_distro_version.py +++ b/test/aio/test_advisory_distro_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_django.py b/test/aio/test_advisory_django.py index 8f8c0130..f135e924 100644 --- a/test/aio/test_advisory_django.py +++ b/test/aio/test_advisory_django.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dnn.py b/test/aio/test_advisory_dnn.py index d7111afb..d9e88308 100644 --- a/test/aio/test_advisory_dnn.py +++ b/test/aio/test_advisory_dnn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_document_metadata.py b/test/aio/test_advisory_document_metadata.py index 399794b4..befba94f 100644 --- a/test/aio/test_advisory_document_metadata.py +++ b/test/aio/test_advisory_document_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_document_note.py b/test/aio/test_advisory_document_note.py deleted file mode 100644 index 0d8a976c..00000000 --- a/test/aio/test_advisory_document_note.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote - -class TestAdvisoryDocumentNote(unittest.TestCase): - """AdvisoryDocumentNote unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentNote: - """Test AdvisoryDocumentNote - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentNote` - """ - model = AdvisoryDocumentNote() - if include_optional: - return AdvisoryDocumentNote( - text = '', - title = '', - type = '' - ) - else: - return AdvisoryDocumentNote( - ) - """ - - def testAdvisoryDocumentNote(self): - """Test AdvisoryDocumentNote""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_document_publisher.py b/test/aio/test_advisory_document_publisher.py index 5bb51c05..04d8aa02 100644 --- a/test/aio/test_advisory_document_publisher.py +++ b/test/aio/test_advisory_document_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_document_tracking.py b/test/aio/test_advisory_document_tracking.py deleted file mode 100644 index c60e1af6..00000000 --- a/test/aio/test_advisory_document_tracking.py +++ /dev/null @@ -1,62 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking - -class TestAdvisoryDocumentTracking(unittest.TestCase): - """AdvisoryDocumentTracking unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentTracking: - """Test AdvisoryDocumentTracking - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentTracking` - """ - model = AdvisoryDocumentTracking() - if include_optional: - return AdvisoryDocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '' - ) - else: - return AdvisoryDocumentTracking( - ) - """ - - def testAdvisoryDocumentTracking(self): - """Test AdvisoryDocumentTracking""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_dot_cms.py b/test/aio/test_advisory_dot_cms.py index 6299ff45..bfd09897 100644 --- a/test/aio/test_advisory_dot_cms.py +++ b/test/aio/test_advisory_dot_cms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_dragos_advisory.py b/test/aio/test_advisory_dragos_advisory.py index 1726ad21..b321b859 100644 --- a/test/aio/test_advisory_dragos_advisory.py +++ b/test/aio/test_advisory_dragos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_draytek.py b/test/aio/test_advisory_draytek.py index 0e45e898..a356b0c0 100644 --- a/test/aio/test_advisory_draytek.py +++ b/test/aio/test_advisory_draytek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_drupal.py b/test/aio/test_advisory_drupal.py index 0210ea4d..b197e900 100644 --- a/test/aio/test_advisory_drupal.py +++ b/test/aio/test_advisory_drupal.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_eaton_advisory.py b/test/aio/test_advisory_eaton_advisory.py index 04f04048..0e9cde84 100644 --- a/test/aio/test_advisory_eaton_advisory.py +++ b/test/aio/test_advisory_eaton_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_eco_system.py b/test/aio/test_advisory_eco_system.py index 4ffae1ac..ecf9a939 100644 --- a/test/aio/test_advisory_eco_system.py +++ b/test/aio/test_advisory_eco_system.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_elastic.py b/test/aio/test_advisory_elastic.py index eadb0833..2e473436 100644 --- a/test/aio/test_advisory_elastic.py +++ b/test/aio/test_advisory_elastic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_elspec.py b/test/aio/test_advisory_elspec.py index 21774f4a..5120f71d 100644 --- a/test/aio/test_advisory_elspec.py +++ b/test/aio/test_advisory_elspec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_emerging_threats_snort.py b/test/aio/test_advisory_emerging_threats_snort.py index 147ef281..4677e286 100644 --- a/test/aio/test_advisory_emerging_threats_snort.py +++ b/test/aio/test_advisory_emerging_threats_snort.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_emerson_advisory.py b/test/aio/test_advisory_emerson_advisory.py index b4d9a53f..2aa627bf 100644 --- a/test/aio/test_advisory_emerson_advisory.py +++ b/test/aio/test_advisory_emerson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_end_of_life.py b/test/aio/test_advisory_end_of_life.py index 59b4c1b8..6043fc5c 100644 --- a/test/aio/test_advisory_end_of_life.py +++ b/test/aio/test_advisory_end_of_life.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,16 +43,16 @@ def make_instance(self, include_optional) -> AdvisoryEndOfLife: vulncheck_sdk.aio.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.aio.models.discontinued.discontinued(), - eol = vulncheck_sdk.aio.models.eol.eol(), - extended_support = vulncheck_sdk.aio.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.aio.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.aio.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/aio/test_advisory_endress.py b/test/aio/test_advisory_endress.py index 67087226..608b2060 100644 --- a/test/aio/test_advisory_endress.py +++ b/test/aio/test_advisory_endress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_enisa_id_product.py b/test/aio/test_advisory_enisa_id_product.py index 8dc0d538..b7809602 100644 --- a/test/aio/test_advisory_enisa_id_product.py +++ b/test/aio/test_advisory_enisa_id_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_enisa_id_vendor.py b/test/aio/test_advisory_enisa_id_vendor.py index 3c29694d..e9839e41 100644 --- a/test/aio/test_advisory_enisa_id_vendor.py +++ b/test/aio/test_advisory_enisa_id_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_eol_alibaba.py b/test/aio/test_advisory_eol_alibaba.py index cc0e5ae7..3d2e68fa 100644 --- a/test/aio/test_advisory_eol_alibaba.py +++ b/test/aio/test_advisory_eol_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_eol_microsoft.py b/test/aio/test_advisory_eol_microsoft.py index 37224af3..02b194bf 100644 --- a/test/aio/test_advisory_eol_microsoft.py +++ b/test/aio/test_advisory_eol_microsoft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_eol_release_data.py b/test/aio/test_advisory_eol_release_data.py index 5f0961e8..f8bfcacc 100644 --- a/test/aio/test_advisory_eol_release_data.py +++ b/test/aio/test_advisory_eol_release_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_euvd.py b/test/aio/test_advisory_euvd.py index 40286848..5d212ae9 100644 --- a/test/aio/test_advisory_euvd.py +++ b/test/aio/test_advisory_euvd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_event.py b/test/aio/test_advisory_event.py index 0878d8b2..f16700fe 100644 --- a/test/aio/test_advisory_event.py +++ b/test/aio/test_advisory_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_exodus_intel.py b/test/aio/test_advisory_exodus_intel.py index d099ecb9..f66caef2 100644 --- a/test/aio/test_advisory_exodus_intel.py +++ b/test/aio/test_advisory_exodus_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_exploit_db_exploitv2.py b/test/aio/test_advisory_exploit_db_exploitv2.py index 7c9cc85d..51fe6c43 100644 --- a/test/aio/test_advisory_exploit_db_exploitv2.py +++ b/test/aio/test_advisory_exploit_db_exploitv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_external_references.py b/test/aio/test_advisory_external_references.py index d50ae8d9..519695d9 100644 --- a/test/aio/test_advisory_external_references.py +++ b/test/aio/test_advisory_external_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_f5.py b/test/aio/test_advisory_f5.py index 950ea5f0..ef7ec2de 100644 --- a/test/aio/test_advisory_f5.py +++ b/test/aio/test_advisory_f5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_f_secure.py b/test/aio/test_advisory_f_secure.py index f3d7eee8..e0a30296 100644 --- a/test/aio/test_advisory_f_secure.py +++ b/test/aio/test_advisory_f_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fanuc.py b/test/aio/test_advisory_fanuc.py index 1af51e93..84aa9f6f 100644 --- a/test/aio/test_advisory_fanuc.py +++ b/test/aio/test_advisory_fanuc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fastly.py b/test/aio/test_advisory_fastly.py index 834508ed..82cdcc63 100644 --- a/test/aio/test_advisory_fastly.py +++ b/test/aio/test_advisory_fastly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_festo.py b/test/aio/test_advisory_festo.py index 2e67b3c8..4b609be9 100644 --- a/test/aio/test_advisory_festo.py +++ b/test/aio/test_advisory_festo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_file_cloud.py b/test/aio/test_advisory_file_cloud.py index 6913d633..cadd4168 100644 --- a/test/aio/test_advisory_file_cloud.py +++ b/test/aio/test_advisory_file_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_file_zilla.py b/test/aio/test_advisory_file_zilla.py index 7a9fec74..732a0354 100644 --- a/test/aio/test_advisory_file_zilla.py +++ b/test/aio/test_advisory_file_zilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fix_aff.py b/test/aio/test_advisory_fix_aff.py index 4cfd071e..eb8527ac 100644 --- a/test/aio/test_advisory_fix_aff.py +++ b/test/aio/test_advisory_fix_aff.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_flag.py b/test/aio/test_advisory_flag.py index 9b70187f..4b0026e1 100644 --- a/test/aio/test_advisory_flag.py +++ b/test/aio/test_advisory_flag.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_flatt_security.py b/test/aio/test_advisory_flatt_security.py index 19676f2d..7f8dc551 100644 --- a/test/aio/test_advisory_flatt_security.py +++ b/test/aio/test_advisory_flatt_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_forge_rock.py b/test/aio/test_advisory_forge_rock.py index f4f07eb2..c1435273 100644 --- a/test/aio/test_advisory_forge_rock.py +++ b/test/aio/test_advisory_forge_rock.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fortinet_advisory.py b/test/aio/test_advisory_fortinet_advisory.py index a868e3eb..36323f87 100644 --- a/test/aio/test_advisory_fortinet_advisory.py +++ b/test/aio/test_advisory_fortinet_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fortinet_ips.py b/test/aio/test_advisory_fortinet_ips.py index 834b221a..7f46bd2a 100644 --- a/test/aio/test_advisory_fortinet_ips.py +++ b/test/aio/test_advisory_fortinet_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_foxit.py b/test/aio/test_advisory_foxit.py index c6da826e..b64c22d3 100644 --- a/test/aio/test_advisory_foxit.py +++ b/test/aio/test_advisory_foxit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_foxit_affected.py b/test/aio/test_advisory_foxit_affected.py index bdbae236..c216bd2f 100644 --- a/test/aio/test_advisory_foxit_affected.py +++ b/test/aio/test_advisory_foxit_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_fresenius.py b/test/aio/test_advisory_fresenius.py index 3b9b2bdf..0b479e13 100644 --- a/test/aio/test_advisory_fresenius.py +++ b/test/aio/test_advisory_fresenius.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gallagher.py b/test/aio/test_advisory_gallagher.py index bd9aed0e..9c57c877 100644 --- a/test/aio/test_advisory_gallagher.py +++ b/test/aio/test_advisory_gallagher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gcp.py b/test/aio/test_advisory_gcp.py index e247444f..eae42ecc 100644 --- a/test/aio/test_advisory_gcp.py +++ b/test/aio/test_advisory_gcp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ge_gas.py b/test/aio/test_advisory_ge_gas.py index 6c0f15f4..4c701a5c 100644 --- a/test/aio/test_advisory_ge_gas.py +++ b/test/aio/test_advisory_ge_gas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ge_healthcare_advisory.py b/test/aio/test_advisory_ge_healthcare_advisory.py index 1618c829..f4424eaf 100644 --- a/test/aio/test_advisory_ge_healthcare_advisory.py +++ b/test/aio/test_advisory_ge_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gen.py b/test/aio/test_advisory_gen.py index 573235db..821522a8 100644 --- a/test/aio/test_advisory_gen.py +++ b/test/aio/test_advisory_gen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_genetec.py b/test/aio/test_advisory_genetec.py index 3415f945..71d04c99 100644 --- a/test/aio/test_advisory_genetec.py +++ b/test/aio/test_advisory_genetec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_advisory_json_lean.py b/test/aio/test_advisory_gh_advisory_json_lean.py index 48168a2d..74ce8eaa 100644 --- a/test/aio/test_advisory_gh_advisory_json_lean.py +++ b/test/aio/test_advisory_gh_advisory_json_lean.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -45,13 +45,8 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vector_string = '', ), cwes = vulncheck_sdk.aio.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/aio/test_advisory_gh_cvss.py b/test/aio/test_advisory_gh_cvss.py index 4ff335a4..95cf7ce1 100644 --- a/test/aio/test_advisory_gh_cvss.py +++ b/test/aio/test_advisory_gh_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_identifier.py b/test/aio/test_advisory_gh_identifier.py index 9f814995..03d07555 100644 --- a/test/aio/test_advisory_gh_identifier.py +++ b/test/aio/test_advisory_gh_identifier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_node.py b/test/aio/test_advisory_gh_node.py index 15abf624..8ada014b 100644 --- a/test/aio/test_advisory_gh_node.py +++ b/test/aio/test_advisory_gh_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_package.py b/test/aio/test_advisory_gh_package.py index 76ee28a2..8991cb55 100644 --- a/test/aio/test_advisory_gh_package.py +++ b/test/aio/test_advisory_gh_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_reference.py b/test/aio/test_advisory_gh_reference.py index da0f9c6a..8f7b3451 100644 --- a/test/aio/test_advisory_gh_reference.py +++ b/test/aio/test_advisory_gh_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gh_vulnerabilities.py b/test/aio/test_advisory_gh_vulnerabilities.py index 3fe08426..f9909788 100644 --- a/test/aio/test_advisory_gh_vulnerabilities.py +++ b/test/aio/test_advisory_gh_vulnerabilities.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa.py b/test/aio/test_advisory_ghsa.py index de5513f8..fcbaaf5c 100644 --- a/test/aio/test_advisory_ghsa.py +++ b/test/aio/test_advisory_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_affected.py b/test/aio/test_advisory_ghsa_affected.py index b3676623..cb2f52f1 100644 --- a/test/aio/test_advisory_ghsa_affected.py +++ b/test/aio/test_advisory_ghsa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_database_specific.py b/test/aio/test_advisory_ghsa_database_specific.py index a07b36c3..abdaf4bf 100644 --- a/test/aio/test_advisory_ghsa_database_specific.py +++ b/test/aio/test_advisory_ghsa_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_eco_system_specific.py b/test/aio/test_advisory_ghsa_eco_system_specific.py index 3813f2a5..c67e2866 100644 --- a/test/aio/test_advisory_ghsa_eco_system_specific.py +++ b/test/aio/test_advisory_ghsa_eco_system_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_event.py b/test/aio/test_advisory_ghsa_event.py index b3f51a16..a83608ab 100644 --- a/test/aio/test_advisory_ghsa_event.py +++ b/test/aio/test_advisory_ghsa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_package.py b/test/aio/test_advisory_ghsa_package.py index 7af8548d..2282ed27 100644 --- a/test/aio/test_advisory_ghsa_package.py +++ b/test/aio/test_advisory_ghsa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_range.py b/test/aio/test_advisory_ghsa_range.py index fc21a1d3..167ee9f2 100644 --- a/test/aio/test_advisory_ghsa_range.py +++ b/test/aio/test_advisory_ghsa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_reference.py b/test/aio/test_advisory_ghsa_reference.py index 78e52074..d85d897e 100644 --- a/test/aio/test_advisory_ghsa_reference.py +++ b/test/aio/test_advisory_ghsa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ghsa_severity.py b/test/aio/test_advisory_ghsa_severity.py index 5953d304..7001e1f0 100644 --- a/test/aio/test_advisory_ghsa_severity.py +++ b/test/aio/test_advisory_ghsa_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gigabyte.py b/test/aio/test_advisory_gigabyte.py index 8c03761e..a9a60072 100644 --- a/test/aio/test_advisory_gigabyte.py +++ b/test/aio/test_advisory_gigabyte.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_git_hub_exploit.py b/test/aio/test_advisory_git_hub_exploit.py index 2698fe90..a920209b 100644 --- a/test/aio/test_advisory_git_hub_exploit.py +++ b/test/aio/test_advisory_git_hub_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_git_lab_exploit.py b/test/aio/test_advisory_git_lab_exploit.py index 8c768864..c3c7a6a4 100644 --- a/test/aio/test_advisory_git_lab_exploit.py +++ b/test/aio/test_advisory_git_lab_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gitee_exploit.py b/test/aio/test_advisory_gitee_exploit.py index 2ff68f92..5037f132 100644 --- a/test/aio/test_advisory_gitee_exploit.py +++ b/test/aio/test_advisory_gitee_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gitlab_advisory.py b/test/aio/test_advisory_gitlab_advisory.py index 44ede3f6..af4ba0c8 100644 --- a/test/aio/test_advisory_gitlab_advisory.py +++ b/test/aio/test_advisory_gitlab_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_glibc.py b/test/aio/test_advisory_glibc.py index 5f6b4492..8dce5970 100644 --- a/test/aio/test_advisory_glibc.py +++ b/test/aio/test_advisory_glibc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gmo_cyber_security.py b/test/aio/test_advisory_gmo_cyber_security.py index 6ba8a161..1a4de9f0 100644 --- a/test/aio/test_advisory_gmo_cyber_security.py +++ b/test/aio/test_advisory_gmo_cyber_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_gnu_tls.py b/test/aio/test_advisory_gnu_tls.py index 0801d50c..4a76fe07 100644 --- a/test/aio/test_advisory_gnu_tls.py +++ b/test/aio/test_advisory_gnu_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_credits.py b/test/aio/test_advisory_go_credits.py index d55d1930..324688cb 100644 --- a/test/aio/test_advisory_go_credits.py +++ b/test/aio/test_advisory_go_credits.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_event.py b/test/aio/test_advisory_go_event.py index fa4b3149..c3fd4142 100644 --- a/test/aio/test_advisory_go_event.py +++ b/test/aio/test_advisory_go_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_affected.py b/test/aio/test_advisory_go_vuln_affected.py index 1948c3de..4d99db1a 100644 --- a/test/aio/test_advisory_go_vuln_affected.py +++ b/test/aio/test_advisory_go_vuln_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_database_specific.py b/test/aio/test_advisory_go_vuln_database_specific.py index 10aedd36..3bfc843e 100644 --- a/test/aio/test_advisory_go_vuln_database_specific.py +++ b/test/aio/test_advisory_go_vuln_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_ecosystem_specific.py b/test/aio/test_advisory_go_vuln_ecosystem_specific.py index 81a6c78c..ba321517 100644 --- a/test/aio/test_advisory_go_vuln_ecosystem_specific.py +++ b/test/aio/test_advisory_go_vuln_ecosystem_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_import.py b/test/aio/test_advisory_go_vuln_import.py index e002b0dc..24b2e59e 100644 --- a/test/aio/test_advisory_go_vuln_import.py +++ b/test/aio/test_advisory_go_vuln_import.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_json.py b/test/aio/test_advisory_go_vuln_json.py index f899eb76..1b71d8c4 100644 --- a/test/aio/test_advisory_go_vuln_json.py +++ b/test/aio/test_advisory_go_vuln_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_package.py b/test/aio/test_advisory_go_vuln_package.py index 34abc278..672b224a 100644 --- a/test/aio/test_advisory_go_vuln_package.py +++ b/test/aio/test_advisory_go_vuln_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_ranges.py b/test/aio/test_advisory_go_vuln_ranges.py index 66153f66..6d1afb8e 100644 --- a/test/aio/test_advisory_go_vuln_ranges.py +++ b/test/aio/test_advisory_go_vuln_ranges.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_go_vuln_reference.py b/test/aio/test_advisory_go_vuln_reference.py index 9a47a51a..41c6bacd 100644 --- a/test/aio/test_advisory_go_vuln_reference.py +++ b/test/aio/test_advisory_go_vuln_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_grafana.py b/test/aio/test_advisory_grafana.py index 4c5d5f1a..9e53b3ae 100644 --- a/test/aio/test_advisory_grafana.py +++ b/test/aio/test_advisory_grafana.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_grey_noise_detection.py b/test/aio/test_advisory_grey_noise_detection.py index f75ede6a..061b4947 100644 --- a/test/aio/test_advisory_grey_noise_detection.py +++ b/test/aio/test_advisory_grey_noise_detection.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_grey_noise_tags.py b/test/aio/test_advisory_grey_noise_tags.py index 309e17ab..c9731b47 100644 --- a/test/aio/test_advisory_grey_noise_tags.py +++ b/test/aio/test_advisory_grey_noise_tags.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hacktivity.py b/test/aio/test_advisory_hacktivity.py index a86065e3..5a9db5b2 100644 --- a/test/aio/test_advisory_hacktivity.py +++ b/test/aio/test_advisory_hacktivity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hardware_update.py b/test/aio/test_advisory_hardware_update.py index a5f6eeaa..af57bc65 100644 --- a/test/aio/test_advisory_hardware_update.py +++ b/test/aio/test_advisory_hardware_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_harmony_os.py b/test/aio/test_advisory_harmony_os.py index 8c9f9568..c4af7433 100644 --- a/test/aio/test_advisory_harmony_os.py +++ b/test/aio/test_advisory_harmony_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hashi_corp.py b/test/aio/test_advisory_hashi_corp.py index 15eb761c..7b707f99 100644 --- a/test/aio/test_advisory_hashi_corp.py +++ b/test/aio/test_advisory_hashi_corp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_haskell_affected.py b/test/aio/test_advisory_haskell_affected.py index e551e67b..3bd99526 100644 --- a/test/aio/test_advisory_haskell_affected.py +++ b/test/aio/test_advisory_haskell_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_haskell_sadb_advisory.py b/test/aio/test_advisory_haskell_sadb_advisory.py index 4f26e39e..c47e769d 100644 --- a/test/aio/test_advisory_haskell_sadb_advisory.py +++ b/test/aio/test_advisory_haskell_sadb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_haskell_version.py b/test/aio/test_advisory_haskell_version.py index 7d705610..958ab285 100644 --- a/test/aio/test_advisory_haskell_version.py +++ b/test/aio/test_advisory_haskell_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hcl.py b/test/aio/test_advisory_hcl.py index 6e9dcdd6..e505a643 100644 --- a/test/aio/test_advisory_hcl.py +++ b/test/aio/test_advisory_hcl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hik_vision.py b/test/aio/test_advisory_hik_vision.py index 1159dbe5..26e50849 100644 --- a/test/aio/test_advisory_hik_vision.py +++ b/test/aio/test_advisory_hik_vision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hillrom_advisory.py b/test/aio/test_advisory_hillrom_advisory.py index 72847e42..9208079c 100644 --- a/test/aio/test_advisory_hillrom_advisory.py +++ b/test/aio/test_advisory_hillrom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hitachi.py b/test/aio/test_advisory_hitachi.py index 58d47981..61567a40 100644 --- a/test/aio/test_advisory_hitachi.py +++ b/test/aio/test_advisory_hitachi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hitachi_energy.py b/test/aio/test_advisory_hitachi_energy.py index 25f96bee..51154cd3 100644 --- a/test/aio/test_advisory_hitachi_energy.py +++ b/test/aio/test_advisory_hitachi_energy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hk_cert.py b/test/aio/test_advisory_hk_cert.py index 49104570..828c4dd8 100644 --- a/test/aio/test_advisory_hk_cert.py +++ b/test/aio/test_advisory_hk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hms.py b/test/aio/test_advisory_hms.py index 73353177..eaa07bdc 100644 --- a/test/aio/test_advisory_hms.py +++ b/test/aio/test_advisory_hms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_honeywell.py b/test/aio/test_advisory_honeywell.py index 90363646..fb011d39 100644 --- a/test/aio/test_advisory_honeywell.py +++ b/test/aio/test_advisory_honeywell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hp.py b/test/aio/test_advisory_hp.py index 1c417708..ea4836a9 100644 --- a/test/aio/test_advisory_hp.py +++ b/test/aio/test_advisory_hp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_hpe.py b/test/aio/test_advisory_hpe.py index c089ca49..b5a69a95 100644 --- a/test/aio/test_advisory_hpe.py +++ b/test/aio/test_advisory_hpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_huawei.py b/test/aio/test_advisory_huawei.py index 78a3f2a0..778ea41b 100644 --- a/test/aio/test_advisory_huawei.py +++ b/test/aio/test_advisory_huawei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_huawei_euler_os.py b/test/aio/test_advisory_huawei_euler_os.py index e3a5ffb3..5e41c57c 100644 --- a/test/aio/test_advisory_huawei_euler_os.py +++ b/test/aio/test_advisory_huawei_euler_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_huawei_ips.py b/test/aio/test_advisory_huawei_ips.py index 461c6f04..30ca83ba 100644 --- a/test/aio/test_advisory_huawei_ips.py +++ b/test/aio/test_advisory_huawei_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_i_val.py b/test/aio/test_advisory_i_val.py index 0992a3de..340a3515 100644 --- a/test/aio/test_advisory_i_val.py +++ b/test/aio/test_advisory_i_val.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_iava.py b/test/aio/test_advisory_iava.py index 75b7c09a..8316a471 100644 --- a/test/aio/test_advisory_iava.py +++ b/test/aio/test_advisory_iava.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ibm.py b/test/aio/test_advisory_ibm.py index 1cf90fd9..09cc5d4d 100644 --- a/test/aio/test_advisory_ibm.py +++ b/test/aio/test_advisory_ibm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_idemia.py b/test/aio/test_advisory_idemia.py index d504fe6a..15203272 100644 --- a/test/aio/test_advisory_idemia.py +++ b/test/aio/test_advisory_idemia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_igel.py b/test/aio/test_advisory_igel.py index 19842cba..c44b5f38 100644 --- a/test/aio/test_advisory_igel.py +++ b/test/aio/test_advisory_igel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_impact.py b/test/aio/test_advisory_impact.py index bd84eee7..b08b88ac 100644 --- a/test/aio/test_advisory_impact.py +++ b/test/aio/test_advisory_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_incibe_advisory.py b/test/aio/test_advisory_incibe_advisory.py index 45b8950e..88739cdd 100644 --- a/test/aio/test_advisory_incibe_advisory.py +++ b/test/aio/test_advisory_incibe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_intel.py b/test/aio/test_advisory_intel.py index 3e196cdd..75508bd9 100644 --- a/test/aio/test_advisory_intel.py +++ b/test/aio/test_advisory_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ip_intel_record.py b/test/aio/test_advisory_ip_intel_record.py index e417bad4..1fe4983e 100644 --- a/test/aio/test_advisory_ip_intel_record.py +++ b/test/aio/test_advisory_ip_intel_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_israeli_alert.py b/test/aio/test_advisory_israeli_alert.py index 898f7d14..995f1f18 100644 --- a/test/aio/test_advisory_israeli_alert.py +++ b/test/aio/test_advisory_israeli_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_israeli_vulnerability.py b/test/aio/test_advisory_israeli_vulnerability.py index 2f777353..21db0799 100644 --- a/test/aio/test_advisory_israeli_vulnerability.py +++ b/test/aio/test_advisory_israeli_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_issued.py b/test/aio/test_advisory_issued.py deleted file mode 100644 index da00d429..00000000 --- a/test/aio/test_advisory_issued.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued - -class TestAdvisoryIssued(unittest.TestCase): - """AdvisoryIssued unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryIssued: - """Test AdvisoryIssued - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryIssued` - """ - model = AdvisoryIssued() - if include_optional: - return AdvisoryIssued( - var_date = '' - ) - else: - return AdvisoryIssued( - ) - """ - - def testAdvisoryIssued(self): - """Test AdvisoryIssued""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_istio.py b/test/aio/test_advisory_istio.py index f595480b..c9b02b00 100644 --- a/test/aio/test_advisory_istio.py +++ b/test/aio/test_advisory_istio.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_itw.py b/test/aio/test_advisory_itw.py index c1dd20c6..729ae193 100644 --- a/test/aio/test_advisory_itw.py +++ b/test/aio/test_advisory_itw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_itw_exploit.py b/test/aio/test_advisory_itw_exploit.py index 4dbe14cf..c8ac56ca 100644 --- a/test/aio/test_advisory_itw_exploit.py +++ b/test/aio/test_advisory_itw_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ivanti.py b/test/aio/test_advisory_ivanti.py index 3d9ac752..5be7910b 100644 --- a/test/aio/test_advisory_ivanti.py +++ b/test/aio/test_advisory_ivanti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ivanti_rss.py b/test/aio/test_advisory_ivanti_rss.py index 8b54902c..ef91a838 100644 --- a/test/aio/test_advisory_ivanti_rss.py +++ b/test/aio/test_advisory_ivanti_rss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_j_frog.py b/test/aio/test_advisory_j_frog.py index c22c2dda..32de083d 100644 --- a/test/aio/test_advisory_j_frog.py +++ b/test/aio/test_advisory_j_frog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jenkins.py b/test/aio/test_advisory_jenkins.py index cbf971ed..05bf3e68 100644 --- a/test/aio/test_advisory_jenkins.py +++ b/test/aio/test_advisory_jenkins.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jet_brains.py b/test/aio/test_advisory_jet_brains.py index 3212d4de..7837756c 100644 --- a/test/aio/test_advisory_jet_brains.py +++ b/test/aio/test_advisory_jet_brains.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jnj_advisory.py b/test/aio/test_advisory_jnj_advisory.py index bf953407..24b8b725 100644 --- a/test/aio/test_advisory_jnj_advisory.py +++ b/test/aio/test_advisory_jnj_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_johnson_controls.py b/test/aio/test_advisory_johnson_controls.py index c9e79685..9921a17f 100644 --- a/test/aio/test_advisory_johnson_controls.py +++ b/test/aio/test_advisory_johnson_controls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_juniper.py b/test/aio/test_advisory_juniper.py index 39364c7c..e8767f7e 100644 --- a/test/aio/test_advisory_juniper.py +++ b/test/aio/test_advisory_juniper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jvn.py b/test/aio/test_advisory_jvn.py index 8bc47285..b54afeaf 100644 --- a/test/aio/test_advisory_jvn.py +++ b/test/aio/test_advisory_jvn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jvn_advisory_item.py b/test/aio/test_advisory_jvn_advisory_item.py index 6551f3c4..dde2d7e9 100644 --- a/test/aio/test_advisory_jvn_advisory_item.py +++ b/test/aio/test_advisory_jvn_advisory_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jvn_reference.py b/test/aio/test_advisory_jvn_reference.py index 1c047919..54ef4343 100644 --- a/test/aio/test_advisory_jvn_reference.py +++ b/test/aio/test_advisory_jvn_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_jvncpe.py b/test/aio/test_advisory_jvncpe.py index a095801a..e50821e1 100644 --- a/test/aio/test_advisory_jvncpe.py +++ b/test/aio/test_advisory_jvncpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_k8_s.py b/test/aio/test_advisory_k8_s.py index 766c68a1..a0e27221 100644 --- a/test/aio/test_advisory_k8_s.py +++ b/test/aio/test_advisory_k8_s.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kaspersky_icscert_advisory.py b/test/aio/test_advisory_kaspersky_icscert_advisory.py index f3d982ce..459fe16e 100644 --- a/test/aio/test_advisory_kaspersky_icscert_advisory.py +++ b/test/aio/test_advisory_kaspersky_icscert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kb.py b/test/aio/test_advisory_kb.py index 89783429..6956a88d 100644 --- a/test/aio/test_advisory_kb.py +++ b/test/aio/test_advisory_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kb_threat_description.py b/test/aio/test_advisory_kb_threat_description.py index 2af700b4..70714bed 100644 --- a/test/aio/test_advisory_kb_threat_description.py +++ b/test/aio/test_advisory_kb_threat_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kev_catalog_vulnerability.py b/test/aio/test_advisory_kev_catalog_vulnerability.py index fff41983..ce6e6333 100644 --- a/test/aio/test_advisory_kev_catalog_vulnerability.py +++ b/test/aio/test_advisory_kev_catalog_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kore_logic.py b/test/aio/test_advisory_kore_logic.py index 63c33428..5e50a511 100644 --- a/test/aio/test_advisory_kore_logic.py +++ b/test/aio/test_advisory_kore_logic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kr_cert_advisory.py b/test/aio/test_advisory_kr_cert_advisory.py index 1d156f74..b1187226 100644 --- a/test/aio/test_advisory_kr_cert_advisory.py +++ b/test/aio/test_advisory_kr_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_kunbus.py b/test/aio/test_advisory_kunbus.py index aa3ec430..a171be6e 100644 --- a/test/aio/test_advisory_kunbus.py +++ b/test/aio/test_advisory_kunbus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_lantronix.py b/test/aio/test_advisory_lantronix.py index 67fea8a4..9364b144 100644 --- a/test/aio/test_advisory_lantronix.py +++ b/test/aio/test_advisory_lantronix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_lenovo.py b/test/aio/test_advisory_lenovo.py index 0f21b1e0..fe66d085 100644 --- a/test/aio/test_advisory_lenovo.py +++ b/test/aio/test_advisory_lenovo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_lexmark_advisory.py b/test/aio/test_advisory_lexmark_advisory.py index 05367f1f..42a5bf83 100644 --- a/test/aio/test_advisory_lexmark_advisory.py +++ b/test/aio/test_advisory_lexmark_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_lg.py b/test/aio/test_advisory_lg.py index 6046f062..07e12614 100644 --- a/test/aio/test_advisory_lg.py +++ b/test/aio/test_advisory_lg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_libre_office.py b/test/aio/test_advisory_libre_office.py index 1c69165e..bb5425eb 100644 --- a/test/aio/test_advisory_libre_office.py +++ b/test/aio/test_advisory_libre_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_linux.py b/test/aio/test_advisory_linux.py index 56f31de1..a4e1ff3d 100644 --- a/test/aio/test_advisory_linux.py +++ b/test/aio/test_advisory_linux.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_log_source.py b/test/aio/test_advisory_log_source.py index c4ec0f1b..825b40f7 100644 --- a/test/aio/test_advisory_log_source.py +++ b/test/aio/test_advisory_log_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_lol_advs.py b/test/aio/test_advisory_lol_advs.py index da9dc6cc..449c5de9 100644 --- a/test/aio/test_advisory_lol_advs.py +++ b/test/aio/test_advisory_lol_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryLolAdvs: description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/aio/test_advisory_m_affected.py b/test/aio/test_advisory_m_affected.py index 4c4399d1..2746d20b 100644 --- a/test/aio/test_advisory_m_affected.py +++ b/test/aio/test_advisory_m_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_branch.py b/test/aio/test_advisory_m_branch.py index ab3692f5..6ec52647 100644 --- a/test/aio/test_advisory_m_branch.py +++ b/test/aio/test_advisory_m_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_cna.py b/test/aio/test_advisory_m_cna.py index a0d890d9..0034470b 100644 --- a/test/aio/test_advisory_m_cna.py +++ b/test/aio/test_advisory_m_cna.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_containers.py b/test/aio/test_advisory_m_containers.py index 9a233a5f..e359fdea 100644 --- a/test/aio/test_advisory_m_containers.py +++ b/test/aio/test_advisory_m_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -145,7 +145,10 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', diff --git a/test/aio/test_advisory_m_cve_metadata.py b/test/aio/test_advisory_m_cve_metadata.py index f5c70006..aa7d7026 100644 --- a/test/aio/test_advisory_m_cve_metadata.py +++ b/test/aio/test_advisory_m_cve_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_cvss_v20.py b/test/aio/test_advisory_m_cvss_v20.py index d6158483..99e2f8de 100644 --- a/test/aio/test_advisory_m_cvss_v20.py +++ b/test/aio/test_advisory_m_cvss_v20.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_cvss_v30.py b/test/aio/test_advisory_m_cvss_v30.py index 23705671..293880a7 100644 --- a/test/aio/test_advisory_m_cvss_v30.py +++ b/test/aio/test_advisory_m_cvss_v30.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_cvss_v31.py b/test/aio/test_advisory_m_cvss_v31.py index 15852a92..6f8d84f4 100644 --- a/test/aio/test_advisory_m_cvss_v31.py +++ b/test/aio/test_advisory_m_cvss_v31.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_cvss_v40.py b/test/aio/test_advisory_m_cvss_v40.py index 0b61ef13..a9d53575 100644 --- a/test/aio/test_advisory_m_cvss_v40.py +++ b/test/aio/test_advisory_m_cvss_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_descriptions.py b/test/aio/test_advisory_m_descriptions.py index 5d0c76a6..f8539c2c 100644 --- a/test/aio/test_advisory_m_descriptions.py +++ b/test/aio/test_advisory_m_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_document_tracking.py b/test/aio/test_advisory_m_document_tracking.py index a7f13605..a6b83a56 100644 --- a/test/aio/test_advisory_m_document_tracking.py +++ b/test/aio/test_advisory_m_document_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_files.py b/test/aio/test_advisory_m_files.py index 47dd3708..8dc177cc 100644 --- a/test/aio/test_advisory_m_files.py +++ b/test/aio/test_advisory_m_files.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_full_product_name.py b/test/aio/test_advisory_m_full_product_name.py index 627c1f04..4196e8fa 100644 --- a/test/aio/test_advisory_m_full_product_name.py +++ b/test/aio/test_advisory_m_full_product_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_identification.py b/test/aio/test_advisory_m_identification.py index ac4673f0..0cb42a85 100644 --- a/test/aio/test_advisory_m_identification.py +++ b/test/aio/test_advisory_m_identification.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_item.py b/test/aio/test_advisory_m_item.py index 2ea74c3d..f5283bcb 100644 --- a/test/aio/test_advisory_m_item.py +++ b/test/aio/test_advisory_m_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_nodes.py b/test/aio/test_advisory_m_nodes.py index de82a84c..8267a6fa 100644 --- a/test/aio/test_advisory_m_nodes.py +++ b/test/aio/test_advisory_m_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_problem_types.py b/test/aio/test_advisory_m_problem_types.py index 28aec97a..7dd8d8ac 100644 --- a/test/aio/test_advisory_m_problem_types.py +++ b/test/aio/test_advisory_m_problem_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_product_status.py b/test/aio/test_advisory_m_product_status.py index 38df7853..b37c3ed1 100644 --- a/test/aio/test_advisory_m_product_status.py +++ b/test/aio/test_advisory_m_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_product_tree.py b/test/aio/test_advisory_m_product_tree.py index 7c4268c6..f9804322 100644 --- a/test/aio/test_advisory_m_product_tree.py +++ b/test/aio/test_advisory_m_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_provider_metadata.py b/test/aio/test_advisory_m_provider_metadata.py index ffa03506..f79c1878 100644 --- a/test/aio/test_advisory_m_provider_metadata.py +++ b/test/aio/test_advisory_m_provider_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_reference.py b/test/aio/test_advisory_m_reference.py index 066731c9..76a827ee 100644 --- a/test/aio/test_advisory_m_reference.py +++ b/test/aio/test_advisory_m_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_remediation.py b/test/aio/test_advisory_m_remediation.py index 214b2f0b..45466c1f 100644 --- a/test/aio/test_advisory_m_remediation.py +++ b/test/aio/test_advisory_m_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_version.py b/test/aio/test_advisory_m_version.py index ea5390c1..94c942f2 100644 --- a/test/aio/test_advisory_m_version.py +++ b/test/aio/test_advisory_m_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_m_vulnerability.py b/test/aio/test_advisory_m_vulnerability.py index 3445812c..00457590 100644 --- a/test/aio/test_advisory_m_vulnerability.py +++ b/test/aio/test_advisory_m_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ma_cert.py b/test/aio/test_advisory_ma_cert.py index df6cfdd3..2c02e569 100644 --- a/test/aio/test_advisory_ma_cert.py +++ b/test/aio/test_advisory_ma_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_malicious_package.py b/test/aio/test_advisory_malicious_package.py index 2843a618..8a6ee292 100644 --- a/test/aio/test_advisory_malicious_package.py +++ b/test/aio/test_advisory_malicious_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: malware = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/aio/test_advisory_manage_engine.py b/test/aio/test_advisory_manage_engine.py index d81c0c07..25837b39 100644 --- a/test/aio/test_advisory_manage_engine.py +++ b/test/aio/test_advisory_manage_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_manage_engine_advisory.py b/test/aio/test_advisory_manage_engine_advisory.py index fe3a4e82..04b8ab2f 100644 --- a/test/aio/test_advisory_manage_engine_advisory.py +++ b/test/aio/test_advisory_manage_engine_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mbed_tls.py b/test/aio/test_advisory_mbed_tls.py index 8b1330cc..48fe5f5c 100644 --- a/test/aio/test_advisory_mbed_tls.py +++ b/test/aio/test_advisory_mbed_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mc_afee.py b/test/aio/test_advisory_mc_afee.py index 9d27886e..994dda44 100644 --- a/test/aio/test_advisory_mc_afee.py +++ b/test/aio/test_advisory_mc_afee.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mc_afee_score.py b/test/aio/test_advisory_mc_afee_score.py index 0abc65f8..59e15e6e 100644 --- a/test/aio/test_advisory_mc_afee_score.py +++ b/test/aio/test_advisory_mc_afee_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mcpe_applicability.py b/test/aio/test_advisory_mcpe_applicability.py index 01105879..1df8b3b1 100644 --- a/test/aio/test_advisory_mcpe_applicability.py +++ b/test/aio/test_advisory_mcpe_applicability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mcpe_match.py b/test/aio/test_advisory_mcpe_match.py index 3976a352..5fb7b341 100644 --- a/test/aio/test_advisory_mcpe_match.py +++ b/test/aio/test_advisory_mcpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_me_product.py b/test/aio/test_advisory_me_product.py index c53b721f..9268b1f9 100644 --- a/test/aio/test_advisory_me_product.py +++ b/test/aio/test_advisory_me_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mediatek.py b/test/aio/test_advisory_mediatek.py index fbe7aa43..34a88bea 100644 --- a/test/aio/test_advisory_mediatek.py +++ b/test/aio/test_advisory_mediatek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_medtronic_advisory.py b/test/aio/test_advisory_medtronic_advisory.py index b3361666..9fa9985b 100644 --- a/test/aio/test_advisory_medtronic_advisory.py +++ b/test/aio/test_advisory_medtronic_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mendix.py b/test/aio/test_advisory_mendix.py index 8aa676c1..2f334b6d 100644 --- a/test/aio/test_advisory_mendix.py +++ b/test/aio/test_advisory_mendix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_meta_advisories.py b/test/aio/test_advisory_meta_advisories.py index c2d52447..0474c59b 100644 --- a/test/aio/test_advisory_meta_advisories.py +++ b/test/aio/test_advisory_meta_advisories.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_meta_data.py b/test/aio/test_advisory_meta_data.py index 807c81c6..e35d10f0 100644 --- a/test/aio/test_advisory_meta_data.py +++ b/test/aio/test_advisory_meta_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -45,11 +45,9 @@ def make_instance(self, include_optional) -> AdvisoryMetaData: href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.aio.models.issued.issued(), severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.aio.models.updated.updated(), ), cve = [ '' ], diff --git a/test/aio/test_advisory_metasploit_exploit.py b/test/aio/test_advisory_metasploit_exploit.py index 2e84942d..f5e8e9f2 100644 --- a/test/aio/test_advisory_metasploit_exploit.py +++ b/test/aio/test_advisory_metasploit_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_metric.py b/test/aio/test_advisory_metric.py index 0f395c23..5e810655 100644 --- a/test/aio/test_advisory_metric.py +++ b/test/aio/test_advisory_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_metric_scenario.py b/test/aio/test_advisory_metric_scenario.py index 5fe85ffc..93bdbd4d 100644 --- a/test/aio/test_advisory_metric_scenario.py +++ b/test/aio/test_advisory_metric_scenario.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_metrics_other.py b/test/aio/test_advisory_metrics_other.py index d0011465..23940645 100644 --- a/test/aio/test_advisory_metrics_other.py +++ b/test/aio/test_advisory_metrics_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_microsoft_csaf.py b/test/aio/test_advisory_microsoft_csaf.py index 27b087f9..0ce49077 100644 --- a/test/aio/test_advisory_microsoft_csaf.py +++ b/test/aio/test_advisory_microsoft_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: if include_optional: return AdvisoryMicrosoftCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_microsoft_cvrf.py b/test/aio/test_advisory_microsoft_cvrf.py index e80981c3..0e19de24 100644 --- a/test/aio/test_advisory_microsoft_cvrf.py +++ b/test/aio/test_advisory_microsoft_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_microsoft_driver_block_list.py b/test/aio/test_advisory_microsoft_driver_block_list.py index 0a2019c6..ab09732d 100644 --- a/test/aio/test_advisory_microsoft_driver_block_list.py +++ b/test/aio/test_advisory_microsoft_driver_block_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_microsoft_file_metadata.py b/test/aio/test_advisory_microsoft_file_metadata.py index 88273ef2..efd9aa4b 100644 --- a/test/aio/test_advisory_microsoft_file_metadata.py +++ b/test/aio/test_advisory_microsoft_file_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_microsoft_kb.py b/test/aio/test_advisory_microsoft_kb.py index 9d0afd0a..450456e2 100644 --- a/test/aio/test_advisory_microsoft_kb.py +++ b/test/aio/test_advisory_microsoft_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mikrotik.py b/test/aio/test_advisory_mikrotik.py index f920c2b3..de7a6655 100644 --- a/test/aio/test_advisory_mikrotik.py +++ b/test/aio/test_advisory_mikrotik.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mindray.py b/test/aio/test_advisory_mindray.py index 2ed63c61..fe83b4a2 100644 --- a/test/aio/test_advisory_mindray.py +++ b/test/aio/test_advisory_mindray.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_misp_meta.py b/test/aio/test_advisory_misp_meta.py index a882b276..8da011e5 100644 --- a/test/aio/test_advisory_misp_meta.py +++ b/test/aio/test_advisory_misp_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_misp_related_item.py b/test/aio/test_advisory_misp_related_item.py index f9ab65da..77e1effa 100644 --- a/test/aio/test_advisory_misp_related_item.py +++ b/test/aio/test_advisory_misp_related_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_misp_value.py b/test/aio/test_advisory_misp_value.py index 08e6dcc1..3b1df7ae 100644 --- a/test/aio/test_advisory_misp_value.py +++ b/test/aio/test_advisory_misp_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_misp_value_no_id.py b/test/aio/test_advisory_misp_value_no_id.py index 837dc3bc..dfb821d7 100644 --- a/test/aio/test_advisory_misp_value_no_id.py +++ b/test/aio/test_advisory_misp_value_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitel.py b/test/aio/test_advisory_mitel.py index 02a208a4..e1181174 100644 --- a/test/aio/test_advisory_mitel.py +++ b/test/aio/test_advisory_mitel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitre_attack_group_no_id.py b/test/aio/test_advisory_mitre_attack_group_no_id.py index 54c05b81..134023f8 100644 --- a/test/aio/test_advisory_mitre_attack_group_no_id.py +++ b/test/aio/test_advisory_mitre_attack_group_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitre_attack_ref.py b/test/aio/test_advisory_mitre_attack_ref.py index 2f0af725..7e6c9882 100644 --- a/test/aio/test_advisory_mitre_attack_ref.py +++ b/test/aio/test_advisory_mitre_attack_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitre_attack_tech_with_refs.py b/test/aio/test_advisory_mitre_attack_tech_with_refs.py index 22dadcaa..a9bdcf09 100644 --- a/test/aio/test_advisory_mitre_attack_tech_with_refs.py +++ b/test/aio/test_advisory_mitre_attack_tech_with_refs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitre_attack_technique.py b/test/aio/test_advisory_mitre_attack_technique.py index 3796187c..ff334410 100644 --- a/test/aio/test_advisory_mitre_attack_technique.py +++ b/test/aio/test_advisory_mitre_attack_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitre_cve_list_v5.py b/test/aio/test_advisory_mitre_cve_list_v5.py index cf836864..02c6eadd 100644 --- a/test/aio/test_advisory_mitre_cve_list_v5.py +++ b/test/aio/test_advisory_mitre_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_mitre_cve_list_v5_ref.py b/test/aio/test_advisory_mitre_cve_list_v5_ref.py index 17844657..153bbf3c 100644 --- a/test/aio/test_advisory_mitre_cve_list_v5_ref.py +++ b/test/aio/test_advisory_mitre_cve_list_v5_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -146,7 +146,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -187,10 +190,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_mitre_group_cti.py b/test/aio/test_advisory_mitre_group_cti.py index 84ee50ec..92143e07 100644 --- a/test/aio/test_advisory_mitre_group_cti.py +++ b/test/aio/test_advisory_mitre_group_cti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mitsubishi_electric_advisory.py b/test/aio/test_advisory_mitsubishi_electric_advisory.py index 4e118d50..3e58672d 100644 --- a/test/aio/test_advisory_mitsubishi_electric_advisory.py +++ b/test/aio/test_advisory_mitsubishi_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mongo_db.py b/test/aio/test_advisory_mongo_db.py index dba0117b..4f6da5c5 100644 --- a/test/aio/test_advisory_mongo_db.py +++ b/test/aio/test_advisory_mongo_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_moxa_advisory.py b/test/aio/test_advisory_moxa_advisory.py index 1c930049..ad62bce9 100644 --- a/test/aio/test_advisory_moxa_advisory.py +++ b/test/aio/test_advisory_moxa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mozilla_advisory.py b/test/aio/test_advisory_mozilla_advisory.py index 2dd5d63f..108c5ce2 100644 --- a/test/aio/test_advisory_mozilla_advisory.py +++ b/test/aio/test_advisory_mozilla_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mozilla_component.py b/test/aio/test_advisory_mozilla_component.py index 04111016..4328be84 100644 --- a/test/aio/test_advisory_mozilla_component.py +++ b/test/aio/test_advisory_mozilla_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ms_document_title.py b/test/aio/test_advisory_ms_document_title.py index 2701b746..c4be81d5 100644 --- a/test/aio/test_advisory_ms_document_title.py +++ b/test/aio/test_advisory_ms_document_title.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_mscvrf.py b/test/aio/test_advisory_mscvrf.py index 7393822b..3ca74a05 100644 --- a/test/aio/test_advisory_mscvrf.py +++ b/test/aio/test_advisory_mscvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_naver.py b/test/aio/test_advisory_naver.py index 6279c381..f7b9d867 100644 --- a/test/aio/test_advisory_naver.py +++ b/test/aio/test_advisory_naver.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ncsc.py b/test/aio/test_advisory_ncsc.py index 88760990..9ee4ba46 100644 --- a/test/aio/test_advisory_ncsc.py +++ b/test/aio/test_advisory_ncsc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: if include_optional: return AdvisoryNCSC( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_ncsccve.py b/test/aio/test_advisory_ncsccve.py index fea1b761..f9c6b8d0 100644 --- a/test/aio/test_advisory_ncsccve.py +++ b/test/aio/test_advisory_ncsccve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: if include_optional: return AdvisoryNCSCCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_nec.py b/test/aio/test_advisory_nec.py index 9e3736f1..537e1d2e 100644 --- a/test/aio/test_advisory_nec.py +++ b/test/aio/test_advisory_nec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nessus.py b/test/aio/test_advisory_nessus.py index 542a067d..3ac530c1 100644 --- a/test/aio/test_advisory_nessus.py +++ b/test/aio/test_advisory_nessus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_net_app.py b/test/aio/test_advisory_net_app.py index 85988866..35ce1571 100644 --- a/test/aio/test_advisory_net_app.py +++ b/test/aio/test_advisory_net_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_netatalk.py b/test/aio/test_advisory_netatalk.py index ad2db743..c39c6a1f 100644 --- a/test/aio/test_advisory_netatalk.py +++ b/test/aio/test_advisory_netatalk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_netgate.py b/test/aio/test_advisory_netgate.py index 6c6a8d1e..4d340001 100644 --- a/test/aio/test_advisory_netgate.py +++ b/test/aio/test_advisory_netgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_netgear.py b/test/aio/test_advisory_netgear.py index 764c0cc8..42fea8c7 100644 --- a/test/aio/test_advisory_netgear.py +++ b/test/aio/test_advisory_netgear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_netskope.py b/test/aio/test_advisory_netskope.py index 54a5eff7..6ac98640 100644 --- a/test/aio/test_advisory_netskope.py +++ b/test/aio/test_advisory_netskope.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nexpose.py b/test/aio/test_advisory_nexpose.py index 8bb9a592..2214f523 100644 --- a/test/aio/test_advisory_nexpose.py +++ b/test/aio/test_advisory_nexpose.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nginx_advisory.py b/test/aio/test_advisory_nginx_advisory.py index 3e754894..650e5581 100644 --- a/test/aio/test_advisory_nginx_advisory.py +++ b/test/aio/test_advisory_nginx_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nhs.py b/test/aio/test_advisory_nhs.py index e7e07781..583045fa 100644 --- a/test/aio/test_advisory_nhs.py +++ b/test/aio/test_advisory_nhs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ni.py b/test/aio/test_advisory_ni.py index 549ac150..a4059339 100644 --- a/test/aio/test_advisory_ni.py +++ b/test/aio/test_advisory_ni.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nist_control.py b/test/aio/test_advisory_nist_control.py index da66a872..a92f9202 100644 --- a/test/aio/test_advisory_nist_control.py +++ b/test/aio/test_advisory_nist_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_node_author.py b/test/aio/test_advisory_node_author.py index a87cd578..52a95299 100644 --- a/test/aio/test_advisory_node_author.py +++ b/test/aio/test_advisory_node_author.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_node_js.py b/test/aio/test_advisory_node_js.py index 9e59b18a..ab3a9200 100644 --- a/test/aio/test_advisory_node_js.py +++ b/test/aio/test_advisory_node_js.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_node_security.py b/test/aio/test_advisory_node_security.py index 151c36e6..88f6679f 100644 --- a/test/aio/test_advisory_node_security.py +++ b/test/aio/test_advisory_node_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nokia.py b/test/aio/test_advisory_nokia.py index 0fc83339..b293ea4b 100644 --- a/test/aio/test_advisory_nokia.py +++ b/test/aio/test_advisory_nokia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_note.py b/test/aio/test_advisory_note.py index 773f41ac..e29d2b53 100644 --- a/test/aio/test_advisory_note.py +++ b/test/aio/test_advisory_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_note_pad_plus_plus.py b/test/aio/test_advisory_note_pad_plus_plus.py index b524f3fe..36bedf6e 100644 --- a/test/aio/test_advisory_note_pad_plus_plus.py +++ b/test/aio/test_advisory_note_pad_plus_plus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nozomi.py b/test/aio/test_advisory_nozomi.py index 2d4fcd46..26816f11 100644 --- a/test/aio/test_advisory_nozomi.py +++ b/test/aio/test_advisory_nozomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ntp.py b/test/aio/test_advisory_ntp.py index 693750c2..e51fcfa6 100644 --- a/test/aio/test_advisory_ntp.py +++ b/test/aio/test_advisory_ntp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nuclei.py b/test/aio/test_advisory_nuclei.py index 5ea93b41..e94150ef 100644 --- a/test/aio/test_advisory_nuclei.py +++ b/test/aio/test_advisory_nuclei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvd20_configuration.py b/test/aio/test_advisory_nvd20_configuration.py index e703cbd4..fcb8bddf 100644 --- a/test/aio/test_advisory_nvd20_configuration.py +++ b/test/aio/test_advisory_nvd20_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvd20_cvecpe_match.py b/test/aio/test_advisory_nvd20_cvecpe_match.py index 9963b2f4..f7c9c914 100644 --- a/test/aio/test_advisory_nvd20_cvecpe_match.py +++ b/test/aio/test_advisory_nvd20_cvecpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvd20_node.py b/test/aio/test_advisory_nvd20_node.py index 6751151d..3e65c7cd 100644 --- a/test/aio/test_advisory_nvd20_node.py +++ b/test/aio/test_advisory_nvd20_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvd20_source.py b/test/aio/test_advisory_nvd20_source.py index 0ffe640a..094d9de6 100644 --- a/test/aio/test_advisory_nvd20_source.py +++ b/test/aio/test_advisory_nvd20_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvdcpe_dictionary.py b/test/aio/test_advisory_nvdcpe_dictionary.py index add2977b..d2184282 100644 --- a/test/aio/test_advisory_nvdcpe_dictionary.py +++ b/test/aio/test_advisory_nvdcpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nvidia_revision.py b/test/aio/test_advisory_nvidia_revision.py index cffca933..6fb75b24 100644 --- a/test/aio/test_advisory_nvidia_revision.py +++ b/test/aio/test_advisory_nvidia_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_nz_advisory.py b/test/aio/test_advisory_nz_advisory.py index 5e0e5cbe..cc3faac8 100644 --- a/test/aio/test_advisory_nz_advisory.py +++ b/test/aio/test_advisory_nz_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_o_curl.py b/test/aio/test_advisory_o_curl.py index d245408f..ebf0696d 100644 --- a/test/aio/test_advisory_o_curl.py +++ b/test/aio/test_advisory_o_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_octopus_deploy.py b/test/aio/test_advisory_octopus_deploy.py index 5a46fcfb..5b19deec 100644 --- a/test/aio/test_advisory_octopus_deploy.py +++ b/test/aio/test_advisory_octopus_deploy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_okta.py b/test/aio/test_advisory_okta.py index 8a795b3b..c78f1a01 100644 --- a/test/aio/test_advisory_okta.py +++ b/test/aio/test_advisory_okta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_omron.py b/test/aio/test_advisory_omron.py index ae3a5d07..514d744c 100644 --- a/test/aio/test_advisory_omron.py +++ b/test/aio/test_advisory_omron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_one_e.py b/test/aio/test_advisory_one_e.py index f5ac8eb7..4f914356 100644 --- a/test/aio/test_advisory_one_e.py +++ b/test/aio/test_advisory_one_e.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_bsd.py b/test/aio/test_advisory_open_bsd.py index 83f361dd..76837276 100644 --- a/test/aio/test_advisory_open_bsd.py +++ b/test/aio/test_advisory_open_bsd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_cvdb.py b/test/aio/test_advisory_open_cvdb.py index 3bd8e2c4..e35da9a7 100644 --- a/test/aio/test_advisory_open_cvdb.py +++ b/test/aio/test_advisory_open_cvdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_jdk.py b/test/aio/test_advisory_open_jdk.py index 582184e2..0bb67a24 100644 --- a/test/aio/test_advisory_open_jdk.py +++ b/test/aio/test_advisory_open_jdk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_jdkcve.py b/test/aio/test_advisory_open_jdkcve.py index d503fc1d..a8b408e3 100644 --- a/test/aio/test_advisory_open_jdkcve.py +++ b/test/aio/test_advisory_open_jdkcve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_ssh.py b/test/aio/test_advisory_open_ssh.py index 89602f29..d0468c1a 100644 --- a/test/aio/test_advisory_open_ssh.py +++ b/test/aio/test_advisory_open_ssh.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_ssl_sec_adv.py b/test/aio/test_advisory_open_ssl_sec_adv.py index 6d204da9..894baee5 100644 --- a/test/aio/test_advisory_open_ssl_sec_adv.py +++ b/test/aio/test_advisory_open_ssl_sec_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_ssl_vulnerability.py b/test/aio/test_advisory_open_ssl_vulnerability.py index db01f81e..6f4382eb 100644 --- a/test/aio/test_advisory_open_ssl_vulnerability.py +++ b/test/aio/test_advisory_open_ssl_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_open_stack.py b/test/aio/test_advisory_open_stack.py index 8109c928..fcb9af2c 100644 --- a/test/aio/test_advisory_open_stack.py +++ b/test/aio/test_advisory_open_stack.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_opengear.py b/test/aio/test_advisory_opengear.py index 549aea5b..7992e69f 100644 --- a/test/aio/test_advisory_opengear.py +++ b/test/aio/test_advisory_opengear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_oracle_cpu.py b/test/aio/test_advisory_oracle_cpu.py index c35e52d1..d049015c 100644 --- a/test/aio/test_advisory_oracle_cpu.py +++ b/test/aio/test_advisory_oracle_cpu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_oracle_cpucsaf.py b/test/aio/test_advisory_oracle_cpucsaf.py index 2d3ae61c..8f30cb5c 100644 --- a/test/aio/test_advisory_oracle_cpucsaf.py +++ b/test/aio/test_advisory_oracle_cpucsaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: if include_optional: return AdvisoryOracleCPUCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_original_ghsa.py b/test/aio/test_advisory_original_ghsa.py index bd436184..dbeb6b7c 100644 --- a/test/aio/test_advisory_original_ghsa.py +++ b/test/aio/test_advisory_original_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_osv.py b/test/aio/test_advisory_osv.py index 83beb30d..4307f30a 100644 --- a/test/aio/test_advisory_osv.py +++ b/test/aio/test_advisory_osv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryOSV: osv = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/aio/test_advisory_osv_obj.py b/test/aio/test_advisory_osv_obj.py index 9e9432ea..e8fa4a8b 100644 --- a/test/aio/test_advisory_osv_obj.py +++ b/test/aio/test_advisory_osv_obj.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,8 +38,8 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: return AdvisoryOSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/aio/test_advisory_osv_package.py b/test/aio/test_advisory_osv_package.py index ee7e3b04..037ae173 100644 --- a/test/aio/test_advisory_osv_package.py +++ b/test/aio/test_advisory_osv_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_osv_reference.py b/test/aio/test_advisory_osv_reference.py index 4a8de4ce..ff67b631 100644 --- a/test/aio/test_advisory_osv_reference.py +++ b/test/aio/test_advisory_osv_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_otrs.py b/test/aio/test_advisory_otrs.py index ca3f094a..0a2ee69b 100644 --- a/test/aio/test_advisory_otrs.py +++ b/test/aio/test_advisory_otrs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_oval_cve.py b/test/aio/test_advisory_oval_cve.py index e8eb8f8a..889fedd8 100644 --- a/test/aio/test_advisory_oval_cve.py +++ b/test/aio/test_advisory_oval_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_oval_reference.py b/test/aio/test_advisory_oval_reference.py index f4ba0588..525e5e96 100644 --- a/test/aio/test_advisory_oval_reference.py +++ b/test/aio/test_advisory_oval_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_override.py b/test/aio/test_advisory_override.py index 24f79d7f..0cfc3cbf 100644 --- a/test/aio/test_advisory_override.py +++ b/test/aio/test_advisory_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_override_annotation.py b/test/aio/test_advisory_override_annotation.py index a07ee46e..21fa319c 100644 --- a/test/aio/test_advisory_override_annotation.py +++ b/test/aio/test_advisory_override_annotation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_override_configuration.py b/test/aio/test_advisory_override_configuration.py index fdbff241..3018c584 100644 --- a/test/aio/test_advisory_override_configuration.py +++ b/test/aio/test_advisory_override_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_override_cve.py b/test/aio/test_advisory_override_cve.py index 30abda59..322921f0 100644 --- a/test/aio/test_advisory_override_cve.py +++ b/test/aio/test_advisory_override_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_own_cloud.py b/test/aio/test_advisory_own_cloud.py index 8d42ab4a..7171b386 100644 --- a/test/aio/test_advisory_own_cloud.py +++ b/test/aio/test_advisory_own_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_package.py b/test/aio/test_advisory_package.py index 2185e637..b9cca4b1 100644 --- a/test/aio/test_advisory_package.py +++ b/test/aio/test_advisory_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_package_stat.py b/test/aio/test_advisory_package_stat.py index c86aae5a..602f321f 100644 --- a/test/aio/test_advisory_package_stat.py +++ b/test/aio/test_advisory_package_stat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_packetstorm_exploit.py b/test/aio/test_advisory_packetstorm_exploit.py index 543e46aa..6078c74c 100644 --- a/test/aio/test_advisory_packetstorm_exploit.py +++ b/test/aio/test_advisory_packetstorm_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_palantir.py b/test/aio/test_advisory_palantir.py index 31f4ecac..ccebf763 100644 --- a/test/aio/test_advisory_palantir.py +++ b/test/aio/test_advisory_palantir.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_palo_alto_advisory.py b/test/aio/test_advisory_palo_alto_advisory.py index 6e3ac1c9..01b0f425 100644 --- a/test/aio/test_advisory_palo_alto_advisory.py +++ b/test/aio/test_advisory_palo_alto_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_panasonic.py b/test/aio/test_advisory_panasonic.py index 3ed03c42..90ea3bea 100644 --- a/test/aio/test_advisory_panasonic.py +++ b/test/aio/test_advisory_panasonic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_paper_cut.py b/test/aio/test_advisory_paper_cut.py index 51cbf26e..671a0a54 100644 --- a/test/aio/test_advisory_paper_cut.py +++ b/test/aio/test_advisory_paper_cut.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_patch.py b/test/aio/test_advisory_patch.py index e7e7efa0..fd6af42b 100644 --- a/test/aio/test_advisory_patch.py +++ b/test/aio/test_advisory_patch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_pega.py b/test/aio/test_advisory_pega.py index 1dd8f55e..cc4815f0 100644 --- a/test/aio/test_advisory_pega.py +++ b/test/aio/test_advisory_pega.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_pg_fix.py b/test/aio/test_advisory_pg_fix.py index 6866edc6..5f59605e 100644 --- a/test/aio/test_advisory_pg_fix.py +++ b/test/aio/test_advisory_pg_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_philips_advisory.py b/test/aio/test_advisory_philips_advisory.py index 47725e87..94564927 100644 --- a/test/aio/test_advisory_philips_advisory.py +++ b/test/aio/test_advisory_philips_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_phoenix_contact_advisory.py b/test/aio/test_advisory_phoenix_contact_advisory.py index 1e4009af..0ba2ae5a 100644 --- a/test/aio/test_advisory_phoenix_contact_advisory.py +++ b/test/aio/test_advisory_phoenix_contact_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_phpmy_admin.py b/test/aio/test_advisory_phpmy_admin.py index 06625aba..adc54ca4 100644 --- a/test/aio/test_advisory_phpmy_admin.py +++ b/test/aio/test_advisory_phpmy_admin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_pk_cert.py b/test/aio/test_advisory_pk_cert.py index d2df1ba6..8f9cf863 100644 --- a/test/aio/test_advisory_pk_cert.py +++ b/test/aio/test_advisory_pk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_postgres_sql.py b/test/aio/test_advisory_postgres_sql.py index 459d50ea..64fb6506 100644 --- a/test/aio/test_advisory_postgres_sql.py +++ b/test/aio/test_advisory_postgres_sql.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_power_dns.py b/test/aio/test_advisory_power_dns.py index 1323bcf3..1a91bab4 100644 --- a/test/aio/test_advisory_power_dns.py +++ b/test/aio/test_advisory_power_dns.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_prime_version.py b/test/aio/test_advisory_prime_version.py index bfcfde71..2774fe89 100644 --- a/test/aio/test_advisory_prime_version.py +++ b/test/aio/test_advisory_prime_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_product.py b/test/aio/test_advisory_product.py index 915e1c76..68d8b1c3 100644 --- a/test/aio/test_advisory_product.py +++ b/test/aio/test_advisory_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,7 +38,9 @@ def make_instance(self, include_optional) -> AdvisoryProduct: return AdvisoryProduct( name = '', product_id = '', - product_identification_helper = { } + product_identification_helper = { + 'key' : null + } ) else: return AdvisoryProduct( diff --git a/test/aio/test_advisory_product_branch.py b/test/aio/test_advisory_product_branch.py index b44a7660..c25062b2 100644 --- a/test/aio/test_advisory_product_branch.py +++ b/test/aio/test_advisory_product_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,14 +43,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ], ) @@ -60,14 +64,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ] diff --git a/test/aio/test_advisory_product_specific_detail.py b/test/aio/test_advisory_product_specific_detail.py index 698d5def..69bfceae 100644 --- a/test/aio/test_advisory_product_specific_detail.py +++ b/test/aio/test_advisory_product_specific_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_product_tree.py b/test/aio/test_advisory_product_tree.py deleted file mode 100644 index 530e41eb..00000000 --- a/test/aio/test_advisory_product_tree.py +++ /dev/null @@ -1,57 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree - -class TestAdvisoryProductTree(unittest.TestCase): - """AdvisoryProductTree unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryProductTree: - """Test AdvisoryProductTree - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryProductTree` - """ - model = AdvisoryProductTree() - if include_optional: - return AdvisoryProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ] - ) - else: - return AdvisoryProductTree( - ) - """ - - def testAdvisoryProductTree(self): - """Test AdvisoryProductTree""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_products_affected.py b/test/aio/test_advisory_products_affected.py index 66374573..5ab433ed 100644 --- a/test/aio/test_advisory_products_affected.py +++ b/test/aio/test_advisory_products_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_progress.py b/test/aio/test_advisory_progress.py index 712a6c63..85ebaafe 100644 --- a/test/aio/test_advisory_progress.py +++ b/test/aio/test_advisory_progress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_proofpoint.py b/test/aio/test_advisory_proofpoint.py index d991e15d..d6861d44 100644 --- a/test/aio/test_advisory_proofpoint.py +++ b/test/aio/test_advisory_proofpoint.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ptc.py b/test/aio/test_advisory_ptc.py index 92c75d27..313c0c1e 100644 --- a/test/aio/test_advisory_ptc.py +++ b/test/aio/test_advisory_ptc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ptm_descriptions.py b/test/aio/test_advisory_ptm_descriptions.py index 943a953c..8ec21c43 100644 --- a/test/aio/test_advisory_ptm_descriptions.py +++ b/test/aio/test_advisory_ptm_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_publisher.py b/test/aio/test_advisory_publisher.py index cfa26bc5..9ef33caa 100644 --- a/test/aio/test_advisory_publisher.py +++ b/test/aio/test_advisory_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_pure_storage.py b/test/aio/test_advisory_pure_storage.py index a4404922..ab7dcdf0 100644 --- a/test/aio/test_advisory_pure_storage.py +++ b/test/aio/test_advisory_pure_storage.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_advisory.py b/test/aio/test_advisory_py_pa_advisory.py index a10c5139..bbf39cf0 100644 --- a/test/aio/test_advisory_py_pa_advisory.py +++ b/test/aio/test_advisory_py_pa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_affected.py b/test/aio/test_advisory_py_pa_affected.py index 75ceea92..7c612f3d 100644 --- a/test/aio/test_advisory_py_pa_affected.py +++ b/test/aio/test_advisory_py_pa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_event.py b/test/aio/test_advisory_py_pa_event.py index 728a720e..c90385ec 100644 --- a/test/aio/test_advisory_py_pa_event.py +++ b/test/aio/test_advisory_py_pa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_package.py b/test/aio/test_advisory_py_pa_package.py index edb5c4a3..1750b6fe 100644 --- a/test/aio/test_advisory_py_pa_package.py +++ b/test/aio/test_advisory_py_pa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_range.py b/test/aio/test_advisory_py_pa_range.py index c6829110..e7195419 100644 --- a/test/aio/test_advisory_py_pa_range.py +++ b/test/aio/test_advisory_py_pa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_py_pa_reference.py b/test/aio/test_advisory_py_pa_reference.py index 3a76b795..a36005c7 100644 --- a/test/aio/test_advisory_py_pa_reference.py +++ b/test/aio/test_advisory_py_pa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qnap_advisory.py b/test/aio/test_advisory_qnap_advisory.py index 3cf535d7..42de7b9c 100644 --- a/test/aio/test_advisory_qnap_advisory.py +++ b/test/aio/test_advisory_qnap_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qqid.py b/test/aio/test_advisory_qqid.py index b783aa5e..c7fde5c2 100644 --- a/test/aio/test_advisory_qqid.py +++ b/test/aio/test_advisory_qqid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qsb.py b/test/aio/test_advisory_qsb.py index f90718c3..802227f9 100644 --- a/test/aio/test_advisory_qsb.py +++ b/test/aio/test_advisory_qsb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qualcomm.py b/test/aio/test_advisory_qualcomm.py index 0f9794a7..0c076b22 100644 --- a/test/aio/test_advisory_qualcomm.py +++ b/test/aio/test_advisory_qualcomm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qualys.py b/test/aio/test_advisory_qualys.py index 38f9515d..a1163e9e 100644 --- a/test/aio/test_advisory_qualys.py +++ b/test/aio/test_advisory_qualys.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_qualys_qid.py b/test/aio/test_advisory_qualys_qid.py index 241ccb3e..8acc4134 100644 --- a/test/aio/test_advisory_qualys_qid.py +++ b/test/aio/test_advisory_qualys_qid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_r_description.py b/test/aio/test_advisory_r_description.py index 31d318a9..cc88727c 100644 --- a/test/aio/test_advisory_r_description.py +++ b/test/aio/test_advisory_r_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_r_note.py b/test/aio/test_advisory_r_note.py index aaaea1d1..e055bf17 100644 --- a/test/aio/test_advisory_r_note.py +++ b/test/aio/test_advisory_r_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_r_revision.py b/test/aio/test_advisory_r_revision.py index 32ae780b..3c263206 100644 --- a/test/aio/test_advisory_r_revision.py +++ b/test/aio/test_advisory_r_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_r_score_set.py b/test/aio/test_advisory_r_score_set.py index 9af1f33e..301a502c 100644 --- a/test/aio/test_advisory_r_score_set.py +++ b/test/aio/test_advisory_r_score_set.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_r_threat.py b/test/aio/test_advisory_r_threat.py index e981c188..fd89759e 100644 --- a/test/aio/test_advisory_r_threat.py +++ b/test/aio/test_advisory_r_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_range.py b/test/aio/test_advisory_range.py index 34541fd3..d87c8315 100644 --- a/test/aio/test_advisory_range.py +++ b/test/aio/test_advisory_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ransomware_exploit.py b/test/aio/test_advisory_ransomware_exploit.py index 4b7c7967..de3df3cb 100644 --- a/test/aio/test_advisory_ransomware_exploit.py +++ b/test/aio/test_advisory_ransomware_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_record_type.py b/test/aio/test_advisory_record_type.py index 4584a8ab..9597f41e 100644 --- a/test/aio/test_advisory_record_type.py +++ b/test/aio/test_advisory_record_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_red_lion.py b/test/aio/test_advisory_red_lion.py index 9d91c135..dfe24568 100644 --- a/test/aio/test_advisory_red_lion.py +++ b/test/aio/test_advisory_red_lion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_redhat_cve.py b/test/aio/test_advisory_redhat_cve.py index e3a199c9..a6f35390 100644 --- a/test/aio/test_advisory_redhat_cve.py +++ b/test/aio/test_advisory_redhat_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_reference.py b/test/aio/test_advisory_reference.py index 96fe0e99..2e24337f 100644 --- a/test/aio/test_advisory_reference.py +++ b/test/aio/test_advisory_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_related_rule.py b/test/aio/test_advisory_related_rule.py index 4315da8c..25724cea 100644 --- a/test/aio/test_advisory_related_rule.py +++ b/test/aio/test_advisory_related_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_relationship.py b/test/aio/test_advisory_relationship.py deleted file mode 100644 index d3184cb4..00000000 --- a/test/aio/test_advisory_relationship.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship - -class TestAdvisoryRelationship(unittest.TestCase): - """AdvisoryRelationship unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRelationship: - """Test AdvisoryRelationship - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRelationship` - """ - model = AdvisoryRelationship() - if include_optional: - return AdvisoryRelationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '' - ) - else: - return AdvisoryRelationship( - ) - """ - - def testAdvisoryRelationship(self): - """Test AdvisoryRelationship""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_remediation_data.py b/test/aio/test_advisory_remediation_data.py index c1aa3264..de4ad7db 100644 --- a/test/aio/test_advisory_remediation_data.py +++ b/test/aio/test_advisory_remediation_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_renesas.py b/test/aio/test_advisory_renesas.py index 316f9be8..e283f007 100644 --- a/test/aio/test_advisory_renesas.py +++ b/test/aio/test_advisory_renesas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_reported_exploit.py b/test/aio/test_advisory_reported_exploit.py index 090ed11f..29ef822a 100644 --- a/test/aio/test_advisory_reported_exploit.py +++ b/test/aio/test_advisory_reported_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_restart_data.py b/test/aio/test_advisory_restart_data.py index 7f09bb14..974e4cbb 100644 --- a/test/aio/test_advisory_restart_data.py +++ b/test/aio/test_advisory_restart_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_revision.py b/test/aio/test_advisory_revision.py deleted file mode 100644 index 73183883..00000000 --- a/test/aio/test_advisory_revision.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision - -class TestAdvisoryRevision(unittest.TestCase): - """AdvisoryRevision unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRevision: - """Test AdvisoryRevision - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRevision` - """ - model = AdvisoryRevision() - if include_optional: - return AdvisoryRevision( - var_date = '', - description = '', - number = '' - ) - else: - return AdvisoryRevision( - ) - """ - - def testAdvisoryRevision(self): - """Test AdvisoryRevision""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_revision_history.py b/test/aio/test_advisory_revision_history.py index dc9c240e..67813db0 100644 --- a/test/aio/test_advisory_revision_history.py +++ b/test/aio/test_advisory_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_revive.py b/test/aio/test_advisory_revive.py index ce89837f..70c8d965 100644 --- a/test/aio/test_advisory_revive.py +++ b/test/aio/test_advisory_revive.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rhel_cve.py b/test/aio/test_advisory_rhel_cve.py index 53014429..4d3f5986 100644 --- a/test/aio/test_advisory_rhel_cve.py +++ b/test/aio/test_advisory_rhel_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: if include_optional: return AdvisoryRhelCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_roche.py b/test/aio/test_advisory_roche.py index a93bbfa4..48cec3f6 100644 --- a/test/aio/test_advisory_roche.py +++ b/test/aio/test_advisory_roche.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_roche_cve.py b/test/aio/test_advisory_roche_cve.py index cc409d1b..f523a61d 100644 --- a/test/aio/test_advisory_roche_cve.py +++ b/test/aio/test_advisory_roche_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rockwell.py b/test/aio/test_advisory_rockwell.py index 88667b7c..674612ae 100644 --- a/test/aio/test_advisory_rockwell.py +++ b/test/aio/test_advisory_rockwell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rockwell_affected_product.py b/test/aio/test_advisory_rockwell_affected_product.py index 98305e82..ebb1315c 100644 --- a/test/aio/test_advisory_rockwell_affected_product.py +++ b/test/aio/test_advisory_rockwell_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_advisory.py b/test/aio/test_advisory_rocky_advisory.py index 8db018b0..63518ef1 100644 --- a/test/aio/test_advisory_rocky_advisory.py +++ b/test/aio/test_advisory_rocky_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_cve.py b/test/aio/test_advisory_rocky_cve.py index 49013443..2247b18e 100644 --- a/test/aio/test_advisory_rocky_cve.py +++ b/test/aio/test_advisory_rocky_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_errata.py b/test/aio/test_advisory_rocky_errata.py index d3d99472..6b5709bc 100644 --- a/test/aio/test_advisory_rocky_errata.py +++ b/test/aio/test_advisory_rocky_errata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_fix.py b/test/aio/test_advisory_rocky_fix.py index a6587ad4..920c984b 100644 --- a/test/aio/test_advisory_rocky_fix.py +++ b/test/aio/test_advisory_rocky_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_package.py b/test/aio/test_advisory_rocky_package.py index 0dfdf0af..5c6ff87e 100644 --- a/test/aio/test_advisory_rocky_package.py +++ b/test/aio/test_advisory_rocky_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rocky_version.py b/test/aio/test_advisory_rocky_version.py index bc9b126e..51e9e1cf 100644 --- a/test/aio/test_advisory_rocky_version.py +++ b/test/aio/test_advisory_rocky_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rsync.py b/test/aio/test_advisory_rsync.py index 8f003ef4..2d374204 100644 --- a/test/aio/test_advisory_rsync.py +++ b/test/aio/test_advisory_rsync.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ruckus.py b/test/aio/test_advisory_ruckus.py index aacc0681..a3382626 100644 --- a/test/aio/test_advisory_ruckus.py +++ b/test/aio/test_advisory_ruckus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rustsec_advisory.py b/test/aio/test_advisory_rustsec_advisory.py index e7cb2827..da37691a 100644 --- a/test/aio/test_advisory_rustsec_advisory.py +++ b/test/aio/test_advisory_rustsec_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rustsec_affected.py b/test/aio/test_advisory_rustsec_affected.py index 29cb3af4..04f98af2 100644 --- a/test/aio/test_advisory_rustsec_affected.py +++ b/test/aio/test_advisory_rustsec_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rustsec_front_matter_advisory.py b/test/aio/test_advisory_rustsec_front_matter_advisory.py index 388fe081..604610f1 100644 --- a/test/aio/test_advisory_rustsec_front_matter_advisory.py +++ b/test/aio/test_advisory_rustsec_front_matter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_rustsec_front_matter_versions.py b/test/aio/test_advisory_rustsec_front_matter_versions.py index 7e2c3d7b..06150997 100644 --- a/test/aio/test_advisory_rustsec_front_matter_versions.py +++ b/test/aio/test_advisory_rustsec_front_matter_versions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sa_advisory.py b/test/aio/test_advisory_sa_advisory.py index 626b1f75..f4b7521e 100644 --- a/test/aio/test_advisory_sa_advisory.py +++ b/test/aio/test_advisory_sa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_safran.py b/test/aio/test_advisory_safran.py index adb96590..84b94609 100644 --- a/test/aio/test_advisory_safran.py +++ b/test/aio/test_advisory_safran.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_saint_exploit.py b/test/aio/test_advisory_saint_exploit.py index 6fcf0913..0054db20 100644 --- a/test/aio/test_advisory_saint_exploit.py +++ b/test/aio/test_advisory_saint_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sales_force.py b/test/aio/test_advisory_sales_force.py index 3537efed..6e26b89e 100644 --- a/test/aio/test_advisory_sales_force.py +++ b/test/aio/test_advisory_sales_force.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_samba.py b/test/aio/test_advisory_samba.py index ca74b44d..93193c44 100644 --- a/test/aio/test_advisory_samba.py +++ b/test/aio/test_advisory_samba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sandisk.py b/test/aio/test_advisory_sandisk.py index 229e4395..c1855320 100644 --- a/test/aio/test_advisory_sandisk.py +++ b/test/aio/test_advisory_sandisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sans_dshield.py b/test/aio/test_advisory_sans_dshield.py index de42a0a2..62cac828 100644 --- a/test/aio/test_advisory_sans_dshield.py +++ b/test/aio/test_advisory_sans_dshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sap.py b/test/aio/test_advisory_sap.py index 4580953d..bc4f284a 100644 --- a/test/aio/test_advisory_sap.py +++ b/test/aio/test_advisory_sap.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_schneider_cve.py b/test/aio/test_advisory_schneider_cve.py index d86b2171..3f6a9917 100644 --- a/test/aio/test_advisory_schneider_cve.py +++ b/test/aio/test_advisory_schneider_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_schneider_electric_advisory.py b/test/aio/test_advisory_schneider_electric_advisory.py index 7bb1524d..ac6fd1a4 100644 --- a/test/aio/test_advisory_schneider_electric_advisory.py +++ b/test/aio/test_advisory_schneider_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_schutzwerk.py b/test/aio/test_advisory_schutzwerk.py index aa7a3b77..b25e1bc5 100644 --- a/test/aio/test_advisory_schutzwerk.py +++ b/test/aio/test_advisory_schutzwerk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_score_set.py b/test/aio/test_advisory_score_set.py deleted file mode 100644 index 195db6e2..00000000 --- a/test/aio/test_advisory_score_set.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet - -class TestAdvisoryScoreSet(unittest.TestCase): - """AdvisoryScoreSet unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryScoreSet: - """Test AdvisoryScoreSet - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryScoreSet` - """ - model = AdvisoryScoreSet() - if include_optional: - return AdvisoryScoreSet( - base_score = '', - vector = '' - ) - else: - return AdvisoryScoreSet( - ) - """ - - def testAdvisoryScoreSet(self): - """Test AdvisoryScoreSet""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_sec_consult.py b/test/aio/test_advisory_sec_consult.py index e6dd57c1..c5f46bf0 100644 --- a/test/aio/test_advisory_sec_consult.py +++ b/test/aio/test_advisory_sec_consult.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sec_fix.py b/test/aio/test_advisory_sec_fix.py index 7aaacc59..794edafc 100644 --- a/test/aio/test_advisory_sec_fix.py +++ b/test/aio/test_advisory_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_security_bulletin.py b/test/aio/test_advisory_security_bulletin.py index fc3764ce..4a017d22 100644 --- a/test/aio/test_advisory_security_bulletin.py +++ b/test/aio/test_advisory_security_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_security_lab.py b/test/aio/test_advisory_security_lab.py index 4af9bd4b..9c54c5f0 100644 --- a/test/aio/test_advisory_security_lab.py +++ b/test/aio/test_advisory_security_lab.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_seebug_exploit.py b/test/aio/test_advisory_seebug_exploit.py index 48f67704..d6157fde 100644 --- a/test/aio/test_advisory_seebug_exploit.py +++ b/test/aio/test_advisory_seebug_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sel.py b/test/aio/test_advisory_sel.py index 98a9b802..3a0561ba 100644 --- a/test/aio/test_advisory_sel.py +++ b/test/aio/test_advisory_sel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sentinel_one.py b/test/aio/test_advisory_sentinel_one.py index 8dafc072..5820472c 100644 --- a/test/aio/test_advisory_sentinel_one.py +++ b/test/aio/test_advisory_sentinel_one.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_service_now.py b/test/aio/test_advisory_service_now.py index 7c767e88..a96ce354 100644 --- a/test/aio/test_advisory_service_now.py +++ b/test/aio/test_advisory_service_now.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_seven_zip.py b/test/aio/test_advisory_seven_zip.py index abe2d5f2..91cbb229 100644 --- a/test/aio/test_advisory_seven_zip.py +++ b/test/aio/test_advisory_seven_zip.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_severity.py b/test/aio/test_advisory_severity.py index 467d0b37..188a2be7 100644 --- a/test/aio/test_advisory_severity.py +++ b/test/aio/test_advisory_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_shadow_server_exploited_vulnerability.py b/test/aio/test_advisory_shadow_server_exploited_vulnerability.py index bdc6620f..0dca2063 100644 --- a/test/aio/test_advisory_shadow_server_exploited_vulnerability.py +++ b/test/aio/test_advisory_shadow_server_exploited_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_shielder.py b/test/aio/test_advisory_shielder.py index bf58cf06..b97e153c 100644 --- a/test/aio/test_advisory_shielder.py +++ b/test/aio/test_advisory_shielder.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sick.py b/test/aio/test_advisory_sick.py index 36b9c0ea..68cb55f6 100644 --- a/test/aio/test_advisory_sick.py +++ b/test/aio/test_advisory_sick.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_acknowledgments.py b/test/aio/test_advisory_siemens_acknowledgments.py index abf12b88..5457f4ea 100644 --- a/test/aio/test_advisory_siemens_acknowledgments.py +++ b/test/aio/test_advisory_siemens_acknowledgments.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_advisory.py b/test/aio/test_advisory_siemens_advisory.py index e1d710ea..5020b7e5 100644 --- a/test/aio/test_advisory_siemens_advisory.py +++ b/test/aio/test_advisory_siemens_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_branch.py b/test/aio/test_advisory_siemens_branch.py index f1f17169..3bb91598 100644 --- a/test/aio/test_advisory_siemens_branch.py +++ b/test/aio/test_advisory_siemens_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_cvssv3.py b/test/aio/test_advisory_siemens_cvssv3.py index 236ad708..43965244 100644 --- a/test/aio/test_advisory_siemens_cvssv3.py +++ b/test/aio/test_advisory_siemens_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_cwe.py b/test/aio/test_advisory_siemens_cwe.py index 43bfce2e..67a600dc 100644 --- a/test/aio/test_advisory_siemens_cwe.py +++ b/test/aio/test_advisory_siemens_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_distribution.py b/test/aio/test_advisory_siemens_distribution.py index 07a8d639..df52a256 100644 --- a/test/aio/test_advisory_siemens_distribution.py +++ b/test/aio/test_advisory_siemens_distribution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_document.py b/test/aio/test_advisory_siemens_document.py index 260ec769..66bda468 100644 --- a/test/aio/test_advisory_siemens_document.py +++ b/test/aio/test_advisory_siemens_document.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_engine.py b/test/aio/test_advisory_siemens_engine.py index a69eaf80..4214ba5d 100644 --- a/test/aio/test_advisory_siemens_engine.py +++ b/test/aio/test_advisory_siemens_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_generator.py b/test/aio/test_advisory_siemens_generator.py index 32b4b2c6..05578452 100644 --- a/test/aio/test_advisory_siemens_generator.py +++ b/test/aio/test_advisory_siemens_generator.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_notes.py b/test/aio/test_advisory_siemens_notes.py index 275dcbfa..f420a004 100644 --- a/test/aio/test_advisory_siemens_notes.py +++ b/test/aio/test_advisory_siemens_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_product.py b/test/aio/test_advisory_siemens_product.py index 00562387..e605beae 100644 --- a/test/aio/test_advisory_siemens_product.py +++ b/test/aio/test_advisory_siemens_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_product_identification_helper.py b/test/aio/test_advisory_siemens_product_identification_helper.py index d091a8fa..db46c90e 100644 --- a/test/aio/test_advisory_siemens_product_identification_helper.py +++ b/test/aio/test_advisory_siemens_product_identification_helper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_product_status.py b/test/aio/test_advisory_siemens_product_status.py index c0ac3402..b0316e79 100644 --- a/test/aio/test_advisory_siemens_product_status.py +++ b/test/aio/test_advisory_siemens_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_product_tree.py b/test/aio/test_advisory_siemens_product_tree.py index b2a7cc40..2f30a8e3 100644 --- a/test/aio/test_advisory_siemens_product_tree.py +++ b/test/aio/test_advisory_siemens_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_publisher.py b/test/aio/test_advisory_siemens_publisher.py index 8d0ac66a..e8702967 100644 --- a/test/aio/test_advisory_siemens_publisher.py +++ b/test/aio/test_advisory_siemens_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_references.py b/test/aio/test_advisory_siemens_references.py index 8381d1ec..c0f41c4e 100644 --- a/test/aio/test_advisory_siemens_references.py +++ b/test/aio/test_advisory_siemens_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_remediation.py b/test/aio/test_advisory_siemens_remediation.py index 5685584b..337b3f67 100644 --- a/test/aio/test_advisory_siemens_remediation.py +++ b/test/aio/test_advisory_siemens_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_revision_history.py b/test/aio/test_advisory_siemens_revision_history.py index 535db556..ec8fcca9 100644 --- a/test/aio/test_advisory_siemens_revision_history.py +++ b/test/aio/test_advisory_siemens_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_score.py b/test/aio/test_advisory_siemens_score.py index 0c6562df..709b9185 100644 --- a/test/aio/test_advisory_siemens_score.py +++ b/test/aio/test_advisory_siemens_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_sub_branch.py b/test/aio/test_advisory_siemens_sub_branch.py index d1869691..380bf2af 100644 --- a/test/aio/test_advisory_siemens_sub_branch.py +++ b/test/aio/test_advisory_siemens_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_sub_sub_branch.py b/test/aio/test_advisory_siemens_sub_sub_branch.py index 02113c3b..951c9380 100644 --- a/test/aio/test_advisory_siemens_sub_sub_branch.py +++ b/test/aio/test_advisory_siemens_sub_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_tlp.py b/test/aio/test_advisory_siemens_tlp.py index 84d6580d..3b4c673b 100644 --- a/test/aio/test_advisory_siemens_tlp.py +++ b/test/aio/test_advisory_siemens_tlp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_tracking.py b/test/aio/test_advisory_siemens_tracking.py index d0843d53..da8adc1a 100644 --- a/test/aio/test_advisory_siemens_tracking.py +++ b/test/aio/test_advisory_siemens_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_siemens_vulnerability.py b/test/aio/test_advisory_siemens_vulnerability.py index 9e003830..799dc376 100644 --- a/test/aio/test_advisory_siemens_vulnerability.py +++ b/test/aio/test_advisory_siemens_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sierra_wireless.py b/test/aio/test_advisory_sierra_wireless.py index e66136ca..5eb52d19 100644 --- a/test/aio/test_advisory_sierra_wireless.py +++ b/test/aio/test_advisory_sierra_wireless.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sigma_rule.py b/test/aio/test_advisory_sigma_rule.py index 06935935..a9ee75de 100644 --- a/test/aio/test_advisory_sigma_rule.py +++ b/test/aio/test_advisory_sigma_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -47,7 +47,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRule: author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_advisory_sigma_rule_rule.py b/test/aio/test_advisory_sigma_rule_rule.py index c1dc3d79..8a5f66d7 100644 --- a/test/aio/test_advisory_sigma_rule_rule.py +++ b/test/aio/test_advisory_sigma_rule_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -39,7 +39,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRuleRule: author = '', var_date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_advisory_sing_cert.py b/test/aio/test_advisory_sing_cert.py index 0c413f27..31797b71 100644 --- a/test/aio/test_advisory_sing_cert.py +++ b/test/aio/test_advisory_sing_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sitecore.py b/test/aio/test_advisory_sitecore.py index 8542d7d1..0c5025bf 100644 --- a/test/aio/test_advisory_sitecore.py +++ b/test/aio/test_advisory_sitecore.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_slackware.py b/test/aio/test_advisory_slackware.py index 630925c1..fd2284a3 100644 --- a/test/aio/test_advisory_slackware.py +++ b/test/aio/test_advisory_slackware.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_software_update.py b/test/aio/test_advisory_software_update.py index 13df1513..bffc09c9 100644 --- a/test/aio/test_advisory_software_update.py +++ b/test/aio/test_advisory_software_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_solar_winds_advisory.py b/test/aio/test_advisory_solar_winds_advisory.py index 2065fb35..4ae8c229 100644 --- a/test/aio/test_advisory_solar_winds_advisory.py +++ b/test/aio/test_advisory_solar_winds_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_solr.py b/test/aio/test_advisory_solr.py index e4b90fdd..07be643e 100644 --- a/test/aio/test_advisory_solr.py +++ b/test/aio/test_advisory_solr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sonatype.py b/test/aio/test_advisory_sonatype.py index 3f27a61f..cfc2cf3a 100644 --- a/test/aio/test_advisory_sonatype.py +++ b/test/aio/test_advisory_sonatype.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sonic_wall_advisory.py b/test/aio/test_advisory_sonic_wall_advisory.py index 2b23d80e..493025d6 100644 --- a/test/aio/test_advisory_sonic_wall_advisory.py +++ b/test/aio/test_advisory_sonic_wall_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_spacelabs_healthcare_advisory.py b/test/aio/test_advisory_spacelabs_healthcare_advisory.py index 3648dd86..7337f54b 100644 --- a/test/aio/test_advisory_spacelabs_healthcare_advisory.py +++ b/test/aio/test_advisory_spacelabs_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_splunk.py b/test/aio/test_advisory_splunk.py index 7705c571..4e404b53 100644 --- a/test/aio/test_advisory_splunk.py +++ b/test/aio/test_advisory_splunk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_splunk_product.py b/test/aio/test_advisory_splunk_product.py index 4be98ff6..117ed66e 100644 --- a/test/aio/test_advisory_splunk_product.py +++ b/test/aio/test_advisory_splunk_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_spring.py b/test/aio/test_advisory_spring.py index 6e720024..080fcddf 100644 --- a/test/aio/test_advisory_spring.py +++ b/test/aio/test_advisory_spring.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ssa_source.py b/test/aio/test_advisory_ssa_source.py index 10ae869b..be4daa9c 100644 --- a/test/aio/test_advisory_ssa_source.py +++ b/test/aio/test_advisory_ssa_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ssd_advisory.py b/test/aio/test_advisory_ssd_advisory.py index 35357ab7..fae5b14f 100644 --- a/test/aio/test_advisory_ssd_advisory.py +++ b/test/aio/test_advisory_ssd_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_stormshield.py b/test/aio/test_advisory_stormshield.py index 995d5e91..4b00b76c 100644 --- a/test/aio/test_advisory_stormshield.py +++ b/test/aio/test_advisory_stormshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_stryker_advisory.py b/test/aio/test_advisory_stryker_advisory.py index 603cde45..8d3961b8 100644 --- a/test/aio/test_advisory_stryker_advisory.py +++ b/test/aio/test_advisory_stryker_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_sudo.py b/test/aio/test_advisory_sudo.py index 890083cc..d08f5975 100644 --- a/test/aio/test_advisory_sudo.py +++ b/test/aio/test_advisory_sudo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_suse_security.py b/test/aio/test_advisory_suse_security.py index c131561c..41d10ffd 100644 --- a/test/aio/test_advisory_suse_security.py +++ b/test/aio/test_advisory_suse_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_swisslog_healthcare_advisory.py b/test/aio/test_advisory_swisslog_healthcare_advisory.py index 87dcdd82..fe1f17c8 100644 --- a/test/aio/test_advisory_swisslog_healthcare_advisory.py +++ b/test/aio/test_advisory_swisslog_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_symfony.py b/test/aio/test_advisory_symfony.py index 66e03504..8afd5c05 100644 --- a/test/aio/test_advisory_symfony.py +++ b/test/aio/test_advisory_symfony.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_synacktiv.py b/test/aio/test_advisory_synacktiv.py index 32cc8a7f..bdbb9d66 100644 --- a/test/aio/test_advisory_synacktiv.py +++ b/test/aio/test_advisory_synacktiv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_syncro_soft.py b/test/aio/test_advisory_syncro_soft.py index 99600c2a..5cb1a198 100644 --- a/test/aio/test_advisory_syncro_soft.py +++ b/test/aio/test_advisory_syncro_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_synology.py b/test/aio/test_advisory_synology.py index 73018c44..ef092f69 100644 --- a/test/aio/test_advisory_synology.py +++ b/test/aio/test_advisory_synology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_syss.py b/test/aio/test_advisory_syss.py index e954a408..9990c375 100644 --- a/test/aio/test_advisory_syss.py +++ b/test/aio/test_advisory_syss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tailscale.py b/test/aio/test_advisory_tailscale.py index 79f97d81..37b4ef7a 100644 --- a/test/aio/test_advisory_tailscale.py +++ b/test/aio/test_advisory_tailscale.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_talos_advisory.py b/test/aio/test_advisory_talos_advisory.py index 1a5c5a2f..f2e8ed7a 100644 --- a/test/aio/test_advisory_talos_advisory.py +++ b/test/aio/test_advisory_talos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_team_viewer.py b/test/aio/test_advisory_team_viewer.py index 3815a7f8..5628996d 100644 --- a/test/aio/test_advisory_team_viewer.py +++ b/test/aio/test_advisory_team_viewer.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tenable_research_advisory.py b/test/aio/test_advisory_tenable_research_advisory.py index f59b4053..2ed4c084 100644 --- a/test/aio/test_advisory_tenable_research_advisory.py +++ b/test/aio/test_advisory_tenable_research_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tencent.py b/test/aio/test_advisory_tencent.py index e56c4e10..fc1ebc79 100644 --- a/test/aio/test_advisory_tencent.py +++ b/test/aio/test_advisory_tencent.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_thales.py b/test/aio/test_advisory_thales.py index 15ab05c7..963f4e6b 100644 --- a/test/aio/test_advisory_thales.py +++ b/test/aio/test_advisory_thales.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_the_missing_link.py b/test/aio/test_advisory_the_missing_link.py index 6f38864c..b0a65f17 100644 --- a/test/aio/test_advisory_the_missing_link.py +++ b/test/aio/test_advisory_the_missing_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_thermo_fisher.py b/test/aio/test_advisory_thermo_fisher.py index 6dbb3972..9369dc4c 100644 --- a/test/aio/test_advisory_thermo_fisher.py +++ b/test/aio/test_advisory_thermo_fisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_threat.py b/test/aio/test_advisory_threat.py deleted file mode 100644 index 0e37f303..00000000 --- a/test/aio/test_advisory_threat.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat - -class TestAdvisoryThreat(unittest.TestCase): - """AdvisoryThreat unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryThreat: - """Test AdvisoryThreat - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryThreat` - """ - model = AdvisoryThreat() - if include_optional: - return AdvisoryThreat( - severity = '', - type = '' - ) - else: - return AdvisoryThreat( - ) - """ - - def testAdvisoryThreat(self): - """Test AdvisoryThreat""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_threat_actor_with_external_objects.py b/test/aio/test_advisory_threat_actor_with_external_objects.py index 444b5218..c68afeff 100644 --- a/test/aio/test_advisory_threat_actor_with_external_objects.py +++ b/test/aio/test_advisory_threat_actor_with_external_objects.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_threat_data.py b/test/aio/test_advisory_threat_data.py index 8d94845e..78b236a8 100644 --- a/test/aio/test_advisory_threat_data.py +++ b/test/aio/test_advisory_threat_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ti.py b/test/aio/test_advisory_ti.py index 626b1348..604c6db0 100644 --- a/test/aio/test_advisory_ti.py +++ b/test/aio/test_advisory_ti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tibco.py b/test/aio/test_advisory_tibco.py index 4973d393..71bb97f6 100644 --- a/test/aio/test_advisory_tibco.py +++ b/test/aio/test_advisory_tibco.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_timeline.py b/test/aio/test_advisory_timeline.py index da8ed56d..5bde66b8 100644 --- a/test/aio/test_advisory_timeline.py +++ b/test/aio/test_advisory_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tool.py b/test/aio/test_advisory_tool.py index 4b56291a..679305fc 100644 --- a/test/aio/test_advisory_tool.py +++ b/test/aio/test_advisory_tool.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tool_ref.py b/test/aio/test_advisory_tool_ref.py index efe0559f..9e0bd9c2 100644 --- a/test/aio/test_advisory_tool_ref.py +++ b/test/aio/test_advisory_tool_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tp_link.py b/test/aio/test_advisory_tp_link.py index d3aa79f1..d57e071e 100644 --- a/test/aio/test_advisory_tp_link.py +++ b/test/aio/test_advisory_tp_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tracking.py b/test/aio/test_advisory_tracking.py index c90638e5..8bc45102 100644 --- a/test/aio/test_advisory_tracking.py +++ b/test/aio/test_advisory_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tracking_id.py b/test/aio/test_advisory_tracking_id.py index 2042546e..eee40935 100644 --- a/test/aio/test_advisory_tracking_id.py +++ b/test/aio/test_advisory_tracking_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_trane_technology.py b/test/aio/test_advisory_trane_technology.py index 9c5f2925..f7e0594b 100644 --- a/test/aio/test_advisory_trane_technology.py +++ b/test/aio/test_advisory_trane_technology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_trend_micro.py b/test/aio/test_advisory_trend_micro.py index e80efcc8..7c78e033 100644 --- a/test/aio/test_advisory_trend_micro.py +++ b/test/aio/test_advisory_trend_micro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_triage_notes.py b/test/aio/test_advisory_triage_notes.py index e15b712e..f7a2353b 100644 --- a/test/aio/test_advisory_triage_notes.py +++ b/test/aio/test_advisory_triage_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_trustwave.py b/test/aio/test_advisory_trustwave.py index 2c136da9..e889ab47 100644 --- a/test/aio/test_advisory_trustwave.py +++ b/test/aio/test_advisory_trustwave.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_tw_cert_advisory.py b/test/aio/test_advisory_tw_cert_advisory.py index 21ff1478..49042690 100644 --- a/test/aio/test_advisory_tw_cert_advisory.py +++ b/test/aio/test_advisory_tw_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ubiquiti.py b/test/aio/test_advisory_ubiquiti.py index d6fc1473..775b6903 100644 --- a/test/aio/test_advisory_ubiquiti.py +++ b/test/aio/test_advisory_ubiquiti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ubuntu_cve.py b/test/aio/test_advisory_ubuntu_cve.py index 8c1b6f59..d1f70705 100644 --- a/test/aio/test_advisory_ubuntu_cve.py +++ b/test/aio/test_advisory_ubuntu_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_ubuntu_package_release_status.py b/test/aio/test_advisory_ubuntu_package_release_status.py index f654dd87..5cd5967a 100644 --- a/test/aio/test_advisory_ubuntu_package_release_status.py +++ b/test/aio/test_advisory_ubuntu_package_release_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_unify.py b/test/aio/test_advisory_unify.py index 41cad26d..650b84bf 100644 --- a/test/aio/test_advisory_unify.py +++ b/test/aio/test_advisory_unify.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_unisoc.py b/test/aio/test_advisory_unisoc.py index 34175aa6..728499bc 100644 --- a/test/aio/test_advisory_unisoc.py +++ b/test/aio/test_advisory_unisoc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_update.py b/test/aio/test_advisory_update.py index 18e32042..cb779fd1 100644 --- a/test/aio/test_advisory_update.py +++ b/test/aio/test_advisory_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = None, os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ) + updated = None ) else: return AdvisoryUpdate( diff --git a/test/aio/test_advisory_updated.py b/test/aio/test_advisory_updated.py deleted file mode 100644 index 8a357c74..00000000 --- a/test/aio/test_advisory_updated.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated - -class TestAdvisoryUpdated(unittest.TestCase): - """AdvisoryUpdated unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryUpdated: - """Test AdvisoryUpdated - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryUpdated` - """ - model = AdvisoryUpdated() - if include_optional: - return AdvisoryUpdated( - var_date = '' - ) - else: - return AdvisoryUpdated( - ) - """ - - def testAdvisoryUpdated(self): - """Test AdvisoryUpdated""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_usd.py b/test/aio/test_advisory_usd.py index 806eebbb..12e27cbf 100644 --- a/test/aio/test_advisory_usd.py +++ b/test/aio/test_advisory_usd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_usom_advisory.py b/test/aio/test_advisory_usom_advisory.py index dd247e0d..a0b6d9b6 100644 --- a/test/aio/test_advisory_usom_advisory.py +++ b/test/aio/test_advisory_usom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_v3_acceptance_level.py b/test/aio/test_advisory_v3_acceptance_level.py index 22ea22a3..32db204e 100644 --- a/test/aio/test_advisory_v3_acceptance_level.py +++ b/test/aio/test_advisory_v3_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_van_dyke.py b/test/aio/test_advisory_van_dyke.py index ce32d294..97326b15 100644 --- a/test/aio/test_advisory_van_dyke.py +++ b/test/aio/test_advisory_van_dyke.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vapid_labs_advisory.py b/test/aio/test_advisory_vapid_labs_advisory.py index 84245115..23258526 100644 --- a/test/aio/test_advisory_vapid_labs_advisory.py +++ b/test/aio/test_advisory_vapid_labs_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vc_vulnerable_cpes.py b/test/aio/test_advisory_vc_vulnerable_cpes.py index 58dd24a0..8ec79e9e 100644 --- a/test/aio/test_advisory_vc_vulnerable_cpes.py +++ b/test/aio/test_advisory_vc_vulnerable_cpes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vccpe_dictionary.py b/test/aio/test_advisory_vccpe_dictionary.py index dd90c96a..8af52bff 100644 --- a/test/aio/test_advisory_vccpe_dictionary.py +++ b/test/aio/test_advisory_vccpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vde_advisory.py b/test/aio/test_advisory_vde_advisory.py index b314b664..e83598ff 100644 --- a/test/aio/test_advisory_vde_advisory.py +++ b/test/aio/test_advisory_vde_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: if include_optional: return AdvisoryVDEAdvisory( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_advisory_veeam.py b/test/aio/test_advisory_veeam.py index e4d433c9..81c7cf4f 100644 --- a/test/aio/test_advisory_veeam.py +++ b/test/aio/test_advisory_veeam.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vendor_name_for_threat_actor.py b/test/aio/test_advisory_vendor_name_for_threat_actor.py index 0cb59ff4..593bec17 100644 --- a/test/aio/test_advisory_vendor_name_for_threat_actor.py +++ b/test/aio/test_advisory_vendor_name_for_threat_actor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vendor_product.py b/test/aio/test_advisory_vendor_product.py index 8ba37cf1..978401fc 100644 --- a/test/aio/test_advisory_vendor_product.py +++ b/test/aio/test_advisory_vendor_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vendor_ref.py b/test/aio/test_advisory_vendor_ref.py index cd688d5d..709b5b82 100644 --- a/test/aio/test_advisory_vendor_ref.py +++ b/test/aio/test_advisory_vendor_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_veritas.py b/test/aio/test_advisory_veritas.py index ff02ff30..bc2962e9 100644 --- a/test/aio/test_advisory_veritas.py +++ b/test/aio/test_advisory_veritas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_virtuozzo.py b/test/aio/test_advisory_virtuozzo.py index 20fcc09a..4b0b1aa7 100644 --- a/test/aio/test_advisory_virtuozzo.py +++ b/test/aio/test_advisory_virtuozzo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vlc.py b/test/aio/test_advisory_vlc.py index b69dcaf6..0f33387e 100644 --- a/test/aio/test_advisory_vlc.py +++ b/test/aio/test_advisory_vlc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vm_ware_advisory.py b/test/aio/test_advisory_vm_ware_advisory.py index e5553099..acbd9eb6 100644 --- a/test/aio/test_advisory_vm_ware_advisory.py +++ b/test/aio/test_advisory_vm_ware_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_void_sec.py b/test/aio/test_advisory_void_sec.py index 9ad52c38..7d8fe55b 100644 --- a/test/aio/test_advisory_void_sec.py +++ b/test/aio/test_advisory_void_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vuln_check.py b/test/aio/test_advisory_vuln_check.py index 2b96aedd..418c3937 100644 --- a/test/aio/test_advisory_vuln_check.py +++ b/test/aio/test_advisory_vuln_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vuln_check_config.py b/test/aio/test_advisory_vuln_check_config.py index ea8e8ff7..9eada5bd 100644 --- a/test/aio/test_advisory_vuln_check_config.py +++ b/test/aio/test_advisory_vuln_check_config.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vuln_check_cve_list_v5.py b/test/aio/test_advisory_vuln_check_cve_list_v5.py index 64b7ad4c..425e1ae3 100644 --- a/test/aio/test_advisory_vuln_check_cve_list_v5.py +++ b/test/aio/test_advisory_vuln_check_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_vuln_check_kev.py b/test/aio/test_advisory_vuln_check_kev.py index 0b146a81..578e967a 100644 --- a/test/aio/test_advisory_vuln_check_kev.py +++ b/test/aio/test_advisory_vuln_check_kev.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vuln_check_package.py b/test/aio/test_advisory_vuln_check_package.py index f648404e..ebca3cee 100644 --- a/test/aio/test_advisory_vuln_check_package.py +++ b/test/aio/test_advisory_vuln_check_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnerability.py b/test/aio/test_advisory_vulnerability.py deleted file mode 100644 index 93d0d330..00000000 --- a/test/aio/test_advisory_vulnerability.py +++ /dev/null @@ -1,83 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability - -class TestAdvisoryVulnerability(unittest.TestCase): - """AdvisoryVulnerability unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryVulnerability: - """Test AdvisoryVulnerability - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryVulnerability` - """ - model = AdvisoryVulnerability() - if include_optional: - return AdvisoryVulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ] - ) - else: - return AdvisoryVulnerability( - ) - """ - - def testAdvisoryVulnerability(self): - """Test AdvisoryVulnerability""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_vulnerable_debian_package.py b/test/aio/test_advisory_vulnerable_debian_package.py index ab0c0e27..a92ae419 100644 --- a/test/aio/test_advisory_vulnerable_debian_package.py +++ b/test/aio/test_advisory_vulnerable_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnerable_product.py b/test/aio/test_advisory_vulnerable_product.py index 33b5900a..ba38d575 100644 --- a/test/aio/test_advisory_vulnerable_product.py +++ b/test/aio/test_advisory_vulnerable_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment.py b/test/aio/test_advisory_vulnrichment.py index 7616bf15..d4a4166f 100644 --- a/test/aio/test_advisory_vulnrichment.py +++ b/test/aio/test_advisory_vulnrichment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_containers.py b/test/aio/test_advisory_vulnrichment_containers.py index 9abeba7d..74b7baa5 100644 --- a/test/aio/test_advisory_vulnrichment_containers.py +++ b/test/aio/test_advisory_vulnrichment_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_content.py b/test/aio/test_advisory_vulnrichment_content.py index c1331234..39fdcb33 100644 --- a/test/aio/test_advisory_vulnrichment_content.py +++ b/test/aio/test_advisory_vulnrichment_content.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_cve_ref.py b/test/aio/test_advisory_vulnrichment_cve_ref.py index c63a86a5..1a07b01b 100644 --- a/test/aio/test_advisory_vulnrichment_cve_ref.py +++ b/test/aio/test_advisory_vulnrichment_cve_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_metric.py b/test/aio/test_advisory_vulnrichment_metric.py index 850395d4..4c27cd58 100644 --- a/test/aio/test_advisory_vulnrichment_metric.py +++ b/test/aio/test_advisory_vulnrichment_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_option.py b/test/aio/test_advisory_vulnrichment_option.py index be4fe149..caffc517 100644 --- a/test/aio/test_advisory_vulnrichment_option.py +++ b/test/aio/test_advisory_vulnrichment_option.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vulnrichment_other.py b/test/aio/test_advisory_vulnrichment_other.py index 07c31a8f..c6729510 100644 --- a/test/aio/test_advisory_vulnrichment_other.py +++ b/test/aio/test_advisory_vulnrichment_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_vyaire_advisory.py b/test/aio/test_advisory_vyaire_advisory.py index 2be49fbd..43b35f95 100644 --- a/test/aio/test_advisory_vyaire_advisory.py +++ b/test/aio/test_advisory_vyaire_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_watch_guard.py b/test/aio/test_advisory_watch_guard.py index 8145c624..0446722d 100644 --- a/test/aio/test_advisory_watch_guard.py +++ b/test/aio/test_advisory_watch_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_whats_app.py b/test/aio/test_advisory_whats_app.py index 9a2365d9..75eb994e 100644 --- a/test/aio/test_advisory_whats_app.py +++ b/test/aio/test_advisory_whats_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wibu.py b/test/aio/test_advisory_wibu.py index b47564c3..56d83963 100644 --- a/test/aio/test_advisory_wibu.py +++ b/test/aio/test_advisory_wibu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wireshark.py b/test/aio/test_advisory_wireshark.py index 4683ad5a..49924866 100644 --- a/test/aio/test_advisory_wireshark.py +++ b/test/aio/test_advisory_wireshark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_with_secure.py b/test/aio/test_advisory_with_secure.py index a4f62922..dacc4a30 100644 --- a/test/aio/test_advisory_with_secure.py +++ b/test/aio/test_advisory_with_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wolf_ssl.py b/test/aio/test_advisory_wolf_ssl.py index 058fda53..9fa248cd 100644 --- a/test/aio/test_advisory_wolf_ssl.py +++ b/test/aio/test_advisory_wolf_ssl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wolfi.py b/test/aio/test_advisory_wolfi.py index f5d142e7..da4fac94 100644 --- a/test/aio/test_advisory_wolfi.py +++ b/test/aio/test_advisory_wolfi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wolfi_package.py b/test/aio/test_advisory_wolfi_package.py index fa268ebd..8ad869fd 100644 --- a/test/aio/test_advisory_wolfi_package.py +++ b/test/aio/test_advisory_wolfi_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wolfi_sec_fix.py b/test/aio/test_advisory_wolfi_sec_fix.py index dc9cfaf7..57302a4f 100644 --- a/test/aio/test_advisory_wolfi_sec_fix.py +++ b/test/aio/test_advisory_wolfi_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wordfence.py b/test/aio/test_advisory_wordfence.py index bbe465f3..a3df949b 100644 --- a/test/aio/test_advisory_wordfence.py +++ b/test/aio/test_advisory_wordfence.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_wrt.py b/test/aio/test_advisory_wrt.py index 013f8f4e..9d73b269 100644 --- a/test/aio/test_advisory_wrt.py +++ b/test/aio/test_advisory_wrt.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_xdb.py b/test/aio/test_advisory_xdb.py index bd578065..b0c8d959 100644 --- a/test/aio/test_advisory_xdb.py +++ b/test/aio/test_advisory_xdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_xen.py b/test/aio/test_advisory_xen.py index 573543ab..f9d01e87 100644 --- a/test/aio/test_advisory_xen.py +++ b/test/aio/test_advisory_xen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_xerox.py b/test/aio/test_advisory_xerox.py index 6d9c1291..418b810f 100644 --- a/test/aio/test_advisory_xerox.py +++ b/test/aio/test_advisory_xerox.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_xiaomi.py b/test/aio/test_advisory_xiaomi.py index 4d00b9a3..5c8d005d 100644 --- a/test/aio/test_advisory_xiaomi.py +++ b/test/aio/test_advisory_xiaomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_xylem.py b/test/aio/test_advisory_xylem.py index f4f88920..1f3ffb56 100644 --- a/test/aio/test_advisory_xylem.py +++ b/test/aio/test_advisory_xylem.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_yamaha.py b/test/aio/test_advisory_yamaha.py index 621cd906..94ff9de0 100644 --- a/test/aio/test_advisory_yamaha.py +++ b/test/aio/test_advisory_yamaha.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_yokogawa_advisory.py b/test/aio/test_advisory_yokogawa_advisory.py index e1244e34..4fca89a5 100644 --- a/test/aio/test_advisory_yokogawa_advisory.py +++ b/test/aio/test_advisory_yokogawa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_yubico.py b/test/aio/test_advisory_yubico.py index 21af49b3..5e495b1c 100644 --- a/test/aio/test_advisory_yubico.py +++ b/test/aio/test_advisory_yubico.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zdi.py b/test/aio/test_advisory_zdi.py index dbcc0e02..9b6a3316 100644 --- a/test/aio/test_advisory_zdi.py +++ b/test/aio/test_advisory_zdi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zdi_product.py b/test/aio/test_advisory_zdi_product.py index d6d70eb4..df9bbf62 100644 --- a/test/aio/test_advisory_zdi_product.py +++ b/test/aio/test_advisory_zdi_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zdi_response.py b/test/aio/test_advisory_zdi_response.py index c80fefae..ae3ec83c 100644 --- a/test/aio/test_advisory_zdi_response.py +++ b/test/aio/test_advisory_zdi_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zdi_response_vendor.py b/test/aio/test_advisory_zdi_response_vendor.py index ab33c3d1..5d643fc3 100644 --- a/test/aio/test_advisory_zdi_response_vendor.py +++ b/test/aio/test_advisory_zdi_response_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zdi_vendor.py b/test/aio/test_advisory_zdi_vendor.py index 4684a5b5..d1920506 100644 --- a/test/aio/test_advisory_zdi_vendor.py +++ b/test/aio/test_advisory_zdi_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zebra.py b/test/aio/test_advisory_zebra.py index 7235061e..22532baa 100644 --- a/test/aio/test_advisory_zebra.py +++ b/test/aio/test_advisory_zebra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zero_day_advisory.py b/test/aio/test_advisory_zero_day_advisory.py index 8d1b1b72..b230eef5 100644 --- a/test/aio/test_advisory_zero_day_advisory.py +++ b/test/aio/test_advisory_zero_day_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zero_science_advisory.py b/test/aio/test_advisory_zero_science_advisory.py index d89f846b..67b08cba 100644 --- a/test/aio/test_advisory_zero_science_advisory.py +++ b/test/aio/test_advisory_zero_science_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zimbra.py b/test/aio/test_advisory_zimbra.py index 8fa8b89f..457f146c 100644 --- a/test/aio/test_advisory_zimbra.py +++ b/test/aio/test_advisory_zimbra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zoom.py b/test/aio/test_advisory_zoom.py index 16b6cee2..64a3f419 100644 --- a/test/aio/test_advisory_zoom.py +++ b/test/aio/test_advisory_zoom.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zscaler.py b/test/aio/test_advisory_zscaler.py index 26a52917..66b22339 100644 --- a/test/aio/test_advisory_zscaler.py +++ b/test/aio/test_advisory_zscaler.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zulu_version.py b/test/aio/test_advisory_zulu_version.py index ec163a6d..df89657f 100644 --- a/test/aio/test_advisory_zulu_version.py +++ b/test/aio/test_advisory_zulu_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zuso.py b/test/aio/test_advisory_zuso.py index 5521e444..80e9d449 100644 --- a/test/aio/test_advisory_zuso.py +++ b/test/aio/test_advisory_zuso.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_advisory_zyxel.py b/test/aio/test_advisory_zyxel.py index f3a01116..1dccc434 100644 --- a/test/aio/test_advisory_zyxel.py +++ b/test/aio/test_advisory_zyxel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_base_metric_v2.py b/test/aio/test_api_base_metric_v2.py index 3270429b..ca015b5f 100644 --- a/test/aio/test_api_base_metric_v2.py +++ b/test/aio/test_api_base_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_base_metric_v3.py b/test/aio/test_api_base_metric_v3.py index 4e0f18d3..ad2cc8c9 100644 --- a/test/aio/test_api_base_metric_v3.py +++ b/test/aio/test_api_base_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_categorization_extended.py b/test/aio/test_api_categorization_extended.py index a072ddb4..97a2776b 100644 --- a/test/aio/test_api_categorization_extended.py +++ b/test/aio/test_api_categorization_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_client_fingerprints.py b/test/aio/test_api_client_fingerprints.py index b7e30b88..46dd65a8 100644 --- a/test/aio/test_api_client_fingerprints.py +++ b/test/aio/test_api_client_fingerprints.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_configurations.py b/test/aio/test_api_configurations.py index e874e08b..3b608b54 100644 --- a/test/aio/test_api_configurations.py +++ b/test/aio/test_api_configurations.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cpe.py b/test/aio/test_api_cpe.py index 136d17f9..8f0f90eb 100644 --- a/test/aio/test_api_cpe.py +++ b/test/aio/test_api_cpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cpe_match.py b/test/aio/test_api_cpe_match.py index 4e7847a5..b9efff50 100644 --- a/test/aio/test_api_cpe_match.py +++ b/test/aio/test_api_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cpe_name.py b/test/aio/test_api_cpe_name.py index e6d35a8a..b9b94969 100644 --- a/test/aio/test_api_cpe_name.py +++ b/test/aio/test_api_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cve.py b/test/aio/test_api_cve.py index 3ac6af2a..0df02047 100644 --- a/test/aio/test_api_cve.py +++ b/test/aio/test_api_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cve_data_meta.py b/test/aio/test_api_cve_data_meta.py index ae4ab2cf..2b1028fd 100644 --- a/test/aio/test_api_cve_data_meta.py +++ b/test/aio/test_api_cve_data_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cve_data_meta_extended.py b/test/aio/test_api_cve_data_meta_extended.py index 4748f66e..a8aa6e49 100644 --- a/test/aio/test_api_cve_data_meta_extended.py +++ b/test/aio/test_api_cve_data_meta_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cve_extended.py b/test/aio/test_api_cve_extended.py index c64ad30e..f4d0bb90 100644 --- a/test/aio/test_api_cve_extended.py +++ b/test/aio/test_api_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cve_items.py b/test/aio/test_api_cve_items.py index 826ced17..373200ca 100644 --- a/test/aio/test_api_cve_items.py +++ b/test/aio/test_api_cve_items.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -135,7 +135,43 @@ def make_instance(self, include_optional) -> ApiCveItems: version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.aio.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.aio.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.aio.models.api/configurations.api.Configurations( diff --git a/test/aio/test_api_cve_items_extended.py b/test/aio/test_api_cve_items_extended.py index 52125883..ff491559 100644 --- a/test/aio/test_api_cve_items_extended.py +++ b/test/aio/test_api_cve_items_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cvssv2.py b/test/aio/test_api_cvssv2.py index 822cdb49..f3d89ee0 100644 --- a/test/aio/test_api_cvssv2.py +++ b/test/aio/test_api_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cvssv3.py b/test/aio/test_api_cvssv3.py index f18bfa29..ae8c273b 100644 --- a/test/aio/test_api_cvssv3.py +++ b/test/aio/test_api_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_cwe.py b/test/aio/test_api_cwe.py index edb7cc39..1ff5ef89 100644 --- a/test/aio/test_api_cwe.py +++ b/test/aio/test_api_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_date_time.py b/test/aio/test_api_date_time.py deleted file mode 100644 index bb101f73..00000000 --- a/test/aio/test_api_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime - -class TestApiDateTime(unittest.TestCase): - """ApiDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> ApiDateTime: - """Test ApiDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `ApiDateTime` - """ - model = ApiDateTime() - if include_optional: - return ApiDateTime( - var_date = '' - ) - else: - return ApiDateTime( - ) - """ - - def testApiDateTime(self): - """Test ApiDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_api_description.py b/test/aio/test_api_description.py index 8a8a1bfb..1ad0c4c1 100644 --- a/test/aio/test_api_description.py +++ b/test/aio/test_api_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_description_data.py b/test/aio/test_api_description_data.py index dca41879..11f7f5ea 100644 --- a/test/aio/test_api_description_data.py +++ b/test/aio/test_api_description_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_epss.py b/test/aio/test_api_epss.py index fe087ee5..bf11a58c 100644 --- a/test/aio/test_api_epss.py +++ b/test/aio/test_api_epss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_epss_data.py b/test/aio/test_api_epss_data.py index 94d67736..c8a01e8f 100644 --- a/test/aio/test_api_epss_data.py +++ b/test/aio/test_api_epss_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploit_chain.py b/test/aio/test_api_exploit_chain.py index aa30595e..579c2848 100644 --- a/test/aio/test_api_exploit_chain.py +++ b/test/aio/test_api_exploit_chain.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploit_chain_cve.py b/test/aio/test_api_exploit_chain_cve.py index 3d399987..ec18d168 100644 --- a/test/aio/test_api_exploit_chain_cve.py +++ b/test/aio/test_api_exploit_chain_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploit_v3_result.py b/test/aio/test_api_exploit_v3_result.py index ce101960..86f78593 100644 --- a/test/aio/test_api_exploit_v3_result.py +++ b/test/aio/test_api_exploit_v3_result.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploits_change.py b/test/aio/test_api_exploits_change.py index e7a03783..8ab8a067 100644 --- a/test/aio/test_api_exploits_change.py +++ b/test/aio/test_api_exploits_change.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploits_changelog.py b/test/aio/test_api_exploits_changelog.py index f33b162c..2d8f64d9 100644 --- a/test/aio/test_api_exploits_changelog.py +++ b/test/aio/test_api_exploits_changelog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -41,8 +41,8 @@ def make_instance(self, include_optional) -> ApiExploitsChangelog: change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.aio.models.new_value.new_value(), - old_value = vulncheck_sdk.aio.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '' ) diff --git a/test/aio/test_api_exploits_trending.py b/test/aio/test_api_exploits_trending.py index 7dd52c38..a4a4a4db 100644 --- a/test/aio/test_api_exploits_trending.py +++ b/test/aio/test_api_exploits_trending.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploits_v3_count.py b/test/aio/test_api_exploits_v3_count.py index 06c7c47b..c93f4930 100644 --- a/test/aio/test_api_exploits_v3_count.py +++ b/test/aio/test_api_exploits_v3_count.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_exploits_v3_timeline.py b/test/aio/test_api_exploits_v3_timeline.py index 4cf92239..1cf0c1af 100644 --- a/test/aio/test_api_exploits_v3_timeline.py +++ b/test/aio/test_api_exploits_v3_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_http_details.py b/test/aio/test_api_http_details.py index f3c1bbda..ed262677 100644 --- a/test/aio/test_api_http_details.py +++ b/test/aio/test_api_http_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_impact.py b/test/aio/test_api_impact.py index 2dbc18a4..b59acfd9 100644 --- a/test/aio/test_api_impact.py +++ b/test/aio/test_api_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_impact_extended.py b/test/aio/test_api_impact_extended.py index 69f9ee03..b3fc7fba 100644 --- a/test/aio/test_api_impact_extended.py +++ b/test/aio/test_api_impact_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_initial_access.py b/test/aio/test_api_initial_access.py index 9b16479a..2dd8b050 100644 --- a/test/aio/test_api_initial_access.py +++ b/test/aio/test_api_initial_access.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_initial_access_artifact.py b/test/aio/test_api_initial_access_artifact.py index b1fb026e..69e8c5c1 100644 --- a/test/aio/test_api_initial_access_artifact.py +++ b/test/aio/test_api_initial_access_artifact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_attack_tech.py b/test/aio/test_api_mitre_attack_tech.py index 2ae5cab8..6f591788 100644 --- a/test/aio/test_api_mitre_attack_tech.py +++ b/test/aio/test_api_mitre_attack_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_attack_to_cve.py b/test/aio/test_api_mitre_attack_to_cve.py index 455c113e..ca6a753f 100644 --- a/test/aio/test_api_mitre_attack_to_cve.py +++ b/test/aio/test_api_mitre_attack_to_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_d3fend_technique.py b/test/aio/test_api_mitre_d3fend_technique.py index 869fca57..55c0db57 100644 --- a/test/aio/test_api_mitre_d3fend_technique.py +++ b/test/aio/test_api_mitre_d3fend_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_detection_tech.py b/test/aio/test_api_mitre_detection_tech.py index 0f4f46a2..18a06673 100644 --- a/test/aio/test_api_mitre_detection_tech.py +++ b/test/aio/test_api_mitre_detection_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_mitigation2_d3fend_mapping.py b/test/aio/test_api_mitre_mitigation2_d3fend_mapping.py index 241e7a47..da3c0250 100644 --- a/test/aio/test_api_mitre_mitigation2_d3fend_mapping.py +++ b/test/aio/test_api_mitre_mitigation2_d3fend_mapping.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_mitre_mitigation_tech.py b/test/aio/test_api_mitre_mitigation_tech.py index 7f18ef69..2e527a9a 100644 --- a/test/aio/test_api_mitre_mitigation_tech.py +++ b/test/aio/test_api_mitre_mitigation_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nodes.py b/test/aio/test_api_nodes.py index b29bfadf..0d24aeac 100644 --- a/test/aio/test_api_nodes.py +++ b/test/aio/test_api_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_normalized_exploit_v3_entry.py b/test/aio/test_api_normalized_exploit_v3_entry.py index dba05abd..3edc8897 100644 --- a/test/aio/test_api_normalized_exploit_v3_entry.py +++ b/test/aio/test_api_normalized_exploit_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_normalized_report_v3_entry.py b/test/aio/test_api_normalized_report_v3_entry.py index 63bd04dd..bbda58c5 100644 --- a/test/aio/test_api_normalized_report_v3_entry.py +++ b/test/aio/test_api_normalized_report_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cpe_match.py b/test/aio/test_api_nvd20_cpe_match.py index c8466be7..94d3cc8c 100644 --- a/test/aio/test_api_nvd20_cpe_match.py +++ b/test/aio/test_api_nvd20_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cpe_name.py b/test/aio/test_api_nvd20_cpe_name.py index 453c83d2..8769913e 100644 --- a/test/aio/test_api_nvd20_cpe_name.py +++ b/test/aio/test_api_nvd20_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cve.py b/test/aio/test_api_nvd20_cve.py index 72557470..45a40415 100644 --- a/test/aio/test_api_nvd20_cve.py +++ b/test/aio/test_api_nvd20_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cve_extended.py b/test/aio/test_api_nvd20_cve_extended.py index de7c7ce1..e1b6204f 100644 --- a/test/aio/test_api_nvd20_cve_extended.py +++ b/test/aio/test_api_nvd20_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cvss_data_v2.py b/test/aio/test_api_nvd20_cvss_data_v2.py index 50a7522f..24db9fc9 100644 --- a/test/aio/test_api_nvd20_cvss_data_v2.py +++ b/test/aio/test_api_nvd20_cvss_data_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cvss_data_v3.py b/test/aio/test_api_nvd20_cvss_data_v3.py index be18dad8..a8af22bf 100644 --- a/test/aio/test_api_nvd20_cvss_data_v3.py +++ b/test/aio/test_api_nvd20_cvss_data_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cvss_metric_v2.py b/test/aio/test_api_nvd20_cvss_metric_v2.py index 8f637dd6..8c565845 100644 --- a/test/aio/test_api_nvd20_cvss_metric_v2.py +++ b/test/aio/test_api_nvd20_cvss_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cvss_metric_v3.py b/test/aio/test_api_nvd20_cvss_metric_v3.py index 9eedd371..190fbdf8 100644 --- a/test/aio/test_api_nvd20_cvss_metric_v3.py +++ b/test/aio/test_api_nvd20_cvss_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_cvss_metric_v40.py b/test/aio/test_api_nvd20_cvss_metric_v40.py index 36592466..be595051 100644 --- a/test/aio/test_api_nvd20_cvss_metric_v40.py +++ b/test/aio/test_api_nvd20_cvss_metric_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_description.py b/test/aio/test_api_nvd20_description.py index 4fdeeed6..aac817d4 100644 --- a/test/aio/test_api_nvd20_description.py +++ b/test/aio/test_api_nvd20_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_metric.py b/test/aio/test_api_nvd20_metric.py index 3cbe5539..6e9f9ce0 100644 --- a/test/aio/test_api_nvd20_metric.py +++ b/test/aio/test_api_nvd20_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_metric_extended.py b/test/aio/test_api_nvd20_metric_extended.py index 4dc275a5..6b197bf5 100644 --- a/test/aio/test_api_nvd20_metric_extended.py +++ b/test/aio/test_api_nvd20_metric_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_reference.py b/test/aio/test_api_nvd20_reference.py index 04799002..6605d0d0 100644 --- a/test/aio/test_api_nvd20_reference.py +++ b/test/aio/test_api_nvd20_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_reference_extended.py b/test/aio/test_api_nvd20_reference_extended.py index efe1271f..cc1ae6ca 100644 --- a/test/aio/test_api_nvd20_reference_extended.py +++ b/test/aio/test_api_nvd20_reference_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_temporal_associated_base_metric.py b/test/aio/test_api_nvd20_temporal_associated_base_metric.py index 49168b7a..86ad4012 100644 --- a/test/aio/test_api_nvd20_temporal_associated_base_metric.py +++ b/test/aio/test_api_nvd20_temporal_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_temporal_cvssv2.py b/test/aio/test_api_nvd20_temporal_cvssv2.py index 90439946..a829907d 100644 --- a/test/aio/test_api_nvd20_temporal_cvssv2.py +++ b/test/aio/test_api_nvd20_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_temporal_cvssv3.py b/test/aio/test_api_nvd20_temporal_cvssv3.py index e32cdd74..09dcffac 100644 --- a/test/aio/test_api_nvd20_temporal_cvssv3.py +++ b/test/aio/test_api_nvd20_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_threat_associated_base_metric.py b/test/aio/test_api_nvd20_threat_associated_base_metric.py index 7abb83ec..d828303c 100644 --- a/test/aio/test_api_nvd20_threat_associated_base_metric.py +++ b/test/aio/test_api_nvd20_threat_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_threat_cvssv40.py b/test/aio/test_api_nvd20_threat_cvssv40.py index b30b15cb..e1dd7c40 100644 --- a/test/aio/test_api_nvd20_threat_cvssv40.py +++ b/test/aio/test_api_nvd20_threat_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_vendor_comment.py b/test/aio/test_api_nvd20_vendor_comment.py index 68b17914..d2bc3421 100644 --- a/test/aio/test_api_nvd20_vendor_comment.py +++ b/test/aio/test_api_nvd20_vendor_comment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_weakness.py b/test/aio/test_api_nvd20_weakness.py index 3d45c47d..761514e1 100644 --- a/test/aio/test_api_nvd20_weakness.py +++ b/test/aio/test_api_nvd20_weakness.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_weakness_desc_extended.py b/test/aio/test_api_nvd20_weakness_desc_extended.py index aa47209d..3ebbf70b 100644 --- a/test/aio/test_api_nvd20_weakness_desc_extended.py +++ b/test/aio/test_api_nvd20_weakness_desc_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_nvd20_weakness_extended.py b/test/aio/test_api_nvd20_weakness_extended.py index 71623dfc..23a8a543 100644 --- a/test/aio/test_api_nvd20_weakness_extended.py +++ b/test/aio/test_api_nvd20_weakness_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package.py b/test/aio/test_api_oss_package.py index fcb35978..bf8cef9a 100644 --- a/test/aio/test_api_oss_package.py +++ b/test/aio/test_api_oss_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package_artifacts.py b/test/aio/test_api_oss_package_artifacts.py index e7635c1f..9b8da3ff 100644 --- a/test/aio/test_api_oss_package_artifacts.py +++ b/test/aio/test_api_oss_package_artifacts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package_download_info.py b/test/aio/test_api_oss_package_download_info.py index 33b3c659..6e0641dd 100644 --- a/test/aio/test_api_oss_package_download_info.py +++ b/test/aio/test_api_oss_package_download_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package_hash_info.py b/test/aio/test_api_oss_package_hash_info.py index deca36bc..bf6f6deb 100644 --- a/test/aio/test_api_oss_package_hash_info.py +++ b/test/aio/test_api_oss_package_hash_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package_research_attributes.py b/test/aio/test_api_oss_package_research_attributes.py index b557115e..b48565ed 100644 --- a/test/aio/test_api_oss_package_research_attributes.py +++ b/test/aio/test_api_oss_package_research_attributes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_oss_package_vulnerability.py b/test/aio/test_api_oss_package_vulnerability.py index 2f1abea2..225ee10f 100644 --- a/test/aio/test_api_oss_package_vulnerability.py +++ b/test/aio/test_api_oss_package_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_package.py b/test/aio/test_api_package.py index 11a78e07..9f91abe3 100644 --- a/test/aio/test_api_package.py +++ b/test/aio/test_api_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type.py b/test/aio/test_api_problem_type.py index 3fc7e134..ea472272 100644 --- a/test/aio/test_api_problem_type.py +++ b/test/aio/test_api_problem_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type_data.py b/test/aio/test_api_problem_type_data.py index a42e61a5..db80680f 100644 --- a/test/aio/test_api_problem_type_data.py +++ b/test/aio/test_api_problem_type_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type_data_extended.py b/test/aio/test_api_problem_type_data_extended.py index ceeee024..a7404224 100644 --- a/test/aio/test_api_problem_type_data_extended.py +++ b/test/aio/test_api_problem_type_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type_description.py b/test/aio/test_api_problem_type_description.py index f7a203aa..cc882b4c 100644 --- a/test/aio/test_api_problem_type_description.py +++ b/test/aio/test_api_problem_type_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type_description_extended.py b/test/aio/test_api_problem_type_description_extended.py index 181e71c5..d4e9ac9a 100644 --- a/test/aio/test_api_problem_type_description_extended.py +++ b/test/aio/test_api_problem_type_description_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_problem_type_extended.py b/test/aio/test_api_problem_type_extended.py index 4cc8bcc4..abb626b5 100644 --- a/test/aio/test_api_problem_type_extended.py +++ b/test/aio/test_api_problem_type_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_reference.py b/test/aio/test_api_reference.py index 13454d2c..be639f36 100644 --- a/test/aio/test_api_reference.py +++ b/test/aio/test_api_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_reference_data.py b/test/aio/test_api_reference_data.py index dfc69306..d88dcdd1 100644 --- a/test/aio/test_api_reference_data.py +++ b/test/aio/test_api_reference_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_reference_data_extended.py b/test/aio/test_api_reference_data_extended.py index ba5c1da2..68941e48 100644 --- a/test/aio/test_api_reference_data_extended.py +++ b/test/aio/test_api_reference_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_references.py b/test/aio/test_api_references.py index 1ddf465a..f322cf67 100644 --- a/test/aio/test_api_references.py +++ b/test/aio/test_api_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_references_extended.py b/test/aio/test_api_references_extended.py index 0be4339f..7654ed0e 100644 --- a/test/aio/test_api_references_extended.py +++ b/test/aio/test_api_references_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_related_attack_pattern.py b/test/aio/test_api_related_attack_pattern.py index 3b764428..4fd78283 100644 --- a/test/aio/test_api_related_attack_pattern.py +++ b/test/aio/test_api_related_attack_pattern.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_ssvc.py b/test/aio/test_api_ssvc.py index 72394574..27180e81 100644 --- a/test/aio/test_api_ssvc.py +++ b/test/aio/test_api_ssvc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_temporal_cvssv2.py b/test/aio/test_api_temporal_cvssv2.py index 32f02e2e..21934419 100644 --- a/test/aio/test_api_temporal_cvssv2.py +++ b/test/aio/test_api_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_temporal_cvssv3.py b/test/aio/test_api_temporal_cvssv3.py index c7cc1f35..f6ad2646 100644 --- a/test/aio/test_api_temporal_cvssv3.py +++ b/test/aio/test_api_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_temporal_metric_v2.py b/test/aio/test_api_temporal_metric_v2.py index 5e1b2bf0..c5451c13 100644 --- a/test/aio/test_api_temporal_metric_v2.py +++ b/test/aio/test_api_temporal_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_temporal_metric_v3.py b/test/aio/test_api_temporal_metric_v3.py index 4ba8631f..73d514e2 100644 --- a/test/aio/test_api_temporal_metric_v3.py +++ b/test/aio/test_api_temporal_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_update.py b/test/aio/test_api_update.py index 9fd2ff2b..dbed02ce 100644 --- a/test/aio/test_api_update.py +++ b/test/aio/test_api_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> ApiUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), + issued = None, os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> ApiUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ) + updated = None ) else: return ApiUpdate( diff --git a/test/aio/test_api_vuln_check_canary.py b/test/aio/test_api_vuln_check_canary.py index f8564e9c..97e65bb7 100644 --- a/test/aio/test_api_vuln_check_canary.py +++ b/test/aio/test_api_vuln_check_canary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_api_vulnerability_alias.py b/test/aio/test_api_vulnerability_alias.py index 6d03a900..01f682c3 100644 --- a/test/aio/test_api_vulnerability_alias.py +++ b/test/aio/test_api_vulnerability_alias.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_endpoints_api.py b/test/aio/test_endpoints_api.py index 026c4a63..a3726197 100644 --- a/test/aio/test_endpoints_api.py +++ b/test/aio/test_endpoints_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_indices_api.py b/test/aio/test_indices_api.py index 84a6f648..731d3350 100644 --- a/test/aio/test_indices_api.py +++ b/test/aio/test_indices_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_models_entitlements.py b/test/aio/test_models_entitlements.py index d5098cd4..c8eeb654 100644 --- a/test/aio/test_models_entitlements.py +++ b/test/aio/test_models_entitlements.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_paginate_match.py b/test/aio/test_paginate_match.py index f17ff469..13383046 100644 --- a/test/aio/test_paginate_match.py +++ b/test/aio/test_paginate_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_paginate_pagination.py b/test/aio/test_paginate_pagination.py index d2f48edc..504a75cc 100644 --- a/test/aio/test_paginate_pagination.py +++ b/test/aio/test_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_paginate_param.py b/test/aio/test_paginate_param.py index 2ac5821a..55948a95 100644 --- a/test/aio/test_paginate_param.py +++ b/test/aio/test_paginate_param.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_params_index_backup.py b/test/aio/test_params_index_backup.py index 156312e6..9e1bc72a 100644 --- a/test/aio/test_params_index_backup.py +++ b/test/aio/test_params_index_backup.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_params_index_backup_list.py b/test/aio/test_params_index_backup_list.py index cf8943f8..264e98c8 100644 --- a/test/aio/test_params_index_backup_list.py +++ b/test/aio/test_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_params_index_list.py b/test/aio/test_params_index_list.py index f1bf023a..0566707a 100644 --- a/test/aio/test_params_index_list.py +++ b/test/aio/test_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_purl_batch_vuln_finding.py b/test/aio/test_purl_batch_vuln_finding.py index a1ed81c5..afc8a272 100644 --- a/test/aio/test_purl_batch_vuln_finding.py +++ b/test/aio/test_purl_batch_vuln_finding.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_purl_package_urljson.py b/test/aio/test_purl_package_urljson.py index 60744650..86303c55 100644 --- a/test/aio/test_purl_package_urljson.py +++ b/test/aio/test_purl_package_urljson.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_purl_qualifier_json.py b/test/aio/test_purl_qualifier_json.py index 139e8666..4487645a 100644 --- a/test/aio/test_purl_qualifier_json.py +++ b/test/aio/test_purl_qualifier_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_purls_purl_response.py b/test/aio/test_purls_purl_response.py index 3fe22d5f..6bf7d787 100644 --- a/test/aio/test_purls_purl_response.py +++ b/test/aio/test_purls_purl_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_purls_vulnerability.py b/test/aio/test_purls_vulnerability.py index a5853727..1718dc53 100644 --- a/test/aio/test_purls_vulnerability.py +++ b/test/aio/test_purls_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_array_params_index_backup_list.py b/test/aio/test_render_response_array_params_index_backup_list.py index 3a416774..df2e2873 100644 --- a/test/aio/test_render_response_array_params_index_backup_list.py +++ b/test/aio/test_render_response_array_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_array_params_index_list.py b/test/aio/test_render_response_array_params_index_list.py index 3b03233e..0497d155 100644 --- a/test/aio/test_render_response_array_params_index_list.py +++ b/test/aio/test_render_response_array_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py index f46331f3..b45c2405 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py index 578f78ac..78cb64c3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index 08f1b36e..543c195c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index 22536a2c..ef61e4c8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py index 13c4dc6a..08244eb9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index 792a8d6e..a8e3a516 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py index 461e4a37..916ff6bd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py index 1d806036..7e4d5506 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py index 36cc943c..ca70d956 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py index d1481d43..a31238e0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py index ed31d3cc..47c3701a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py index fd40220c..28509726 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py index d4acbf2a..a1d37e43 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py index 57ed787c..1e8b51c2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py index 21f6adc4..d2ce1972 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py index 8b33d432..77e549b6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py index 379c221f..83574de1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py index a8ce576b..58c83cb8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py index 08ea18ef..6b6f286f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py index 7560553b..c25c4819 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py index 6fb90ad2..e1082432 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index 0399a256..ba005030 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py index e876d348..fab300e0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py index 931d836f..e26e392f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index bebc6e77..35ec05e1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py index a834cd56..5d62fa47 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index 1635a933..1cb7aa24 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py index 4a6d5faa..1a93d6a4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py index d2ddc887..2a5ec71d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 0153f36d..a9d834d9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 826cdf04..47cb6afc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py index 28b5013a..e9aaba38 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py index 0d2e616b..9e26ebd5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index dfc36456..6c136a9f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index 279216b6..ff5015b0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index 1ddd662f..2e216d75 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py index cacc90ac..701c0eb1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py index 0385eab2..e510a6db 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index be10c2df..dc358111 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py index 929c4f7e..9e7bd2f3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py index 7c93b99f..f9d53aad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py index 00278d02..4deccb75 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index 25ff0e4e..dd0d5af4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index e6460587..f4fd1a7e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 6945ac59..65de894b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py index b9f5ea02..021ff337 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py index a1c9d1ae..2c6c09e5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py index c76a4636..5c494804 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py index bf94e828..e8989853 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py index 5d451903..c414c5b1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py index 69fc550f..a17e8f17 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index 6ad8ccdf..dba69ec8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py index 5419e46b..4ef14668 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py index 9dffcd35..cda7549f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py index 4819c860..1c973b28 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py index fe63af9b..fa894877 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py index 562a8a10..f01e502d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py index 221230b7..a6b087e5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 96c0f446..32695114 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py index 935f3874..a813657c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py index 4c8bcab5..877b0938 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py index 436ffed2..3151b0ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py index 568d4fb0..3723e50f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py index 3d20ab22..99439807 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index e1a69656..59bb306d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py index 52634dbc..e968d146 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py index 3bf83488..a8837968 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py index 3c19ecfc..7f13fbe2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py index a0e9f834..4bdd4530 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py index e6c765f7..64335cd8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py index 14c6abb2..e305e170 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index 627cbf9e..ef68189f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py index d4e0b4df..512c9191 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index e42953b7..e1576913 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py index 0a908719..d85e7fcb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py index 054f7293..47fee197 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index 73c8eb64..274a2bab 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py index cbf9a018..e9a952aa 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py index 27cf427d..873438e9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py index 3e698c2f..7cb259ed 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py index 3d84fbd1..30de62f0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py index cb7f0b34..4f5e0d46 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py index fe4dc1e3..6d9a8b7e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py index 66d8ba6a..d9037e38 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py index 81d91e0f..1b420d55 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py index 0c10e80f..206b2641 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py index 8797b26f..6b5ff5a8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py index 700dc7bf..d185f06e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py index 00d1b2c3..b1066ed9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py index d19b5978..d1388c54 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py index 5ad674b6..d2bce5f1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index b0a7d607..99e3054b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py index 07daf4a1..9eefbc85 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py index 37e57525..ebdccca0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py index 4ede1371..e689a4e7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py index a0fafb37..efdf49ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py index 22f0a9e8..ee25eaa7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py index 7093046b..e4102daf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py index 08efa742..9fa8af81 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py index d03e400a..a8029941 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py index cda6882f..9d816be8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py index 23b24cd9..8dd3fe57 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 10540205..73891dfe 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/cisa_csaf_adv.advisory.CisaCsafAdv( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py index 0c1380c2..ea6c45dc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index 3dbc6190..4fc7025e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), data = [ vulncheck_sdk.aio.models.advisory/cisco_csaf.advisory.CiscoCSAF( - csaf = vulncheck_sdk.aio.models.csaf.csaf(), + csaf = null, cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py index 4b1a24e1..49afe600 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py index 2cd9ad83..f3680a9e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py index 85f7a352..bf1fb107 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index b5c638b3..d0b47b83 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py index cd633d3d..3f6e17ad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py index cf5882a9..59c1aa4c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py index 04bd15b2..391e60ce 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py index 226de8d7..c9db65b4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py index d0a16b98..426fd71c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py index 7428f9c2..04556899 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py index dceee7d9..37f0a0f6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py index 3d93027c..da527bd8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py index 95514333..782e32bc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py index af7af446..cb02680a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py index 41478a20..86670686 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py index 53f282f6..c1fddd7f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index 1d74f978..b96c37fb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -75,66 +75,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/cvrf.advisory.Cvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.aio.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.aio.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.aio.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.aio.models.advisory/vulnerability.advisory.Vulnerability( - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ], ) ] ) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index d3e3ce9c..534a2101 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 24520a7d..30e86650 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py index cacf3e4d..937aaffd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py index d479aef9..31c87386 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index 85f1bc9d..33db35d1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py index 11800d99..a73cdeb0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py index 6091011f..5a28b3ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py index f48c6245..d289c25f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py index 3732dcc1..b27c1581 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py index f6c97e2f..306ac5c8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index bcf0f2d5..5df7892a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py index 0afcaf7a..2b2b969d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py index 08480cc2..efdbd68f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index 19ca1665..3ef6967a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py index c76ed8c0..6dd35a0d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py index da37e686..1bccfb38 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py index f47e1d1d..63706448 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py index 069f8aba..7728f3ec 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py index c12d9fc1..1c08ab3a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py index ee56c983..fc2f8f6f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index 32018256..ba861e9d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -80,16 +80,16 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.aio.models.discontinued.discontinued(), - eol = vulncheck_sdk.aio.models.eol.eol(), - extended_support = vulncheck_sdk.aio.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.aio.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.aio.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py index 4f2e1b73..16683d6a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py index ef6ee5fd..9737d223 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py index 627de8da..ac138cc6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py index 0e1174fb..e9bd1126 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py index 1e28115d..efeeb8d7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py index cc8514a6..4cd6391c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py index 5f37d58f..640e25c2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py index 9705e356..38aeaf9e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index 49319acc..5542a1d9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py index 69bf9db5..705deb98 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index bf03eb09..0cfd2d09 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py index 5c67b51b..b708c5d2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py index c3b91de3..4c7089e9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index 05f12453..a6e55a75 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index a59ca511..4271670a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py index f81559f2..aa6a504f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py index f9b8e850..ba905979 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py index 3818ed43..a01d0ad2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py index d322244d..f5d96be4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py index 662229af..07879003 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py index e50cbc70..5721facc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index f9c2ebfb..0c1eda8e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index fd264e7d..29d69f48 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py index 01215d48..4201e9e5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py index 27e7d64e..4ae78b5a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 1fe00c7c..8e13e944 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index 730167fb..429684c9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -82,13 +82,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector_string = '', ), cwes = vulncheck_sdk.aio.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index 1c7782f2..db671c0f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index d13ae699..f79dcc8b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py index c693dceb..425965ce 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py index 598de542..fdd78646 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index 827543af..29cb9e79 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py index 4265b902..c2e625e6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py index 491285e8..ed08d990 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py index b77390e1..c4826c6e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py index ab69c6b9..7108f26c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index cb34f25c..154ff54f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py index dd9b9c7c..788c7c43 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py index 4bf7b909..2cde99eb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py index 18f7ef70..a9f0070c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index 776f4900..1275a72a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py index 3dc40ed7..4d3bc61c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index a30419e6..eec441e9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py index d1d85558..38991a94 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py index bb146898..c8afa6fd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py index 6811eea8..4ba0137d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py index 2b3be1fc..8705890d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py index 2b595ec5..7f38a1c3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py index b6fc9ce4..a5846ce9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py index fd05296d..6ef2a870 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index 05192637..c3d2c7fe 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py index 8342b413..07ced7fe 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py index 6b7c9f33..7454b73c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py index b3413a37..efbd5bd9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py index 5b45b05a..13c8c4cf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py index edda2e7f..6f6d1f9f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py index 1323adf5..a82c010b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index 4aca8f32..b10296e0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py index 4302ae4d..b5759493 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py index 6286b6fb..25941a20 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py index d939156f..b6679c6d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py index 0ef3f7d8..9735df5a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py index 3f364cc9..fed5f019 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py index 3c1cb76f..c1911a85 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py index ef77564b..62d6e639 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py index fee66473..09298ad6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py index 57e476f9..3d160145 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index 4a301c0e..845c991a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index dbdcb8fc..ec7b84f4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index 28e58723..72acfc7a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py index b734fb70..9cb09d15 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py index fa698720..3ee1595f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index f00fe109..4ff36922 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py index 472f336d..ece9d0d0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py index c2ca7920..7929f728 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py index abe17066..a9f8c28c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py index 9490eefe..42f0e9fa 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py index f205a765..503b7df7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py index 6d89163e..3850bba2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py index 4193d595..441694ce 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py index 68b0c6e2..6a8596a6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py index 8f97a2e3..e421775f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index 6e9d6614..8d2fc5b1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py index 8335fef4..5e02a65b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py index 1b28e2d2..c5156d4c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py index 543232d7..ef07b04c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py index 2849390f..9c1f7665 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py index b8c8875a..aa85db8b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py index 17b001ac..c42746cb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index 26fe5760..c42b20ad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index 2e7bbf10..a5cb2896 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py index d2d2eddb..a9a44173 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index d164fc1f..0f81f4e7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi malware = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index bd06945b..bc8b1bd1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py index 69dd087a..8d1e1abd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py index 24eaf1d0..4fe986d3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py index c8af17db..bb7dd9e0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py index 098f47e8..51ac3915 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py index 7534e6df..3b78ab93 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py index b364081d..5df951ed 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index 8ce0b4ff..36e5ce34 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -82,11 +82,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.aio.models.issued.issued(), severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.aio.models.updated.updated(), ), cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py index 591bbcff..390260d8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index d86b899f..187c86e5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/microsoft_csaf.advisory.MicrosoftCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index 76ee2ed6..1a46ca2d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index 366595e1..ae82a3c3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -75,7 +75,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/microsoft_driver_block_list.advisory.MicrosoftDriverBlockList( date_added = '', file_id = '', - file_metadata = vulncheck_sdk.aio.models.file_metadata.file_metadata(), ) + file_metadata = vulncheck_sdk.aio.models.advisory/microsoft_file_metadata.advisory.MicrosoftFileMetadata( + file_name = '', + maximum_file_version = '', + minimum_file_version = '', + product_name = '', + sha1_hash = '', + sha256_hash = '', ), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py index 08250351..928d7092 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index ca130e61..c735538a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index cafd6bb8..4c015fe4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py index ab81582b..531cdce9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index a7610355..92574af8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index f918e9f2..606c8624 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py index 2a615dda..5e5862d8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py index 179353a0..be2bc810 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index 80b56451..41be58dc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py index 5f1cdbd2..2db55624 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 535d4d52..b131848e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index fbe96288..30c528cb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/ncsc.advisory.NCSC( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index 449e3a20..75a8fb98 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/ncsccve.advisory.NCSCCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py index b67f4676..abafa770 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py index 51b888bd..1e8291e0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py index d22b1ce9..ad6fbd99 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py index 4156cbd1..bc1c2b44 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index 196ce5d0..f4083ee1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py index fb5ca968..3b98b136 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py index accbdcb8..a89de8c4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py index 428932ae..d5e24f98 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py index 7fe715fc..86078d17 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py index 5816106f..c09e14cd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py index 53c7b6d6..c955c7e7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py index 126f76c5..e4e919a3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py index 7512ac10..910e40cd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index a4c9a349..da555b1a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index f6febff0..6d21afd9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index 83e59686..91727832 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py index d6948db0..76385db9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py index 0987b847..0ca5025a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index 26310abf..96a4565b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py index 91041793..5cf9930e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py index 42215c3a..9dcb66ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py index 399be641..c60e4cf8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py index 124a8146..d9a5fc6e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 01daa00a..544e4c96 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index 02589d3e..669fd8ba 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py index 665fdc2a..46ec9350 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py index 7966eb0e..1f0f04f4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index c9476e7a..ed5eff10 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index bdfb5e66..feb079bc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py index 7c55da9b..e3d29154 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py index 6895ff02..59927072 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 49281485..9976f567 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py index 8cbedff9..c48a27c4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 41ad3310..aa4a24c3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/oracle_cpucsaf.advisory.OracleCPUCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py index e0a0b2e1..838d0c1f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi osv = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py index 644fc3e3..91fc39d4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index 11b29d83..a1250665 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py index 06d5b550..93452dad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py index 2af9c4c9..6d404dde 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py index 15df4aef..cdb72d81 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index dfa6366b..337edc87 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py index bd15375e..0312bc99 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py index b2d2c57e..69d74cbd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py index 0077a9c1..db5efb0c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py index bb44aaf6..a53bf731 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index d8c918b8..72681a5b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index fb29164b..0de4c720 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py index e48ac570..788cbcd8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index 004eeccd..c6e1b2dc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py index 6724c4e9..4836fa83 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index d23b2a88..4ed43b2a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index 318b051b..8085d9d7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py index 7ad729e6..b83c065b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index b857ec32..7368615f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py index 782e9c89..2a0c615d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py index 768fa7b6..6ea45588 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index f8621a44..610969c4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py index 9508496a..7b6cf0b2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py index ea15779f..bc52e341 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py index 00c35a40..7b2a19c1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py index 6a1196cd..2e6ac4be 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 397231f4..37c676cf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py index bcc1ba4e..dddfa14f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index 4844fa22..564c700b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py index aa5534cf..7781a5e9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index e7569a84..89e8e566 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/rhel_cve.advisory.RhelCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py index bab7fc84..bfc92374 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py index d230fa0b..b9f30cfa 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py index 869123bc..bad884cd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 47660855..9d699cb8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index 934c7a51..a6b46809 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py index 1bfdcd5e..9daa02b8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py index a1c3b4ec..d65fdbd2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py index cf17e7a7..c328fd92 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py index 7a15e3b2..728f6c13 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py index 38bf10bf..419cde92 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py index 7ce4bf2d..f48c2481 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index 56d82b81..8f707b84 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py index 29545f22..cd6d950c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py index 78589e18..bd60d916 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py index a8ca1f8e..c49e9b11 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index 255b0512..f2db9eb1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index c23361a1..6e75238d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py index 41bea310..07d55dc5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py index 90751e51..a78b840e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py index b5423a25..24da2e5b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py index 2f55e76a..3de99617 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py index 3cbf6f5e..b9fdab32 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index 1d06a6e4..3790cb87 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index ef13f628..5bf421ae 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py index 3bb808c2..2048b791 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index 90667f43..e76386bd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py index 37766bb5..eb9149a8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index 3b9bb1d4..7a94ec6d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py index 60566f5b..391d66ce 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index a03fbb14..9d8fb258 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -84,7 +84,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py index 2323e547..f4f3c1a2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py index d9833214..f39b6945 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index 16af4a75..9bf35e47 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py index 04126c03..426f9e72 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 1ded59fd..bd2fad78 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index f7a15cf0..711197d4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py index 820b2714..809d8f57 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index 2086fb93..93b19212 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py index 2841a4b1..63bce8c3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py index d6f57df6..e9cde388 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py index 9b8cefab..2d6a59f1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py index 7d6c78f3..d671a57a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py index 25630af6..4e5286cc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py index cf095b45..30af6ae6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 779f2717..db734da2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py index 5337f4df..5f25e19b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index 430dd187..940d4704 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index d6b89ac3..9851737a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py index 301a8d7f..c5a68972 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py index d8c30569..55e7e9d9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py index acc7e7d6..cd5f32d3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index 28a8f4f0..5da398ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py index 005dddf9..dd4bca81 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py index 14915525..1fda52fb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py index 80c51e23..89e21a88 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py index fa1bf9a2..dc96c592 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py index de5dc683..415945f9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py index 27eb6ac0..fa5227c7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index cad91f27..b91494ba 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py index 9046d69e..83276ef9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py index 3cf5b559..a8f55462 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py index 13b0467b..d77e4550 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py index 95009caf..051009a3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py index 213560b9..1760272e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py index 8d8a6ebc..2adc7ba0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index 48601f6e..c432966e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py index 114251b0..a99b501a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py index fc6d15c5..95117ed4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py index c29b3aba..9f385707 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py index bf729a71..d4628e3e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py index 0fdc91ce..23b2e2cb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py index 3e8c03d8..e9d4a198 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.issued.issued(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), ) + updated = vulncheck_sdk.aio.models.issued.issued(), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py index 620c0805..4f6e0b80 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py index cf5cd0b0..d40bc311 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 70569763..7df66b04 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py index 8c3620eb..8040a2a5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py index a47d6c15..e2fd3aea 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py index 12bb9c49..443b8458 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index f9b2ba4e..fda56065 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/vde_advisory.advisory.VDEAdvisory( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py index 7aa85689..11bd4409 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py index 976397f1..21ed2729 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py index b23c72da..6152ef83 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index 017459fe..e48706e8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py index f08ed900..09da257f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index d1958b5c..0e1092dd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py index c9407559..193ed4c7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index d02cb9d6..46809da1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index b34b09e7..984e8a4f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py index 7f0a2286..e3436de3 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py index 33e00662..d0cd0501 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index 985c4132..3b81bc0a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index 0c5f830c..68acd29f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py index a6330578..0d9155ad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index bf38e218..ef493629 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 6743008b..8a7b5848 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index 0087a389..324eac5a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index 60ea8812..6f8fcc54 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py index baa49c50..68191204 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index 381400ab..550c20ee 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py index 7408e5a8..21d41384 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py index b88c6eaa..f5394ff6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py index 6cabecdf..8959a78a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index ddb797b4..4421c948 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py index 7cdbd50e..e021e85c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py index ef7c849c..9e3f5eeb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py index db7f963f..67b5a0cd 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py index 895ac27a..978b78b9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index 6c91da67..ee22a343 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index bf9b37fa..fb1c63c0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py index b1aa8836..99b653fc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py index d5ebdede..3503bb4b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py index ca9dad81..617e2d0f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py index d17e7133..6a56a10d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index c2ad5aca..df940551 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py index 5aff31ce..f6ef449c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index 03905674..d01bb358 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index d1a1db14..fba5bc37 100644 --- a/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py index d9476b24..747b580b 100644 --- a/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -172,7 +172,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.aio.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.aio.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.aio.models.api/configurations.api.Configurations( diff --git a/test/aio/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py index 76fb7e14..30394668 100644 --- a/test/aio/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py index 15fcda03..f0cac9e1 100644 --- a/test/aio/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py index ac69162b..8ee83344 100644 --- a/test/aio/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index a75d2438..3d5b7946 100644 --- a/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,7 +81,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE ransomware_families = 56, threat_actors = 56, ), date_added = '', - epss = vulncheck_sdk.aio.models.epss.epss(), + epss = vulncheck_sdk.aio.models.api/epss.api.EPSS( + epss_percentile = 1.337, + epss_score = 1.337, + last_modified = '', ), exploits = [ vulncheck_sdk.aio.models.api/normalized_exploit_v3_entry.api.NormalizedExploitV3Entry( clone_ssh_url = '', diff --git a/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index 4ec97196..9a331c48 100644 --- a/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -78,8 +78,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.aio.models.new_value.new_value(), - old_value = vulncheck_sdk.aio.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '', ) ] diff --git a/test/aio/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py index 4d672e88..0f29507c 100644 --- a/test/aio/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py index 529d7695..9fea316e 100644 --- a/test/aio/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py index 1ceb05d1..0f3501c6 100644 --- a/test/aio/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index 831d75e1..e45328ed 100644 --- a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index 29457070..cbc72662 100644 --- a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py index 5edf7df6..56e6d4a4 100644 --- a/test/aio/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py index 4e77ffc8..e5aa5200 100644 --- a/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.issued.issued(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), ) + updated = vulncheck_sdk.aio.models.issued.issued(), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 4a19b797..03776cfa 100644 --- a/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py index 431d6ba5..e836e65f 100644 --- a/test/aio/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index 3a2a96b5..9d7ea959 100644 --- a/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py b/test/aio/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py index a8a12b8f..38960644 100644 --- a/test/aio/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py b/test/aio/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py index 7c7883b7..1afa2eca 100644 --- a/test/aio/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index 706bf6e9..e830c2a5 100644 --- a/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,7 +38,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control return RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata( benchmark = 1.337, meta = vulncheck_sdk.aio.models.v3controllers/purl_response_metadata.v3controllers.PurlResponseMetadata( - purl_struct = vulncheck_sdk.aio.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.aio.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.aio.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), timestamp = '', total_documents = 56, ), data = vulncheck_sdk.aio.models.v3controllers/purl_response_data.v3controllers.PurlResponseData( diff --git a/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index cd77940e..4711afba 100644 --- a/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -46,7 +46,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control '' ], purl = '', - purl_struct = vulncheck_sdk.aio.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.aio.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.aio.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), research_attributes = vulncheck_sdk.aio.models.api/oss_package_research_attributes.api.OSSPackageResearchAttributes( abandoned = True, eol = True, diff --git a/test/blocking/test_advisory_status.py b/test/aio/test_search_error_response.py similarity index 52% rename from test/blocking/test_advisory_status.py rename to test/aio/test_search_error_response.py index 2001a728..3955f181 100644 --- a/test/blocking/test_advisory_status.py +++ b/test/aio/test_search_error_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,10 @@ import unittest -from vulncheck_sdk.models.advisory_status import AdvisoryStatus +from vulncheck_sdk.aio.models.search_error_response import SearchErrorResponse -class TestAdvisoryStatus(unittest.TestCase): - """AdvisoryStatus unit test stubs""" +class TestSearchErrorResponse(unittest.TestCase): + """SearchErrorResponse unit test stubs""" def setUp(self): pass @@ -26,28 +26,28 @@ def setUp(self): def tearDown(self): pass - def make_instance(self, include_optional) -> AdvisoryStatus: - """Test AdvisoryStatus + def make_instance(self, include_optional) -> SearchErrorResponse: + """Test SearchErrorResponse include_optional is a boolean, when False only required params are included, when True both required and optional params are included """ - # uncomment below to create an instance of `AdvisoryStatus` + # uncomment below to create an instance of `SearchErrorResponse` """ - model = AdvisoryStatus() + model = SearchErrorResponse() if include_optional: - return AdvisoryStatus( - product_id = [ + return SearchErrorResponse( + error = True, + errors = [ '' - ], - type = '' + ] ) else: - return AdvisoryStatus( + return SearchErrorResponse( ) """ - def testAdvisoryStatus(self): - """Test AdvisoryStatus""" + def testSearchErrorResponse(self): + """Test SearchErrorResponse""" # inst_req_only = self.make_instance(include_optional=False) # inst_req_and_optional = self.make_instance(include_optional=True) diff --git a/test/aio/test_search_v4_advisory_meta.py b/test/aio/test_search_v4_advisory_meta.py new file mode 100644 index 00000000..b290217b --- /dev/null +++ b/test/aio/test_search_v4_advisory_meta.py @@ -0,0 +1,58 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.search_v4_advisory_meta import SearchV4AdvisoryMeta + +class TestSearchV4AdvisoryMeta(unittest.TestCase): + """SearchV4AdvisoryMeta unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4AdvisoryMeta: + """Test SearchV4AdvisoryMeta + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4AdvisoryMeta` + """ + model = SearchV4AdvisoryMeta() + if include_optional: + return SearchV4AdvisoryMeta( + cursor = '', + filtered = 56, + limit = 56, + next_cursor = '', + page = 56, + pages = 56, + total = 56 + ) + else: + return SearchV4AdvisoryMeta( + ) + """ + + def testSearchV4AdvisoryMeta(self): + """Test SearchV4AdvisoryMeta""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_search_v4_advisory_return_value.py b/test/aio/test_search_v4_advisory_return_value.py new file mode 100644 index 00000000..f93d4e18 --- /dev/null +++ b/test/aio/test_search_v4_advisory_return_value.py @@ -0,0 +1,233 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue + +class TestSearchV4AdvisoryReturnValue(unittest.TestCase): + """SearchV4AdvisoryReturnValue unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4AdvisoryReturnValue: + """Test SearchV4AdvisoryReturnValue + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4AdvisoryReturnValue` + """ + model = SearchV4AdvisoryReturnValue() + if include_optional: + return SearchV4AdvisoryReturnValue( + meta = vulncheck_sdk.aio.models.search/v4_advisory_meta.search.V4AdvisoryMeta( + cursor = '', + filtered = 56, + limit = 56, + next_cursor = '', + page = 56, + pages = 56, + total = 56, ), + data = [ + vulncheck_sdk.aio.models.advisory/mitre_cve_list_v5_ref.advisory.MitreCVEListV5Ref( + containers = vulncheck_sdk.aio.models.advisory/m_containers.advisory.MContainers( + adp = [ + vulncheck_sdk.aio.models.advisory/adp_container.advisory.ADPContainer( + affected = [ + vulncheck_sdk.aio.models.advisory/m_affected.advisory.MAffected( + collection_url = '', + cpes = [ + '' + ], + default_status = '', + package_name = '', + package_url = '', + platforms = [ + '' + ], + product = '', + repo = '', + vendor = '', + versions = [ + vulncheck_sdk.aio.models.advisory/m_version.advisory.MVersion( + less_than = '', + less_than_or_equal = '', + status = '', + version = '', + version_type = '', ) + ], ) + ], + date_public = '', + descriptions = [ + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( + lang = '', + value = '', ) + ], + impacts = [ + vulncheck_sdk.aio.models.advisory/impact.advisory.Impact( + capec_id = '', ) + ], + metrics = [ + vulncheck_sdk.aio.models.advisory/metric.advisory.Metric( + cvss_v2_0 = vulncheck_sdk.aio.models.advisory/m_cvss_v20.advisory.MCvssV20( + access_vector = '', + attack_complexity = '', + authentication = '', + availability_impact = '', + base_score = 1.337, + confidentiality_impact = '', + integrity_impact = '', + vector_string = '', + version = '', ), + cvss_v3_0 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( + attack_complexity = '', + attack_vector = '', + availability_impact = '', + base_score = 1.337, + base_severity = '', + confidentiality_impact = '', + integrity_impact = '', + privileges_required = '', + scope = '', + user_interaction = '', + vector_string = '', + version = '', ), + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + attack_complexity = '', + attack_vector = '', + availability_impact = '', + base_score = 1.337, + base_severity = '', + confidentiality_impact = '', + integrity_impact = '', + privileges_required = '', + scope = '', + user_interaction = '', + vector_string = '', + version = '', ), + cvss_v4_0 = vulncheck_sdk.aio.models.advisory/m_cvss_v40.advisory.MCvssV40( + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + automatable = '', + base_score = 1.337, + base_severity = '', + privileges_required = '', + provider_urgency = '', + recovery = '', + safety = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), + format = '', + other = vulncheck_sdk.aio.models.advisory/metrics_other.advisory.MetricsOther( + content = vulncheck_sdk.aio.models.content.content(), + type = '', ), + scenarios = [ + vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + lang = '', + value = '', ) + ], ) + ], + problem_types = [ + vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() + ], + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( + name = '', + tags = [ + '' + ], + url = '', ) + ], + tags = [ + '' + ], + title = '', ) + ], + cna = vulncheck_sdk.aio.models.advisory/m_cna.advisory.MCna( + cpe_applicability = [ + vulncheck_sdk.aio.models.advisory/mcpe_applicability.advisory.MCPEApplicability( + negate = True, + nodes = [ + vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( + cpe_match = [ + vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + criteria = '', + match_criteria_id = '', + version_end_excluding = '', + version_end_including = '', + version_start_excluding = '', + version_start_including = '', + vulnerable = True, ) + ], + negate = True, + operator = '', ) + ], + operator = '', ) + ], + credits = [ + vulncheck_sdk.aio.models.advisory/credit.advisory.Credit( + lang = '', + type = '', + value = '', ) + ], + timeline = [ + vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( + lang = '', + time = '', + value = '', ) + ], + title = '', ), ), + cve_metadata = vulncheck_sdk.aio.models.advisory/m_cve_metadata.advisory.MCveMetadata( + assigner_org_id = '', + assigner_short_name = '', + cve_id = '', + date_published = '', + date_reserved = '', + date_updated = '', + state = '', ), + data_type = '', + data_version = '', ) + ] + ) + else: + return SearchV4AdvisoryReturnValue( + ) + """ + + def testSearchV4AdvisoryReturnValue(self): + """Test SearchV4AdvisoryReturnValue""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_cwe_node.py b/test/aio/test_search_v4_feed_item.py similarity index 56% rename from test/blocking/test_advisory_cwe_node.py rename to test/aio/test_search_v4_feed_item.py index 3362843d..496025e3 100644 --- a/test/blocking/test_advisory_cwe_node.py +++ b/test/aio/test_search_v4_feed_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,10 @@ import unittest -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode +from vulncheck_sdk.aio.models.search_v4_feed_item import SearchV4FeedItem -class TestAdvisoryCWENode(unittest.TestCase): - """AdvisoryCWENode unit test stubs""" +class TestSearchV4FeedItem(unittest.TestCase): + """SearchV4FeedItem unit test stubs""" def setUp(self): pass @@ -26,28 +26,27 @@ def setUp(self): def tearDown(self): pass - def make_instance(self, include_optional) -> AdvisoryCWENode: - """Test AdvisoryCWENode + def make_instance(self, include_optional) -> SearchV4FeedItem: + """Test SearchV4FeedItem include_optional is a boolean, when False only required params are included, when True both required and optional params are included """ - # uncomment below to create an instance of `AdvisoryCWENode` + # uncomment below to create an instance of `SearchV4FeedItem` """ - model = AdvisoryCWENode() + model = SearchV4FeedItem() if include_optional: - return AdvisoryCWENode( - cweid = '', + return SearchV4FeedItem( description = '', - id = '', + href = '', name = '' ) else: - return AdvisoryCWENode( + return SearchV4FeedItem( ) """ - def testAdvisoryCWENode(self): - """Test AdvisoryCWENode""" + def testSearchV4FeedItem(self): + """Test SearchV4FeedItem""" # inst_req_only = self.make_instance(include_optional=False) # inst_req_and_optional = self.make_instance(include_optional=True) diff --git a/test/aio/test_search_v4_list_feed_return_value.py b/test/aio/test_search_v4_list_feed_return_value.py new file mode 100644 index 00000000..88ad6db9 --- /dev/null +++ b/test/aio/test_search_v4_list_feed_return_value.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.aio.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue + +class TestSearchV4ListFeedReturnValue(unittest.TestCase): + """SearchV4ListFeedReturnValue unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4ListFeedReturnValue: + """Test SearchV4ListFeedReturnValue + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4ListFeedReturnValue` + """ + model = SearchV4ListFeedReturnValue() + if include_optional: + return SearchV4ListFeedReturnValue( + data = [ + vulncheck_sdk.aio.models.search/v4_feed_item.search.V4FeedItem( + description = '', + href = '', + name = '', ) + ] + ) + else: + return SearchV4ListFeedReturnValue( + ) + """ + + def testSearchV4ListFeedReturnValue(self): + """Test SearchV4ListFeedReturnValue""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_v3controllers_backup_response_metadata.py b/test/aio/test_v3controllers_backup_response_metadata.py index 588fa82c..e1cfab46 100644 --- a/test/aio/test_v3controllers_backup_response_metadata.py +++ b/test/aio/test_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_v3controllers_purl_response_data.py b/test/aio/test_v3controllers_purl_response_data.py index 9c8c78c0..2ca4539a 100644 --- a/test/aio/test_v3controllers_purl_response_data.py +++ b/test/aio/test_v3controllers_purl_response_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_v3controllers_purl_response_metadata.py b/test/aio/test_v3controllers_purl_response_metadata.py index 7fd7e4d1..01e87ae1 100644 --- a/test/aio/test_v3controllers_purl_response_metadata.py +++ b/test/aio/test_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_v3controllers_purls_response_metadata.py b/test/aio/test_v3controllers_purls_response_metadata.py index 0fe53d55..cf5ff68b 100644 --- a/test/aio/test_v3controllers_purls_response_metadata.py +++ b/test/aio/test_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/aio/test_v3controllers_response_metadata.py b/test/aio/test_v3controllers_response_metadata.py index dfc27491..3a4506fd 100644 --- a/test/aio/test_v3controllers_response_metadata.py +++ b/test/aio/test_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_a10.py b/test/blocking/test_advisory_a10.py index c3063ac5..a0a65b3a 100644 --- a/test/blocking/test_advisory_a10.py +++ b/test/blocking/test_advisory_a10.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_abb_advisory.py b/test/blocking/test_advisory_abb_advisory.py index 177682a9..9b2934a4 100644 --- a/test/blocking/test_advisory_abb_advisory.py +++ b/test/blocking/test_advisory_abb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_abbott.py b/test/blocking/test_advisory_abbott.py index b3692795..8de8a9f3 100644 --- a/test/blocking/test_advisory_abbott.py +++ b/test/blocking/test_advisory_abbott.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_absolute.py b/test/blocking/test_advisory_absolute.py index 29aa15a3..d87f8352 100644 --- a/test/blocking/test_advisory_absolute.py +++ b/test/blocking/test_advisory_absolute.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_acknowledgement.py b/test/blocking/test_advisory_acknowledgement.py index 4aba849e..a24a9b99 100644 --- a/test/blocking/test_advisory_acknowledgement.py +++ b/test/blocking/test_advisory_acknowledgement.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_acronis.py b/test/blocking/test_advisory_acronis.py index 20c660a4..0f40901b 100644 --- a/test/blocking/test_advisory_acronis.py +++ b/test/blocking/test_advisory_acronis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adobe_advisory.py b/test/blocking/test_advisory_adobe_advisory.py index e796b586..c59836a3 100644 --- a/test/blocking/test_advisory_adobe_advisory.py +++ b/test/blocking/test_advisory_adobe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adobe_affected.py b/test/blocking/test_advisory_adobe_affected.py index ee754886..89030035 100644 --- a/test/blocking/test_advisory_adobe_affected.py +++ b/test/blocking/test_advisory_adobe_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adobe_cve.py b/test/blocking/test_advisory_adobe_cve.py index b0205549..b9c69c0c 100644 --- a/test/blocking/test_advisory_adobe_cve.py +++ b/test/blocking/test_advisory_adobe_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adobe_solution.py b/test/blocking/test_advisory_adobe_solution.py index 15bb7edd..45285f1f 100644 --- a/test/blocking/test_advisory_adobe_solution.py +++ b/test/blocking/test_advisory_adobe_solution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adp.py b/test/blocking/test_advisory_adp.py index 8ae2ff00..8a1d3dae 100644 --- a/test/blocking/test_advisory_adp.py +++ b/test/blocking/test_advisory_adp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_adp_container.py b/test/blocking/test_advisory_adp_container.py index 2bc34a6b..342436cf 100644 --- a/test/blocking/test_advisory_adp_container.py +++ b/test/blocking/test_advisory_adp_container.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_advantech.py b/test/blocking/test_advisory_advantech.py index a738da30..87476ff5 100644 --- a/test/blocking/test_advisory_advantech.py +++ b/test/blocking/test_advisory_advantech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_advisory.py b/test/blocking/test_advisory_advisory.py index ef184d68..a7249451 100644 --- a/test/blocking/test_advisory_advisory.py +++ b/test/blocking/test_advisory_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_advisory_details.py b/test/blocking/test_advisory_advisory_details.py index 68f5a34c..b755df93 100644 --- a/test/blocking/test_advisory_advisory_details.py +++ b/test/blocking/test_advisory_advisory_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,11 +44,9 @@ def make_instance(self, include_optional) -> AdvisoryAdvisoryDetails: href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = None, severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ) + updated = None ) else: return AdvisoryAdvisoryDetails( diff --git a/test/blocking/test_advisory_advisory_record.py b/test/blocking/test_advisory_advisory_record.py index 36ed6906..541d5aa2 100644 --- a/test/blocking/test_advisory_advisory_record.py +++ b/test/blocking/test_advisory_advisory_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected.py b/test/blocking/test_advisory_affected.py index 2a038053..acf523d4 100644 --- a/test/blocking/test_advisory_affected.py +++ b/test/blocking/test_advisory_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_chrome.py b/test/blocking/test_advisory_affected_chrome.py index 2232a83c..957bf67f 100644 --- a/test/blocking/test_advisory_affected_chrome.py +++ b/test/blocking/test_advisory_affected_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_debian_package.py b/test/blocking/test_advisory_affected_debian_package.py index 9b41cbac..879dfccb 100644 --- a/test/blocking/test_advisory_affected_debian_package.py +++ b/test/blocking/test_advisory_affected_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_debian_release.py b/test/blocking/test_advisory_affected_debian_release.py index 50821a5c..3ce22cd8 100644 --- a/test/blocking/test_advisory_affected_debian_release.py +++ b/test/blocking/test_advisory_affected_debian_release.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_debian_repository.py b/test/blocking/test_advisory_affected_debian_repository.py index 5faa6e1a..942dc534 100644 --- a/test/blocking/test_advisory_affected_debian_repository.py +++ b/test/blocking/test_advisory_affected_debian_repository.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_file.py b/test/blocking/test_advisory_affected_file.py index 4a4cb1af..3b37c20c 100644 --- a/test/blocking/test_advisory_affected_file.py +++ b/test/blocking/test_advisory_affected_file.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_product.py b/test/blocking/test_advisory_affected_product.py index dcd613d0..208ed900 100644 --- a/test/blocking/test_advisory_affected_product.py +++ b/test/blocking/test_advisory_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_rel.py b/test/blocking/test_advisory_affected_rel.py index 6bc53147..9d2c7584 100644 --- a/test/blocking/test_advisory_affected_rel.py +++ b/test/blocking/test_advisory_affected_rel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_affected_ubuntu_package.py b/test/blocking/test_advisory_affected_ubuntu_package.py index 3d013163..bff31081 100644 --- a/test/blocking/test_advisory_affected_ubuntu_package.py +++ b/test/blocking/test_advisory_affected_ubuntu_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aix.py b/test/blocking/test_advisory_aix.py index 8b48365b..93b56499 100644 --- a/test/blocking/test_advisory_aix.py +++ b/test/blocking/test_advisory_aix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aleph_research.py b/test/blocking/test_advisory_aleph_research.py index 3b6e503d..727e4782 100644 --- a/test/blocking/test_advisory_aleph_research.py +++ b/test/blocking/test_advisory_aleph_research.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alibaba.py b/test/blocking/test_advisory_alibaba.py index 48acc297..c9b74792 100644 --- a/test/blocking/test_advisory_alibaba.py +++ b/test/blocking/test_advisory_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_date.py b/test/blocking/test_advisory_alma_date.py index ca04d4e5..ce16161f 100644 --- a/test/blocking/test_advisory_alma_date.py +++ b/test/blocking/test_advisory_alma_date.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_linux_update.py b/test/blocking/test_advisory_alma_linux_update.py index 43f11763..573bfc7e 100644 --- a/test/blocking/test_advisory_alma_linux_update.py +++ b/test/blocking/test_advisory_alma_linux_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_object_id.py b/test/blocking/test_advisory_alma_object_id.py index b05083c9..b9699ce1 100644 --- a/test/blocking/test_advisory_alma_object_id.py +++ b/test/blocking/test_advisory_alma_object_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_package.py b/test/blocking/test_advisory_alma_package.py index 36b1bc0f..cd0d659f 100644 --- a/test/blocking/test_advisory_alma_package.py +++ b/test/blocking/test_advisory_alma_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_package_list.py b/test/blocking/test_advisory_alma_package_list.py index 851167e3..817a249c 100644 --- a/test/blocking/test_advisory_alma_package_list.py +++ b/test/blocking/test_advisory_alma_package_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alma_reference.py b/test/blocking/test_advisory_alma_reference.py index 70582785..9d24f709 100644 --- a/test/blocking/test_advisory_alma_reference.py +++ b/test/blocking/test_advisory_alma_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alpine_linux_sec_db.py b/test/blocking/test_advisory_alpine_linux_sec_db.py index 217a6a1f..023f214d 100644 --- a/test/blocking/test_advisory_alpine_linux_sec_db.py +++ b/test/blocking/test_advisory_alpine_linux_sec_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alpine_linux_sec_db_package.py b/test/blocking/test_advisory_alpine_linux_sec_db_package.py index e969fd69..83f06a52 100644 --- a/test/blocking/test_advisory_alpine_linux_sec_db_package.py +++ b/test/blocking/test_advisory_alpine_linux_sec_db_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_alpine_linux_security_fix.py b/test/blocking/test_advisory_alpine_linux_security_fix.py index 0b4aafe1..1f259daa 100644 --- a/test/blocking/test_advisory_alpine_linux_security_fix.py +++ b/test/blocking/test_advisory_alpine_linux_security_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_amazon_affected_package.py b/test/blocking/test_advisory_amazon_affected_package.py index 50421e11..fc8b8561 100644 --- a/test/blocking/test_advisory_amazon_affected_package.py +++ b/test/blocking/test_advisory_amazon_affected_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_amazon_cve.py b/test/blocking/test_advisory_amazon_cve.py index 86780149..a914ae14 100644 --- a/test/blocking/test_advisory_amazon_cve.py +++ b/test/blocking/test_advisory_amazon_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_amd.py b/test/blocking/test_advisory_amd.py index 73218971..84bfecc2 100644 --- a/test/blocking/test_advisory_amd.py +++ b/test/blocking/test_advisory_amd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ami.py b/test/blocking/test_advisory_ami.py index b1d65d55..c28f8b97 100644 --- a/test/blocking/test_advisory_ami.py +++ b/test/blocking/test_advisory_ami.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_anchore_nvd_override.py b/test/blocking/test_advisory_anchore_nvd_override.py index 8021a895..547c0f3e 100644 --- a/test/blocking/test_advisory_anchore_nvd_override.py +++ b/test/blocking/test_advisory_anchore_nvd_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_advisory.py b/test/blocking/test_advisory_android_advisory.py index c6dbdd52..14b8bc26 100644 --- a/test/blocking/test_advisory_android_advisory.py +++ b/test/blocking/test_advisory_android_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_affected.py b/test/blocking/test_advisory_android_affected.py index 87a2a7fc..6bfa0230 100644 --- a/test/blocking/test_advisory_android_affected.py +++ b/test/blocking/test_advisory_android_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_event.py b/test/blocking/test_advisory_android_event.py index 3bee1a1a..dd5ac4d5 100644 --- a/test/blocking/test_advisory_android_event.py +++ b/test/blocking/test_advisory_android_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_package.py b/test/blocking/test_advisory_android_package.py index cd31e8e9..42c53082 100644 --- a/test/blocking/test_advisory_android_package.py +++ b/test/blocking/test_advisory_android_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_range.py b/test/blocking/test_advisory_android_range.py index 733d6f4c..dba8cf77 100644 --- a/test/blocking/test_advisory_android_range.py +++ b/test/blocking/test_advisory_android_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_android_reference.py b/test/blocking/test_advisory_android_reference.py index 63898933..ff0fa516 100644 --- a/test/blocking/test_advisory_android_reference.py +++ b/test/blocking/test_advisory_android_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_active_mq.py b/test/blocking/test_advisory_apache_active_mq.py index 8f2c6741..4167397b 100644 --- a/test/blocking/test_advisory_apache_active_mq.py +++ b/test/blocking/test_advisory_apache_active_mq.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_archiva.py b/test/blocking/test_advisory_apache_archiva.py index df9561e5..c72733c2 100644 --- a/test/blocking/test_advisory_apache_archiva.py +++ b/test/blocking/test_advisory_apache_archiva.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_arrow.py b/test/blocking/test_advisory_apache_arrow.py index f123e8cd..f27bca03 100644 --- a/test/blocking/test_advisory_apache_arrow.py +++ b/test/blocking/test_advisory_apache_arrow.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_camel.py b/test/blocking/test_advisory_apache_camel.py index b33dade5..193d9ad1 100644 --- a/test/blocking/test_advisory_apache_camel.py +++ b/test/blocking/test_advisory_apache_camel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_commons.py b/test/blocking/test_advisory_apache_commons.py index 83d8f628..4183e757 100644 --- a/test/blocking/test_advisory_apache_commons.py +++ b/test/blocking/test_advisory_apache_commons.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_couch_db.py b/test/blocking/test_advisory_apache_couch_db.py index 4f59cfa6..7bfb192b 100644 --- a/test/blocking/test_advisory_apache_couch_db.py +++ b/test/blocking/test_advisory_apache_couch_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_flink.py b/test/blocking/test_advisory_apache_flink.py index 4ed9c88a..a33dfa51 100644 --- a/test/blocking/test_advisory_apache_flink.py +++ b/test/blocking/test_advisory_apache_flink.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_guacamole.py b/test/blocking/test_advisory_apache_guacamole.py index 72c54f1c..6abd3402 100644 --- a/test/blocking/test_advisory_apache_guacamole.py +++ b/test/blocking/test_advisory_apache_guacamole.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_hadoop.py b/test/blocking/test_advisory_apache_hadoop.py index 157e2265..7ae982cd 100644 --- a/test/blocking/test_advisory_apache_hadoop.py +++ b/test/blocking/test_advisory_apache_hadoop.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_http.py b/test/blocking/test_advisory_apache_http.py index 325b8398..ee6f24ae 100644 --- a/test/blocking/test_advisory_apache_http.py +++ b/test/blocking/test_advisory_apache_http.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_jsp_wiki.py b/test/blocking/test_advisory_apache_jsp_wiki.py index 4ecb431d..a9821abd 100644 --- a/test/blocking/test_advisory_apache_jsp_wiki.py +++ b/test/blocking/test_advisory_apache_jsp_wiki.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_kafka.py b/test/blocking/test_advisory_apache_kafka.py index 36ed1eef..b9614a5f 100644 --- a/test/blocking/test_advisory_apache_kafka.py +++ b/test/blocking/test_advisory_apache_kafka.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_logging_services.py b/test/blocking/test_advisory_apache_logging_services.py index 425f622a..1ebac464 100644 --- a/test/blocking/test_advisory_apache_logging_services.py +++ b/test/blocking/test_advisory_apache_logging_services.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_ni_fi.py b/test/blocking/test_advisory_apache_ni_fi.py index 23fb3790..9ec131eb 100644 --- a/test/blocking/test_advisory_apache_ni_fi.py +++ b/test/blocking/test_advisory_apache_ni_fi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_of_biz.py b/test/blocking/test_advisory_apache_of_biz.py index 2917ad92..7a054506 100644 --- a/test/blocking/test_advisory_apache_of_biz.py +++ b/test/blocking/test_advisory_apache_of_biz.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_open_meetings.py b/test/blocking/test_advisory_apache_open_meetings.py index 263b6a7f..7f0fb415 100644 --- a/test/blocking/test_advisory_apache_open_meetings.py +++ b/test/blocking/test_advisory_apache_open_meetings.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_open_office.py b/test/blocking/test_advisory_apache_open_office.py index 6f09e80e..1dc4feb7 100644 --- a/test/blocking/test_advisory_apache_open_office.py +++ b/test/blocking/test_advisory_apache_open_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_pulsar.py b/test/blocking/test_advisory_apache_pulsar.py index a7e8f618..8db4a8e0 100644 --- a/test/blocking/test_advisory_apache_pulsar.py +++ b/test/blocking/test_advisory_apache_pulsar.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_shiro.py b/test/blocking/test_advisory_apache_shiro.py index 4cd74324..fead0e1c 100644 --- a/test/blocking/test_advisory_apache_shiro.py +++ b/test/blocking/test_advisory_apache_shiro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_spark.py b/test/blocking/test_advisory_apache_spark.py index 288e3ecd..ee099bbd 100644 --- a/test/blocking/test_advisory_apache_spark.py +++ b/test/blocking/test_advisory_apache_spark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_struts.py b/test/blocking/test_advisory_apache_struts.py index 14a93289..c417807d 100644 --- a/test/blocking/test_advisory_apache_struts.py +++ b/test/blocking/test_advisory_apache_struts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_subversion.py b/test/blocking/test_advisory_apache_subversion.py index 0fb430c6..0691e323 100644 --- a/test/blocking/test_advisory_apache_subversion.py +++ b/test/blocking/test_advisory_apache_subversion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_superset.py b/test/blocking/test_advisory_apache_superset.py index ea06cf02..ca7c27a4 100644 --- a/test/blocking/test_advisory_apache_superset.py +++ b/test/blocking/test_advisory_apache_superset.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_tomcat.py b/test/blocking/test_advisory_apache_tomcat.py index b9870a45..65e01400 100644 --- a/test/blocking/test_advisory_apache_tomcat.py +++ b/test/blocking/test_advisory_apache_tomcat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apache_zoo_keeper.py b/test/blocking/test_advisory_apache_zoo_keeper.py index 3b97402e..be83741c 100644 --- a/test/blocking/test_advisory_apache_zoo_keeper.py +++ b/test/blocking/test_advisory_apache_zoo_keeper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_api.py b/test/blocking/test_advisory_api.py new file mode 100644 index 00000000..81bba7d4 --- /dev/null +++ b/test/blocking/test_advisory_api.py @@ -0,0 +1,46 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.api.advisory_api import AdvisoryApi + + +class TestAdvisoryApi(unittest.TestCase): + """AdvisoryApi unit test stubs""" + + def setUp(self) -> None: + self.api = AdvisoryApi() + + def tearDown(self) -> None: + pass + + def test_advisory_get(self) -> None: + """Test case for advisory_get + + Query advisories + """ + pass + + def test_advisory_list_get(self) -> None: + """Test case for advisory_list_get + + List advisory feeds + """ + pass + + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_advisory_app_check.py b/test/blocking/test_advisory_app_check.py index 18ca8137..a728f432 100644 --- a/test/blocking/test_advisory_app_check.py +++ b/test/blocking/test_advisory_app_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_appgate.py b/test/blocking/test_advisory_appgate.py index 85b21af3..30eb2b15 100644 --- a/test/blocking/test_advisory_appgate.py +++ b/test/blocking/test_advisory_appgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apple_advisory.py b/test/blocking/test_advisory_apple_advisory.py index 303dfee4..574d1dea 100644 --- a/test/blocking/test_advisory_apple_advisory.py +++ b/test/blocking/test_advisory_apple_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_apple_component.py b/test/blocking/test_advisory_apple_component.py index 42471c8b..2e657c16 100644 --- a/test/blocking/test_advisory_apple_component.py +++ b/test/blocking/test_advisory_apple_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_arch_issue.py b/test/blocking/test_advisory_arch_issue.py index 58e38d0c..6c9de61d 100644 --- a/test/blocking/test_advisory_arch_issue.py +++ b/test/blocking/test_advisory_arch_issue.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_arista.py b/test/blocking/test_advisory_arista.py index a55c0bd5..b69a6f7c 100644 --- a/test/blocking/test_advisory_arista.py +++ b/test/blocking/test_advisory_arista.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aruba.py b/test/blocking/test_advisory_aruba.py index a27fb354..88ed2be5 100644 --- a/test/blocking/test_advisory_aruba.py +++ b/test/blocking/test_advisory_aruba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_asrg.py b/test/blocking/test_advisory_asrg.py index c42b0ae7..a68883cc 100644 --- a/test/blocking/test_advisory_asrg.py +++ b/test/blocking/test_advisory_asrg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_asset_note.py b/test/blocking/test_advisory_asset_note.py index ea157aa7..923df224 100644 --- a/test/blocking/test_advisory_asset_note.py +++ b/test/blocking/test_advisory_asset_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_asterisk.py b/test/blocking/test_advisory_asterisk.py index 874c3eeb..8949202a 100644 --- a/test/blocking/test_advisory_asterisk.py +++ b/test/blocking/test_advisory_asterisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_astra.py b/test/blocking/test_advisory_astra.py index 9d32326c..aaa63140 100644 --- a/test/blocking/test_advisory_astra.py +++ b/test/blocking/test_advisory_astra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_asus.py b/test/blocking/test_advisory_asus.py index 38418b5a..d381b52b 100644 --- a/test/blocking/test_advisory_asus.py +++ b/test/blocking/test_advisory_asus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_atlassian_advisory.py b/test/blocking/test_advisory_atlassian_advisory.py index 513187a7..fb46b60e 100644 --- a/test/blocking/test_advisory_atlassian_advisory.py +++ b/test/blocking/test_advisory_atlassian_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_atlassian_products.py b/test/blocking/test_advisory_atlassian_products.py index bd81df91..03391888 100644 --- a/test/blocking/test_advisory_atlassian_products.py +++ b/test/blocking/test_advisory_atlassian_products.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_atlassian_vuln.py b/test/blocking/test_advisory_atlassian_vuln.py index 4acaeb62..f25894a9 100644 --- a/test/blocking/test_advisory_atlassian_vuln.py +++ b/test/blocking/test_advisory_atlassian_vuln.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_atredis.py b/test/blocking/test_advisory_atredis.py index 700c1be6..13aafd95 100644 --- a/test/blocking/test_advisory_atredis.py +++ b/test/blocking/test_advisory_atredis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_audiocodes.py b/test/blocking/test_advisory_audiocodes.py index a9fca5c0..87f38b5e 100644 --- a/test/blocking/test_advisory_audiocodes.py +++ b/test/blocking/test_advisory_audiocodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aus_cert.py b/test/blocking/test_advisory_aus_cert.py index d68b9ffe..c10de81a 100644 --- a/test/blocking/test_advisory_aus_cert.py +++ b/test/blocking/test_advisory_aus_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_autodesk.py b/test/blocking/test_advisory_autodesk.py index ac4011ac..fddecb5c 100644 --- a/test/blocking/test_advisory_autodesk.py +++ b/test/blocking/test_advisory_autodesk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_avaya.py b/test/blocking/test_advisory_avaya.py index 6fa7b3be..9ed54c65 100644 --- a/test/blocking/test_advisory_avaya.py +++ b/test/blocking/test_advisory_avaya.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aveva_advisory.py b/test/blocking/test_advisory_aveva_advisory.py index 8e5c6fdc..7940477b 100644 --- a/test/blocking/test_advisory_aveva_advisory.py +++ b/test/blocking/test_advisory_aveva_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_avidml_advs.py b/test/blocking/test_advisory_avidml_advs.py index 91d6a4b8..1b175f8d 100644 --- a/test/blocking/test_advisory_avidml_advs.py +++ b/test/blocking/test_advisory_avidml_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_avigilon.py b/test/blocking/test_advisory_avigilon.py index 43f43ecf..6b6d9d9f 100644 --- a/test/blocking/test_advisory_avigilon.py +++ b/test/blocking/test_advisory_avigilon.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_award.py b/test/blocking/test_advisory_award.py index 76d69c94..9678d0b1 100644 --- a/test/blocking/test_advisory_award.py +++ b/test/blocking/test_advisory_award.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_aws.py b/test/blocking/test_advisory_aws.py index ba6751f4..187d0161 100644 --- a/test/blocking/test_advisory_aws.py +++ b/test/blocking/test_advisory_aws.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_axis.py b/test/blocking/test_advisory_axis.py index 7cdce628..e6a31d19 100644 --- a/test/blocking/test_advisory_axis.py +++ b/test/blocking/test_advisory_axis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_azul.py b/test/blocking/test_advisory_azul.py index 61fdd5be..56fedf2a 100644 --- a/test/blocking/test_advisory_azul.py +++ b/test/blocking/test_advisory_azul.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_b_braun_advisory.py b/test/blocking/test_advisory_b_braun_advisory.py index 946bd0e0..03c4987c 100644 --- a/test/blocking/test_advisory_b_braun_advisory.py +++ b/test/blocking/test_advisory_b_braun_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bandr.py b/test/blocking/test_advisory_bandr.py index 5b75a66f..99826b78 100644 --- a/test/blocking/test_advisory_bandr.py +++ b/test/blocking/test_advisory_bandr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_baxter_advisory.py b/test/blocking/test_advisory_baxter_advisory.py index 4a367292..ac8badf4 100644 --- a/test/blocking/test_advisory_baxter_advisory.py +++ b/test/blocking/test_advisory_baxter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_advisory.py b/test/blocking/test_advisory_bdu_advisory.py index 10201370..6568ebb7 100644 --- a/test/blocking/test_advisory_bdu_advisory.py +++ b/test/blocking/test_advisory_bdu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_cvss.py b/test/blocking/test_advisory_bdu_cvss.py index 9ce1ec8f..bae1a7f5 100644 --- a/test/blocking/test_advisory_bdu_cvss.py +++ b/test/blocking/test_advisory_bdu_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_cvss3.py b/test/blocking/test_advisory_bdu_cvss3.py index 6d728491..1d05a289 100644 --- a/test/blocking/test_advisory_bdu_cvss3.py +++ b/test/blocking/test_advisory_bdu_cvss3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_environment.py b/test/blocking/test_advisory_bdu_environment.py index 6e74a9ef..a2490be8 100644 --- a/test/blocking/test_advisory_bdu_environment.py +++ b/test/blocking/test_advisory_bdu_environment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_soft.py b/test/blocking/test_advisory_bdu_soft.py index b8cead70..20202f2e 100644 --- a/test/blocking/test_advisory_bdu_soft.py +++ b/test/blocking/test_advisory_bdu_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_types.py b/test/blocking/test_advisory_bdu_types.py index 20f9a6dc..37f9d25c 100644 --- a/test/blocking/test_advisory_bdu_types.py +++ b/test/blocking/test_advisory_bdu_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_vector.py b/test/blocking/test_advisory_bdu_vector.py index e5c4f0dd..27515bd2 100644 --- a/test/blocking/test_advisory_bdu_vector.py +++ b/test/blocking/test_advisory_bdu_vector.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bdu_vulnerable_software.py b/test/blocking/test_advisory_bdu_vulnerable_software.py index 4093c3ff..79292f0d 100644 --- a/test/blocking/test_advisory_bdu_vulnerable_software.py +++ b/test/blocking/test_advisory_bdu_vulnerable_software.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bduos.py b/test/blocking/test_advisory_bduos.py index 847409c0..1b70ee40 100644 --- a/test/blocking/test_advisory_bduos.py +++ b/test/blocking/test_advisory_bduos.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_beckhoff_advisory.py b/test/blocking/test_advisory_beckhoff_advisory.py index 99b50022..e9e48f8a 100644 --- a/test/blocking/test_advisory_beckhoff_advisory.py +++ b/test/blocking/test_advisory_beckhoff_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_beckman_coulter.py b/test/blocking/test_advisory_beckman_coulter.py index a3d74cd8..a8319dbf 100644 --- a/test/blocking/test_advisory_beckman_coulter.py +++ b/test/blocking/test_advisory_beckman_coulter.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_becton_dickinson_advisory.py b/test/blocking/test_advisory_becton_dickinson_advisory.py index fc17925f..a71a7dca 100644 --- a/test/blocking/test_advisory_becton_dickinson_advisory.py +++ b/test/blocking/test_advisory_becton_dickinson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_belden_advisory.py b/test/blocking/test_advisory_belden_advisory.py index b583a210..28604738 100644 --- a/test/blocking/test_advisory_belden_advisory.py +++ b/test/blocking/test_advisory_belden_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_beyond_trust.py b/test/blocking/test_advisory_beyond_trust.py index 045f4e08..b6583e66 100644 --- a/test/blocking/test_advisory_beyond_trust.py +++ b/test/blocking/test_advisory_beyond_trust.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_binarly.py b/test/blocking/test_advisory_binarly.py index 94962b5b..0ab3ea32 100644 --- a/test/blocking/test_advisory_binarly.py +++ b/test/blocking/test_advisory_binarly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bit_defender.py b/test/blocking/test_advisory_bit_defender.py index 633e0d6f..4fdfb01f 100644 --- a/test/blocking/test_advisory_bit_defender.py +++ b/test/blocking/test_advisory_bit_defender.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_black_berry.py b/test/blocking/test_advisory_black_berry.py index a17e2303..798e7ccc 100644 --- a/test/blocking/test_advisory_black_berry.py +++ b/test/blocking/test_advisory_black_berry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bls.py b/test/blocking/test_advisory_bls.py index da92c08d..0f7343dd 100644 --- a/test/blocking/test_advisory_bls.py +++ b/test/blocking/test_advisory_bls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bosch_advisory.py b/test/blocking/test_advisory_bosch_advisory.py index 5365f4c6..5b50270d 100644 --- a/test/blocking/test_advisory_bosch_advisory.py +++ b/test/blocking/test_advisory_bosch_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_boston_scientific_advisory.py b/test/blocking/test_advisory_boston_scientific_advisory.py index ef84e161..b9a224a3 100644 --- a/test/blocking/test_advisory_boston_scientific_advisory.py +++ b/test/blocking/test_advisory_boston_scientific_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_botnet.py b/test/blocking/test_advisory_botnet.py index 4f1eec3c..bdac4824 100644 --- a/test/blocking/test_advisory_botnet.py +++ b/test/blocking/test_advisory_botnet.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_bugzilla.py b/test/blocking/test_advisory_bugzilla.py index 91803b7b..e2ded8c2 100644 --- a/test/blocking/test_advisory_bugzilla.py +++ b/test/blocking/test_advisory_bugzilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ca_cyber_centre_advisory.py b/test/blocking/test_advisory_ca_cyber_centre_advisory.py index c4f91604..414af30b 100644 --- a/test/blocking/test_advisory_ca_cyber_centre_advisory.py +++ b/test/blocking/test_advisory_ca_cyber_centre_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_canvas_exploit.py b/test/blocking/test_advisory_canvas_exploit.py index 149e8c6f..8e5b1782 100644 --- a/test/blocking/test_advisory_canvas_exploit.py +++ b/test/blocking/test_advisory_canvas_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_capec.py b/test/blocking/test_advisory_capec.py index 993df19d..66615b6b 100644 --- a/test/blocking/test_advisory_capec.py +++ b/test/blocking/test_advisory_capec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_carestream_advisory.py b/test/blocking/test_advisory_carestream_advisory.py index 0d0ec4a6..3294d972 100644 --- a/test/blocking/test_advisory_carestream_advisory.py +++ b/test/blocking/test_advisory_carestream_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_carrier.py b/test/blocking/test_advisory_carrier.py index ae897676..24ba6840 100644 --- a/test/blocking/test_advisory_carrier.py +++ b/test/blocking/test_advisory_carrier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cbl_mariner.py b/test/blocking/test_advisory_cbl_mariner.py index 8922038e..2e85fcba 100644 --- a/test/blocking/test_advisory_cbl_mariner.py +++ b/test/blocking/test_advisory_cbl_mariner.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_centos_package.py b/test/blocking/test_advisory_centos_package.py index 5dd8633b..dda85e28 100644 --- a/test/blocking/test_advisory_centos_package.py +++ b/test/blocking/test_advisory_centos_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_be.py b/test/blocking/test_advisory_cert_be.py index 73414679..932c86d4 100644 --- a/test/blocking/test_advisory_cert_be.py +++ b/test/blocking/test_advisory_cert_be.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_fr_advisory.py b/test/blocking/test_advisory_cert_fr_advisory.py index f419814e..3b73b50b 100644 --- a/test/blocking/test_advisory_cert_fr_advisory.py +++ b/test/blocking/test_advisory_cert_fr_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_in.py b/test/blocking/test_advisory_cert_in.py index c41d9461..231460bc 100644 --- a/test/blocking/test_advisory_cert_in.py +++ b/test/blocking/test_advisory_cert_in.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_ir_security_alert.py b/test/blocking/test_advisory_cert_ir_security_alert.py index 82b8aecd..f3592e28 100644 --- a/test/blocking/test_advisory_cert_ir_security_alert.py +++ b/test/blocking/test_advisory_cert_ir_security_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_se.py b/test/blocking/test_advisory_cert_se.py index 7ea234d5..5ab96d2f 100644 --- a/test/blocking/test_advisory_cert_se.py +++ b/test/blocking/test_advisory_cert_se.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cert_ua.py b/test/blocking/test_advisory_cert_ua.py index 55c2e0d4..b3109ce6 100644 --- a/test/blocking/test_advisory_cert_ua.py +++ b/test/blocking/test_advisory_cert_ua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_certeu_advisory.py b/test/blocking/test_advisory_certeu_advisory.py index 0e17aa0c..98aecd75 100644 --- a/test/blocking/test_advisory_certeu_advisory.py +++ b/test/blocking/test_advisory_certeu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cesa.py b/test/blocking/test_advisory_cesa.py index 72f94a62..61b4eb36 100644 --- a/test/blocking/test_advisory_cesa.py +++ b/test/blocking/test_advisory_cesa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_chain_guard.py b/test/blocking/test_advisory_chain_guard.py index 27e92d3c..9930c6c9 100644 --- a/test/blocking/test_advisory_chain_guard.py +++ b/test/blocking/test_advisory_chain_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_chain_guard_package.py b/test/blocking/test_advisory_chain_guard_package.py index e944d208..e1b3c47c 100644 --- a/test/blocking/test_advisory_chain_guard_package.py +++ b/test/blocking/test_advisory_chain_guard_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_chain_guard_sec_fix.py b/test/blocking/test_advisory_chain_guard_sec_fix.py index 931c03ad..bad418b5 100644 --- a/test/blocking/test_advisory_chain_guard_sec_fix.py +++ b/test/blocking/test_advisory_chain_guard_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_check_point.py b/test/blocking/test_advisory_check_point.py index 40da09ad..a2020656 100644 --- a/test/blocking/test_advisory_check_point.py +++ b/test/blocking/test_advisory_check_point.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_chrome.py b/test/blocking/test_advisory_chrome.py index 95d193da..d9840347 100644 --- a/test/blocking/test_advisory_chrome.py +++ b/test/blocking/test_advisory_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ciena.py b/test/blocking/test_advisory_ciena.py index c6b3ac5e..5b0db0d1 100644 --- a/test/blocking/test_advisory_ciena.py +++ b/test/blocking/test_advisory_ciena.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cis_control.py b/test/blocking/test_advisory_cis_control.py index 9ff2b2de..25d0f5e1 100644 --- a/test/blocking/test_advisory_cis_control.py +++ b/test/blocking/test_advisory_cis_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cisa_alert.py b/test/blocking/test_advisory_cisa_alert.py index 143e5e50..b982e1b6 100644 --- a/test/blocking/test_advisory_cisa_alert.py +++ b/test/blocking/test_advisory_cisa_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cisa_csaf_adv.py b/test/blocking/test_advisory_cisa_csaf_adv.py index 3f5ba25d..e33157fd 100644 --- a/test/blocking/test_advisory_cisa_csaf_adv.py +++ b/test/blocking/test_advisory_cisa_csaf_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: if include_optional: return AdvisoryCisaCsafAdv( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_cisco_advisory.py b/test/blocking/test_advisory_cisco_advisory.py index 0b153215..34c0ed87 100644 --- a/test/blocking/test_advisory_cisco_advisory.py +++ b/test/blocking/test_advisory_cisco_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cisco_csaf.py b/test/blocking/test_advisory_cisco_csaf.py index 888eb5dd..22afe53c 100644 --- a/test/blocking/test_advisory_cisco_csaf.py +++ b/test/blocking/test_advisory_cisco_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cisco_known_good_value.py b/test/blocking/test_advisory_cisco_known_good_value.py index 133899eb..d91967a9 100644 --- a/test/blocking/test_advisory_cisco_known_good_value.py +++ b/test/blocking/test_advisory_cisco_known_good_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_citrix_advisory.py b/test/blocking/test_advisory_citrix_advisory.py index 6342d19e..72784337 100644 --- a/test/blocking/test_advisory_citrix_advisory.py +++ b/test/blocking/test_advisory_citrix_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_claroty_vulnerability.py b/test/blocking/test_advisory_claroty_vulnerability.py index d10ba84c..af069962 100644 --- a/test/blocking/test_advisory_claroty_vulnerability.py +++ b/test/blocking/test_advisory_claroty_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cloud_bees.py b/test/blocking/test_advisory_cloud_bees.py index ebfa6065..bdacda12 100644 --- a/test/blocking/test_advisory_cloud_bees.py +++ b/test/blocking/test_advisory_cloud_bees.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cloud_vuln_db_advisory.py b/test/blocking/test_advisory_cloud_vuln_db_advisory.py index 68531244..98bea13d 100644 --- a/test/blocking/test_advisory_cloud_vuln_db_advisory.py +++ b/test/blocking/test_advisory_cloud_vuln_db_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cnnvd_entry_json.py b/test/blocking/test_advisory_cnnvd_entry_json.py index e938d46d..37c0bffc 100644 --- a/test/blocking/test_advisory_cnnvd_entry_json.py +++ b/test/blocking/test_advisory_cnnvd_entry_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cnvd_bulletin.py b/test/blocking/test_advisory_cnvd_bulletin.py index 5b463e51..2b1f0b8a 100644 --- a/test/blocking/test_advisory_cnvd_bulletin.py +++ b/test/blocking/test_advisory_cnvd_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cnvd_flaw.py b/test/blocking/test_advisory_cnvd_flaw.py index 4ab2f5bc..66dc8f24 100644 --- a/test/blocking/test_advisory_cnvd_flaw.py +++ b/test/blocking/test_advisory_cnvd_flaw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_codesys_advisory.py b/test/blocking/test_advisory_codesys_advisory.py index 9f1aedab..e3e3856b 100644 --- a/test/blocking/test_advisory_codesys_advisory.py +++ b/test/blocking/test_advisory_codesys_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault.py b/test/blocking/test_advisory_comm_vault.py index 0cb7ae26..a02517a3 100644 --- a/test/blocking/test_advisory_comm_vault.py +++ b/test/blocking/test_advisory_comm_vault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault_cve_details.py b/test/blocking/test_advisory_comm_vault_cve_details.py index 0bbfa459..27b3feb5 100644 --- a/test/blocking/test_advisory_comm_vault_cve_details.py +++ b/test/blocking/test_advisory_comm_vault_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault_impacted_product.py b/test/blocking/test_advisory_comm_vault_impacted_product.py index 1f127b95..590ea939 100644 --- a/test/blocking/test_advisory_comm_vault_impacted_product.py +++ b/test/blocking/test_advisory_comm_vault_impacted_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault_impacted_product_details.py b/test/blocking/test_advisory_comm_vault_impacted_product_details.py index 27e73e9b..caabe08a 100644 --- a/test/blocking/test_advisory_comm_vault_impacted_product_details.py +++ b/test/blocking/test_advisory_comm_vault_impacted_product_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault_resolution.py b/test/blocking/test_advisory_comm_vault_resolution.py index 50813d63..6416f138 100644 --- a/test/blocking/test_advisory_comm_vault_resolution.py +++ b/test/blocking/test_advisory_comm_vault_resolution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_comm_vault_resolution_details.py b/test/blocking/test_advisory_comm_vault_resolution_details.py index bc24839f..320e433e 100644 --- a/test/blocking/test_advisory_comm_vault_resolution_details.py +++ b/test/blocking/test_advisory_comm_vault_resolution_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_compass_security.py b/test/blocking/test_advisory_compass_security.py index 4d1d0d2f..ed115454 100644 --- a/test/blocking/test_advisory_compass_security.py +++ b/test/blocking/test_advisory_compass_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_container_os.py b/test/blocking/test_advisory_container_os.py index b88b2ca7..25dfa133 100644 --- a/test/blocking/test_advisory_container_os.py +++ b/test/blocking/test_advisory_container_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_core_impact_exploit.py b/test/blocking/test_advisory_core_impact_exploit.py index 3f2e9eab..78981559 100644 --- a/test/blocking/test_advisory_core_impact_exploit.py +++ b/test/blocking/test_advisory_core_impact_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_correction.py b/test/blocking/test_advisory_correction.py index f65631c1..9d886be3 100644 --- a/test/blocking/test_advisory_correction.py +++ b/test/blocking/test_advisory_correction.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cos_update.py b/test/blocking/test_advisory_cos_update.py index 22bdaeec..a004ae42 100644 --- a/test/blocking/test_advisory_cos_update.py +++ b/test/blocking/test_advisory_cos_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cpe_match.py b/test/blocking/test_advisory_cpe_match.py index 00f2b7fa..aebd856b 100644 --- a/test/blocking/test_advisory_cpe_match.py +++ b/test/blocking/test_advisory_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cpe_node.py b/test/blocking/test_advisory_cpe_node.py index f799b935..5a722001 100644 --- a/test/blocking/test_advisory_cpe_node.py +++ b/test/blocking/test_advisory_cpe_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_credit.py b/test/blocking/test_advisory_credit.py index b937b6ab..a65b6e68 100644 --- a/test/blocking/test_advisory_credit.py +++ b/test/blocking/test_advisory_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_crestron.py b/test/blocking/test_advisory_crestron.py index f99d57e7..9bff0f63 100644 --- a/test/blocking/test_advisory_crestron.py +++ b/test/blocking/test_advisory_crestron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_crowd_sec.py b/test/blocking/test_advisory_crowd_sec.py index a377c023..29526667 100644 --- a/test/blocking/test_advisory_crowd_sec.py +++ b/test/blocking/test_advisory_crowd_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_csaf.py b/test/blocking/test_advisory_csaf.py index 80b7ae5b..6df6be90 100644 --- a/test/blocking/test_advisory_csaf.py +++ b/test/blocking/test_advisory_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -88,7 +88,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', diff --git a/test/blocking/test_advisory_csaf_note.py b/test/blocking/test_advisory_csaf_note.py index 2ffe09ba..eceb83fc 100644 --- a/test/blocking/test_advisory_csaf_note.py +++ b/test/blocking/test_advisory_csaf_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_csaf_reference.py b/test/blocking/test_advisory_csaf_reference.py index b63d4c1b..8c8f869c 100644 --- a/test/blocking/test_advisory_csaf_reference.py +++ b/test/blocking/test_advisory_csaf_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_csaf_relationship.py b/test/blocking/test_advisory_csaf_relationship.py index 9a08144f..99252f1f 100644 --- a/test/blocking/test_advisory_csaf_relationship.py +++ b/test/blocking/test_advisory_csaf_relationship.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -40,7 +40,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAFRelationship: full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '' ) diff --git a/test/blocking/test_advisory_csaf_score.py b/test/blocking/test_advisory_csaf_score.py index 0bac159c..4525300a 100644 --- a/test/blocking/test_advisory_csaf_score.py +++ b/test/blocking/test_advisory_csaf_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_csaf_vulnerability.py b/test/blocking/test_advisory_csaf_vulnerability.py index e039bf45..8dbbaf88 100644 --- a/test/blocking/test_advisory_csaf_vulnerability.py +++ b/test/blocking/test_advisory_csaf_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_curl.py b/test/blocking/test_advisory_curl.py index 54ba504d..30d0cbfb 100644 --- a/test/blocking/test_advisory_curl.py +++ b/test/blocking/test_advisory_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_curl_affected.py b/test/blocking/test_advisory_curl_affected.py index 8841c25e..b6393bf4 100644 --- a/test/blocking/test_advisory_curl_affected.py +++ b/test/blocking/test_advisory_curl_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_curl_credit.py b/test/blocking/test_advisory_curl_credit.py index ac45ba96..587f1942 100644 --- a/test/blocking/test_advisory_curl_credit.py +++ b/test/blocking/test_advisory_curl_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_curl_cwe.py b/test/blocking/test_advisory_curl_cwe.py index d8ec32e6..92ff0821 100644 --- a/test/blocking/test_advisory_curl_cwe.py +++ b/test/blocking/test_advisory_curl_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_curl_range.py b/test/blocking/test_advisory_curl_range.py index 0001c6c2..8134fe4e 100644 --- a/test/blocking/test_advisory_curl_range.py +++ b/test/blocking/test_advisory_curl_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cve_detail.py b/test/blocking/test_advisory_cve_detail.py index 47f51e44..8146dd9e 100644 --- a/test/blocking/test_advisory_cve_detail.py +++ b/test/blocking/test_advisory_cve_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cve_details_link.py b/test/blocking/test_advisory_cve_details_link.py index c1cc993d..1e144595 100644 --- a/test/blocking/test_advisory_cve_details_link.py +++ b/test/blocking/test_advisory_cve_details_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cve_reference.py b/test/blocking/test_advisory_cve_reference.py index 1e11fd17..f872f3fd 100644 --- a/test/blocking/test_advisory_cve_reference.py +++ b/test/blocking/test_advisory_cve_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvrf.py b/test/blocking/test_advisory_cvrf.py index f907309d..4a08b7ba 100644 --- a/test/blocking/test_advisory_cvrf.py +++ b/test/blocking/test_advisory_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,72 +38,6 @@ def make_instance(self, include_optional) -> AdvisoryCvrf: return AdvisoryCvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.models.advisory/vulnerability.advisory.Vulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ] ) else: diff --git a/test/blocking/test_advisory_cvrf_reference.py b/test/blocking/test_advisory_cvrf_reference.py deleted file mode 100644 index da69b4a5..00000000 --- a/test/blocking/test_advisory_cvrf_reference.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference - -class TestAdvisoryCVRFReference(unittest.TestCase): - """AdvisoryCVRFReference unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCVRFReference: - """Test AdvisoryCVRFReference - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCVRFReference` - """ - model = AdvisoryCVRFReference() - if include_optional: - return AdvisoryCVRFReference( - description = '', - url = '' - ) - else: - return AdvisoryCVRFReference( - ) - """ - - def testAdvisoryCVRFReference(self): - """Test AdvisoryCVRFReference""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_cvss.py b/test/blocking/test_advisory_cvss.py index 3d59536a..9c2d5977 100644 --- a/test/blocking/test_advisory_cvss.py +++ b/test/blocking/test_advisory_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvsss_v23.py b/test/blocking/test_advisory_cvsss_v23.py index a350df54..4b0d67c2 100644 --- a/test/blocking/test_advisory_cvsss_v23.py +++ b/test/blocking/test_advisory_cvsss_v23.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvssv2.py b/test/blocking/test_advisory_cvssv2.py index 159155ff..747215df 100644 --- a/test/blocking/test_advisory_cvssv2.py +++ b/test/blocking/test_advisory_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvssv3.py b/test/blocking/test_advisory_cvssv3.py index 552e331f..3361f533 100644 --- a/test/blocking/test_advisory_cvssv3.py +++ b/test/blocking/test_advisory_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvssv40.py b/test/blocking/test_advisory_cvssv40.py index e2c50dfa..568005bc 100644 --- a/test/blocking/test_advisory_cvssv40.py +++ b/test/blocking/test_advisory_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cvssv40_threat.py b/test/blocking/test_advisory_cvssv40_threat.py index f40dd7bb..795cb32d 100644 --- a/test/blocking/test_advisory_cvssv40_threat.py +++ b/test/blocking/test_advisory_cvssv40_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cwe.py b/test/blocking/test_advisory_cwe.py index 133fda6c..dfbff018 100644 --- a/test/blocking/test_advisory_cwe.py +++ b/test/blocking/test_advisory_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cwe_acceptance_level.py b/test/blocking/test_advisory_cwe_acceptance_level.py index b7d5ca54..7a51977d 100644 --- a/test/blocking/test_advisory_cwe_acceptance_level.py +++ b/test/blocking/test_advisory_cwe_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cwe_data.py b/test/blocking/test_advisory_cwe_data.py index aac9d1b4..5e893e33 100644 --- a/test/blocking/test_advisory_cwe_data.py +++ b/test/blocking/test_advisory_cwe_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_cwes.py b/test/blocking/test_advisory_cwes.py index e4950011..51086aaf 100644 --- a/test/blocking/test_advisory_cwes.py +++ b/test/blocking/test_advisory_cwes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,13 +37,8 @@ def make_instance(self, include_optional) -> AdvisoryCwes: if include_optional: return AdvisoryCwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56 + vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode() + ] ) else: return AdvisoryCwes( diff --git a/test/blocking/test_advisory_cycle.py b/test/blocking/test_advisory_cycle.py index 049bb300..f9588af4 100644 --- a/test/blocking/test_advisory_cycle.py +++ b/test/blocking/test_advisory_cycle.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_d_link.py b/test/blocking/test_advisory_d_link.py index b3848478..2526db69 100644 --- a/test/blocking/test_advisory_d_link.py +++ b/test/blocking/test_advisory_d_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dahua.py b/test/blocking/test_advisory_dahua.py index 889a9a13..1239cd89 100644 --- a/test/blocking/test_advisory_dahua.py +++ b/test/blocking/test_advisory_dahua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dan_foss_cve_details.py b/test/blocking/test_advisory_dan_foss_cve_details.py index 3e405841..6cf7051f 100644 --- a/test/blocking/test_advisory_dan_foss_cve_details.py +++ b/test/blocking/test_advisory_dan_foss_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_danfoss.py b/test/blocking/test_advisory_danfoss.py index b3535291..a9d97adf 100644 --- a/test/blocking/test_advisory_danfoss.py +++ b/test/blocking/test_advisory_danfoss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dassault.py b/test/blocking/test_advisory_dassault.py index be8f5cac..00f37bb8 100644 --- a/test/blocking/test_advisory_dassault.py +++ b/test/blocking/test_advisory_dassault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_date_time.py b/test/blocking/test_advisory_date_time.py deleted file mode 100644 index dc96a24b..00000000 --- a/test/blocking/test_advisory_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime - -class TestAdvisoryDateTime(unittest.TestCase): - """AdvisoryDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDateTime: - """Test AdvisoryDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDateTime` - """ - model = AdvisoryDateTime() - if include_optional: - return AdvisoryDateTime( - var_date = '' - ) - else: - return AdvisoryDateTime( - ) - """ - - def testAdvisoryDateTime(self): - """Test AdvisoryDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_db_specific.py b/test/blocking/test_advisory_db_specific.py index 7ccc129e..e65b6280 100644 --- a/test/blocking/test_advisory_db_specific.py +++ b/test/blocking/test_advisory_db_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_debian_cve.py b/test/blocking/test_advisory_debian_cve.py index ed62e51c..2d11a782 100644 --- a/test/blocking/test_advisory_debian_cve.py +++ b/test/blocking/test_advisory_debian_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_debian_security_advisory.py b/test/blocking/test_advisory_debian_security_advisory.py index ec4bdf61..f6bf0abc 100644 --- a/test/blocking/test_advisory_debian_security_advisory.py +++ b/test/blocking/test_advisory_debian_security_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dell.py b/test/blocking/test_advisory_dell.py index 254b9d3d..e91833ea 100644 --- a/test/blocking/test_advisory_dell.py +++ b/test/blocking/test_advisory_dell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dell_cve.py b/test/blocking/test_advisory_dell_cve.py index 5d940b95..31cac229 100644 --- a/test/blocking/test_advisory_dell_cve.py +++ b/test/blocking/test_advisory_dell_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_delta_advisory.py b/test/blocking/test_advisory_delta_advisory.py index d5f17994..0dfa6d60 100644 --- a/test/blocking/test_advisory_delta_advisory.py +++ b/test/blocking/test_advisory_delta_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dfn_cert.py b/test/blocking/test_advisory_dfn_cert.py index 7acdc3c5..c10acc1d 100644 --- a/test/blocking/test_advisory_dfn_cert.py +++ b/test/blocking/test_advisory_dfn_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_distro_package.py b/test/blocking/test_advisory_distro_package.py index ef1288f2..6d5a64b4 100644 --- a/test/blocking/test_advisory_distro_package.py +++ b/test/blocking/test_advisory_distro_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_distro_version.py b/test/blocking/test_advisory_distro_version.py index 3dd54142..4029d8ae 100644 --- a/test/blocking/test_advisory_distro_version.py +++ b/test/blocking/test_advisory_distro_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_django.py b/test/blocking/test_advisory_django.py index e9207391..221a7eb7 100644 --- a/test/blocking/test_advisory_django.py +++ b/test/blocking/test_advisory_django.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dnn.py b/test/blocking/test_advisory_dnn.py index 2534137f..02432eb3 100644 --- a/test/blocking/test_advisory_dnn.py +++ b/test/blocking/test_advisory_dnn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_document_metadata.py b/test/blocking/test_advisory_document_metadata.py index 13894c5a..695a5e1a 100644 --- a/test/blocking/test_advisory_document_metadata.py +++ b/test/blocking/test_advisory_document_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_document_note.py b/test/blocking/test_advisory_document_note.py deleted file mode 100644 index 50648bbc..00000000 --- a/test/blocking/test_advisory_document_note.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote - -class TestAdvisoryDocumentNote(unittest.TestCase): - """AdvisoryDocumentNote unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentNote: - """Test AdvisoryDocumentNote - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentNote` - """ - model = AdvisoryDocumentNote() - if include_optional: - return AdvisoryDocumentNote( - text = '', - title = '', - type = '' - ) - else: - return AdvisoryDocumentNote( - ) - """ - - def testAdvisoryDocumentNote(self): - """Test AdvisoryDocumentNote""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_document_publisher.py b/test/blocking/test_advisory_document_publisher.py index 1070183a..33c22f51 100644 --- a/test/blocking/test_advisory_document_publisher.py +++ b/test/blocking/test_advisory_document_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_document_tracking.py b/test/blocking/test_advisory_document_tracking.py deleted file mode 100644 index 9c8e37d2..00000000 --- a/test/blocking/test_advisory_document_tracking.py +++ /dev/null @@ -1,62 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking - -class TestAdvisoryDocumentTracking(unittest.TestCase): - """AdvisoryDocumentTracking unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentTracking: - """Test AdvisoryDocumentTracking - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentTracking` - """ - model = AdvisoryDocumentTracking() - if include_optional: - return AdvisoryDocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '' - ) - else: - return AdvisoryDocumentTracking( - ) - """ - - def testAdvisoryDocumentTracking(self): - """Test AdvisoryDocumentTracking""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_dot_cms.py b/test/blocking/test_advisory_dot_cms.py index 897c39b5..4c11b6ab 100644 --- a/test/blocking/test_advisory_dot_cms.py +++ b/test/blocking/test_advisory_dot_cms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_dragos_advisory.py b/test/blocking/test_advisory_dragos_advisory.py index 1c9a0bc1..3aa76128 100644 --- a/test/blocking/test_advisory_dragos_advisory.py +++ b/test/blocking/test_advisory_dragos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_draytek.py b/test/blocking/test_advisory_draytek.py index 0eefb504..0ea237a6 100644 --- a/test/blocking/test_advisory_draytek.py +++ b/test/blocking/test_advisory_draytek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_drupal.py b/test/blocking/test_advisory_drupal.py index 5108c322..b57506dc 100644 --- a/test/blocking/test_advisory_drupal.py +++ b/test/blocking/test_advisory_drupal.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_eaton_advisory.py b/test/blocking/test_advisory_eaton_advisory.py index 8015b1e8..a895e621 100644 --- a/test/blocking/test_advisory_eaton_advisory.py +++ b/test/blocking/test_advisory_eaton_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_eco_system.py b/test/blocking/test_advisory_eco_system.py index 9db47735..539a8ce5 100644 --- a/test/blocking/test_advisory_eco_system.py +++ b/test/blocking/test_advisory_eco_system.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_elastic.py b/test/blocking/test_advisory_elastic.py index bf119a3a..88755c9a 100644 --- a/test/blocking/test_advisory_elastic.py +++ b/test/blocking/test_advisory_elastic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_elspec.py b/test/blocking/test_advisory_elspec.py index 653a2609..80c4461d 100644 --- a/test/blocking/test_advisory_elspec.py +++ b/test/blocking/test_advisory_elspec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_emerging_threats_snort.py b/test/blocking/test_advisory_emerging_threats_snort.py index 8734b2fd..4db922fb 100644 --- a/test/blocking/test_advisory_emerging_threats_snort.py +++ b/test/blocking/test_advisory_emerging_threats_snort.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_emerson_advisory.py b/test/blocking/test_advisory_emerson_advisory.py index af594cd4..858dd8cb 100644 --- a/test/blocking/test_advisory_emerson_advisory.py +++ b/test/blocking/test_advisory_emerson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_end_of_life.py b/test/blocking/test_advisory_end_of_life.py index 70ebac69..e3e89b6c 100644 --- a/test/blocking/test_advisory_end_of_life.py +++ b/test/blocking/test_advisory_end_of_life.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,16 +43,16 @@ def make_instance(self, include_optional) -> AdvisoryEndOfLife: vulncheck_sdk.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.models.discontinued.discontinued(), - eol = vulncheck_sdk.models.eol.eol(), - extended_support = vulncheck_sdk.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/blocking/test_advisory_endress.py b/test/blocking/test_advisory_endress.py index e4763a04..b165e5b0 100644 --- a/test/blocking/test_advisory_endress.py +++ b/test/blocking/test_advisory_endress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_enisa_id_product.py b/test/blocking/test_advisory_enisa_id_product.py index 0261bed0..23c0d8b8 100644 --- a/test/blocking/test_advisory_enisa_id_product.py +++ b/test/blocking/test_advisory_enisa_id_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_enisa_id_vendor.py b/test/blocking/test_advisory_enisa_id_vendor.py index 0f9c6356..fdc85a36 100644 --- a/test/blocking/test_advisory_enisa_id_vendor.py +++ b/test/blocking/test_advisory_enisa_id_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_eol_alibaba.py b/test/blocking/test_advisory_eol_alibaba.py index d4ad141c..d669e5e5 100644 --- a/test/blocking/test_advisory_eol_alibaba.py +++ b/test/blocking/test_advisory_eol_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_eol_microsoft.py b/test/blocking/test_advisory_eol_microsoft.py index 28a32d03..cda39aeb 100644 --- a/test/blocking/test_advisory_eol_microsoft.py +++ b/test/blocking/test_advisory_eol_microsoft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_eol_release_data.py b/test/blocking/test_advisory_eol_release_data.py index cc0f23a6..aa56f078 100644 --- a/test/blocking/test_advisory_eol_release_data.py +++ b/test/blocking/test_advisory_eol_release_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_euvd.py b/test/blocking/test_advisory_euvd.py index 3cd64b63..a072521d 100644 --- a/test/blocking/test_advisory_euvd.py +++ b/test/blocking/test_advisory_euvd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_event.py b/test/blocking/test_advisory_event.py index 4f5dc3a4..94d0b60c 100644 --- a/test/blocking/test_advisory_event.py +++ b/test/blocking/test_advisory_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_exodus_intel.py b/test/blocking/test_advisory_exodus_intel.py index 60127f17..9ac19c00 100644 --- a/test/blocking/test_advisory_exodus_intel.py +++ b/test/blocking/test_advisory_exodus_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_exploit_db_exploitv2.py b/test/blocking/test_advisory_exploit_db_exploitv2.py index a815e510..03835a84 100644 --- a/test/blocking/test_advisory_exploit_db_exploitv2.py +++ b/test/blocking/test_advisory_exploit_db_exploitv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_external_references.py b/test/blocking/test_advisory_external_references.py index 063402e9..408595ec 100644 --- a/test/blocking/test_advisory_external_references.py +++ b/test/blocking/test_advisory_external_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_f5.py b/test/blocking/test_advisory_f5.py index 426ef6dd..3bb7313f 100644 --- a/test/blocking/test_advisory_f5.py +++ b/test/blocking/test_advisory_f5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_f_secure.py b/test/blocking/test_advisory_f_secure.py index 02d9afea..d9b79e72 100644 --- a/test/blocking/test_advisory_f_secure.py +++ b/test/blocking/test_advisory_f_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fanuc.py b/test/blocking/test_advisory_fanuc.py index 0bd908bb..2cb46411 100644 --- a/test/blocking/test_advisory_fanuc.py +++ b/test/blocking/test_advisory_fanuc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fastly.py b/test/blocking/test_advisory_fastly.py index cb701cc8..fe75454d 100644 --- a/test/blocking/test_advisory_fastly.py +++ b/test/blocking/test_advisory_fastly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_festo.py b/test/blocking/test_advisory_festo.py index 9cdc62d8..fc7ca94f 100644 --- a/test/blocking/test_advisory_festo.py +++ b/test/blocking/test_advisory_festo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_file_cloud.py b/test/blocking/test_advisory_file_cloud.py index 9832d943..81dc8539 100644 --- a/test/blocking/test_advisory_file_cloud.py +++ b/test/blocking/test_advisory_file_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_file_zilla.py b/test/blocking/test_advisory_file_zilla.py index 2565043f..bbec3ab8 100644 --- a/test/blocking/test_advisory_file_zilla.py +++ b/test/blocking/test_advisory_file_zilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fix_aff.py b/test/blocking/test_advisory_fix_aff.py index 7d9dffc0..1c0cdddf 100644 --- a/test/blocking/test_advisory_fix_aff.py +++ b/test/blocking/test_advisory_fix_aff.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_flag.py b/test/blocking/test_advisory_flag.py index 9538419a..dd8e8a2a 100644 --- a/test/blocking/test_advisory_flag.py +++ b/test/blocking/test_advisory_flag.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_flatt_security.py b/test/blocking/test_advisory_flatt_security.py index 2e98fdee..1c092316 100644 --- a/test/blocking/test_advisory_flatt_security.py +++ b/test/blocking/test_advisory_flatt_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_forge_rock.py b/test/blocking/test_advisory_forge_rock.py index 08140a84..8f1099ed 100644 --- a/test/blocking/test_advisory_forge_rock.py +++ b/test/blocking/test_advisory_forge_rock.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fortinet_advisory.py b/test/blocking/test_advisory_fortinet_advisory.py index ee46b25d..bad4fe7a 100644 --- a/test/blocking/test_advisory_fortinet_advisory.py +++ b/test/blocking/test_advisory_fortinet_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fortinet_ips.py b/test/blocking/test_advisory_fortinet_ips.py index a24e0d4f..f5c3c78b 100644 --- a/test/blocking/test_advisory_fortinet_ips.py +++ b/test/blocking/test_advisory_fortinet_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_foxit.py b/test/blocking/test_advisory_foxit.py index c9beb195..fb5729f1 100644 --- a/test/blocking/test_advisory_foxit.py +++ b/test/blocking/test_advisory_foxit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_foxit_affected.py b/test/blocking/test_advisory_foxit_affected.py index c1b66c31..7ddc63b0 100644 --- a/test/blocking/test_advisory_foxit_affected.py +++ b/test/blocking/test_advisory_foxit_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_fresenius.py b/test/blocking/test_advisory_fresenius.py index 6d83a125..d839d972 100644 --- a/test/blocking/test_advisory_fresenius.py +++ b/test/blocking/test_advisory_fresenius.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gallagher.py b/test/blocking/test_advisory_gallagher.py index 3fd6fee5..f7a544dc 100644 --- a/test/blocking/test_advisory_gallagher.py +++ b/test/blocking/test_advisory_gallagher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gcp.py b/test/blocking/test_advisory_gcp.py index 9055e3b1..8ed8f358 100644 --- a/test/blocking/test_advisory_gcp.py +++ b/test/blocking/test_advisory_gcp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ge_gas.py b/test/blocking/test_advisory_ge_gas.py index 00467b9e..7a84d69b 100644 --- a/test/blocking/test_advisory_ge_gas.py +++ b/test/blocking/test_advisory_ge_gas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ge_healthcare_advisory.py b/test/blocking/test_advisory_ge_healthcare_advisory.py index 55f1258d..be9fb558 100644 --- a/test/blocking/test_advisory_ge_healthcare_advisory.py +++ b/test/blocking/test_advisory_ge_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gen.py b/test/blocking/test_advisory_gen.py index d99c9af0..bfca0539 100644 --- a/test/blocking/test_advisory_gen.py +++ b/test/blocking/test_advisory_gen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_genetec.py b/test/blocking/test_advisory_genetec.py index 31336655..6d68a932 100644 --- a/test/blocking/test_advisory_genetec.py +++ b/test/blocking/test_advisory_genetec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_advisory_json_lean.py b/test/blocking/test_advisory_gh_advisory_json_lean.py index 5f1ffe7e..f6b8b5ec 100644 --- a/test/blocking/test_advisory_gh_advisory_json_lean.py +++ b/test/blocking/test_advisory_gh_advisory_json_lean.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -45,13 +45,8 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vector_string = '', ), cwes = vulncheck_sdk.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/blocking/test_advisory_gh_cvss.py b/test/blocking/test_advisory_gh_cvss.py index 96997405..48c8aa46 100644 --- a/test/blocking/test_advisory_gh_cvss.py +++ b/test/blocking/test_advisory_gh_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_identifier.py b/test/blocking/test_advisory_gh_identifier.py index 7b248557..228d8391 100644 --- a/test/blocking/test_advisory_gh_identifier.py +++ b/test/blocking/test_advisory_gh_identifier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_node.py b/test/blocking/test_advisory_gh_node.py index 18c66835..4eb1a2e6 100644 --- a/test/blocking/test_advisory_gh_node.py +++ b/test/blocking/test_advisory_gh_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_package.py b/test/blocking/test_advisory_gh_package.py index bc85bf56..1c3c7431 100644 --- a/test/blocking/test_advisory_gh_package.py +++ b/test/blocking/test_advisory_gh_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_reference.py b/test/blocking/test_advisory_gh_reference.py index f8756ff6..fcb25dbd 100644 --- a/test/blocking/test_advisory_gh_reference.py +++ b/test/blocking/test_advisory_gh_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gh_vulnerabilities.py b/test/blocking/test_advisory_gh_vulnerabilities.py index 3d325fd4..aaec254d 100644 --- a/test/blocking/test_advisory_gh_vulnerabilities.py +++ b/test/blocking/test_advisory_gh_vulnerabilities.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa.py b/test/blocking/test_advisory_ghsa.py index c1d28d69..aa7a19f4 100644 --- a/test/blocking/test_advisory_ghsa.py +++ b/test/blocking/test_advisory_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_affected.py b/test/blocking/test_advisory_ghsa_affected.py index cbb17b3f..2376a80f 100644 --- a/test/blocking/test_advisory_ghsa_affected.py +++ b/test/blocking/test_advisory_ghsa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_database_specific.py b/test/blocking/test_advisory_ghsa_database_specific.py index 8bb66beb..e907e8a2 100644 --- a/test/blocking/test_advisory_ghsa_database_specific.py +++ b/test/blocking/test_advisory_ghsa_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_eco_system_specific.py b/test/blocking/test_advisory_ghsa_eco_system_specific.py index 4414e52f..636a918a 100644 --- a/test/blocking/test_advisory_ghsa_eco_system_specific.py +++ b/test/blocking/test_advisory_ghsa_eco_system_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_event.py b/test/blocking/test_advisory_ghsa_event.py index 7f7122be..f3bf59c8 100644 --- a/test/blocking/test_advisory_ghsa_event.py +++ b/test/blocking/test_advisory_ghsa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_package.py b/test/blocking/test_advisory_ghsa_package.py index 18242ab6..ea827b52 100644 --- a/test/blocking/test_advisory_ghsa_package.py +++ b/test/blocking/test_advisory_ghsa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_range.py b/test/blocking/test_advisory_ghsa_range.py index fed5e031..3a797b09 100644 --- a/test/blocking/test_advisory_ghsa_range.py +++ b/test/blocking/test_advisory_ghsa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_reference.py b/test/blocking/test_advisory_ghsa_reference.py index 19882763..63708b23 100644 --- a/test/blocking/test_advisory_ghsa_reference.py +++ b/test/blocking/test_advisory_ghsa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ghsa_severity.py b/test/blocking/test_advisory_ghsa_severity.py index 85e57303..56a89629 100644 --- a/test/blocking/test_advisory_ghsa_severity.py +++ b/test/blocking/test_advisory_ghsa_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gigabyte.py b/test/blocking/test_advisory_gigabyte.py index 6b614e24..023099af 100644 --- a/test/blocking/test_advisory_gigabyte.py +++ b/test/blocking/test_advisory_gigabyte.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_git_hub_exploit.py b/test/blocking/test_advisory_git_hub_exploit.py index 5f7dbf79..8fd80c2c 100644 --- a/test/blocking/test_advisory_git_hub_exploit.py +++ b/test/blocking/test_advisory_git_hub_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_git_lab_exploit.py b/test/blocking/test_advisory_git_lab_exploit.py index 0fc9ff2a..1fbdb6d4 100644 --- a/test/blocking/test_advisory_git_lab_exploit.py +++ b/test/blocking/test_advisory_git_lab_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gitee_exploit.py b/test/blocking/test_advisory_gitee_exploit.py index e44ca8b7..1acaafce 100644 --- a/test/blocking/test_advisory_gitee_exploit.py +++ b/test/blocking/test_advisory_gitee_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gitlab_advisory.py b/test/blocking/test_advisory_gitlab_advisory.py index 5e90b574..c96f0ef5 100644 --- a/test/blocking/test_advisory_gitlab_advisory.py +++ b/test/blocking/test_advisory_gitlab_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_glibc.py b/test/blocking/test_advisory_glibc.py index 478ffb1f..460d477e 100644 --- a/test/blocking/test_advisory_glibc.py +++ b/test/blocking/test_advisory_glibc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gmo_cyber_security.py b/test/blocking/test_advisory_gmo_cyber_security.py index 33eeff4b..f3510c72 100644 --- a/test/blocking/test_advisory_gmo_cyber_security.py +++ b/test/blocking/test_advisory_gmo_cyber_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_gnu_tls.py b/test/blocking/test_advisory_gnu_tls.py index 3cac5327..f197ba75 100644 --- a/test/blocking/test_advisory_gnu_tls.py +++ b/test/blocking/test_advisory_gnu_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_credits.py b/test/blocking/test_advisory_go_credits.py index fa68a545..3cc54408 100644 --- a/test/blocking/test_advisory_go_credits.py +++ b/test/blocking/test_advisory_go_credits.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_event.py b/test/blocking/test_advisory_go_event.py index d029a73f..5c410e86 100644 --- a/test/blocking/test_advisory_go_event.py +++ b/test/blocking/test_advisory_go_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_affected.py b/test/blocking/test_advisory_go_vuln_affected.py index b368a237..3a39472b 100644 --- a/test/blocking/test_advisory_go_vuln_affected.py +++ b/test/blocking/test_advisory_go_vuln_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_database_specific.py b/test/blocking/test_advisory_go_vuln_database_specific.py index 78616fb7..808e139f 100644 --- a/test/blocking/test_advisory_go_vuln_database_specific.py +++ b/test/blocking/test_advisory_go_vuln_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_ecosystem_specific.py b/test/blocking/test_advisory_go_vuln_ecosystem_specific.py index 1bebe263..f472ffa3 100644 --- a/test/blocking/test_advisory_go_vuln_ecosystem_specific.py +++ b/test/blocking/test_advisory_go_vuln_ecosystem_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_import.py b/test/blocking/test_advisory_go_vuln_import.py index 45500e15..a9d7c724 100644 --- a/test/blocking/test_advisory_go_vuln_import.py +++ b/test/blocking/test_advisory_go_vuln_import.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_json.py b/test/blocking/test_advisory_go_vuln_json.py index 3b816a84..e1b372c4 100644 --- a/test/blocking/test_advisory_go_vuln_json.py +++ b/test/blocking/test_advisory_go_vuln_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_package.py b/test/blocking/test_advisory_go_vuln_package.py index 8f4a87de..3aea12e7 100644 --- a/test/blocking/test_advisory_go_vuln_package.py +++ b/test/blocking/test_advisory_go_vuln_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_ranges.py b/test/blocking/test_advisory_go_vuln_ranges.py index 385bc9ac..b1e34b59 100644 --- a/test/blocking/test_advisory_go_vuln_ranges.py +++ b/test/blocking/test_advisory_go_vuln_ranges.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_go_vuln_reference.py b/test/blocking/test_advisory_go_vuln_reference.py index 4f534d03..01c38a8b 100644 --- a/test/blocking/test_advisory_go_vuln_reference.py +++ b/test/blocking/test_advisory_go_vuln_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_grafana.py b/test/blocking/test_advisory_grafana.py index 46626cdc..a35eb97d 100644 --- a/test/blocking/test_advisory_grafana.py +++ b/test/blocking/test_advisory_grafana.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_grey_noise_detection.py b/test/blocking/test_advisory_grey_noise_detection.py index 5d6de7ba..fae20a86 100644 --- a/test/blocking/test_advisory_grey_noise_detection.py +++ b/test/blocking/test_advisory_grey_noise_detection.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_grey_noise_tags.py b/test/blocking/test_advisory_grey_noise_tags.py index c86283a9..e0fadc7f 100644 --- a/test/blocking/test_advisory_grey_noise_tags.py +++ b/test/blocking/test_advisory_grey_noise_tags.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hacktivity.py b/test/blocking/test_advisory_hacktivity.py index ebf5acac..1a8b5e2e 100644 --- a/test/blocking/test_advisory_hacktivity.py +++ b/test/blocking/test_advisory_hacktivity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hardware_update.py b/test/blocking/test_advisory_hardware_update.py index 6654da4d..88d75d49 100644 --- a/test/blocking/test_advisory_hardware_update.py +++ b/test/blocking/test_advisory_hardware_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_harmony_os.py b/test/blocking/test_advisory_harmony_os.py index bebad685..8c1abff6 100644 --- a/test/blocking/test_advisory_harmony_os.py +++ b/test/blocking/test_advisory_harmony_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hashi_corp.py b/test/blocking/test_advisory_hashi_corp.py index 29b0921d..a620a6b9 100644 --- a/test/blocking/test_advisory_hashi_corp.py +++ b/test/blocking/test_advisory_hashi_corp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_haskell_affected.py b/test/blocking/test_advisory_haskell_affected.py index 5a5917c1..d841de79 100644 --- a/test/blocking/test_advisory_haskell_affected.py +++ b/test/blocking/test_advisory_haskell_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_haskell_sadb_advisory.py b/test/blocking/test_advisory_haskell_sadb_advisory.py index e9ab5743..0de99ef0 100644 --- a/test/blocking/test_advisory_haskell_sadb_advisory.py +++ b/test/blocking/test_advisory_haskell_sadb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_haskell_version.py b/test/blocking/test_advisory_haskell_version.py index ca8485fe..7d68b6ed 100644 --- a/test/blocking/test_advisory_haskell_version.py +++ b/test/blocking/test_advisory_haskell_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hcl.py b/test/blocking/test_advisory_hcl.py index efffaf34..83390430 100644 --- a/test/blocking/test_advisory_hcl.py +++ b/test/blocking/test_advisory_hcl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hik_vision.py b/test/blocking/test_advisory_hik_vision.py index f8eb260c..153b8d30 100644 --- a/test/blocking/test_advisory_hik_vision.py +++ b/test/blocking/test_advisory_hik_vision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hillrom_advisory.py b/test/blocking/test_advisory_hillrom_advisory.py index e7189366..5c7ccb19 100644 --- a/test/blocking/test_advisory_hillrom_advisory.py +++ b/test/blocking/test_advisory_hillrom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hitachi.py b/test/blocking/test_advisory_hitachi.py index 6519dd69..d64daa04 100644 --- a/test/blocking/test_advisory_hitachi.py +++ b/test/blocking/test_advisory_hitachi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hitachi_energy.py b/test/blocking/test_advisory_hitachi_energy.py index 67135e7b..5fdbb47c 100644 --- a/test/blocking/test_advisory_hitachi_energy.py +++ b/test/blocking/test_advisory_hitachi_energy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hk_cert.py b/test/blocking/test_advisory_hk_cert.py index 70a5c0b8..4b29ff35 100644 --- a/test/blocking/test_advisory_hk_cert.py +++ b/test/blocking/test_advisory_hk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hms.py b/test/blocking/test_advisory_hms.py index 46e7e1c1..ba533d1b 100644 --- a/test/blocking/test_advisory_hms.py +++ b/test/blocking/test_advisory_hms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_honeywell.py b/test/blocking/test_advisory_honeywell.py index 33a5d171..5929d418 100644 --- a/test/blocking/test_advisory_honeywell.py +++ b/test/blocking/test_advisory_honeywell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hp.py b/test/blocking/test_advisory_hp.py index c462906c..37221a5b 100644 --- a/test/blocking/test_advisory_hp.py +++ b/test/blocking/test_advisory_hp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_hpe.py b/test/blocking/test_advisory_hpe.py index 147d88ba..d951d764 100644 --- a/test/blocking/test_advisory_hpe.py +++ b/test/blocking/test_advisory_hpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_huawei.py b/test/blocking/test_advisory_huawei.py index 01c45d60..1b5c1bd4 100644 --- a/test/blocking/test_advisory_huawei.py +++ b/test/blocking/test_advisory_huawei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_huawei_euler_os.py b/test/blocking/test_advisory_huawei_euler_os.py index 984dce58..64a988fb 100644 --- a/test/blocking/test_advisory_huawei_euler_os.py +++ b/test/blocking/test_advisory_huawei_euler_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_huawei_ips.py b/test/blocking/test_advisory_huawei_ips.py index cfcde39f..04a7fec7 100644 --- a/test/blocking/test_advisory_huawei_ips.py +++ b/test/blocking/test_advisory_huawei_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_i_val.py b/test/blocking/test_advisory_i_val.py index 71c3d515..b0fd902c 100644 --- a/test/blocking/test_advisory_i_val.py +++ b/test/blocking/test_advisory_i_val.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_iava.py b/test/blocking/test_advisory_iava.py index ea61e346..17497769 100644 --- a/test/blocking/test_advisory_iava.py +++ b/test/blocking/test_advisory_iava.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ibm.py b/test/blocking/test_advisory_ibm.py index 92cf5d2a..13020092 100644 --- a/test/blocking/test_advisory_ibm.py +++ b/test/blocking/test_advisory_ibm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_idemia.py b/test/blocking/test_advisory_idemia.py index b7586327..273357fe 100644 --- a/test/blocking/test_advisory_idemia.py +++ b/test/blocking/test_advisory_idemia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_igel.py b/test/blocking/test_advisory_igel.py index ec1025ab..efa7fb05 100644 --- a/test/blocking/test_advisory_igel.py +++ b/test/blocking/test_advisory_igel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_impact.py b/test/blocking/test_advisory_impact.py index 8bdbe9f3..29e0ad4c 100644 --- a/test/blocking/test_advisory_impact.py +++ b/test/blocking/test_advisory_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_incibe_advisory.py b/test/blocking/test_advisory_incibe_advisory.py index b9bb3ee0..b8aee4a4 100644 --- a/test/blocking/test_advisory_incibe_advisory.py +++ b/test/blocking/test_advisory_incibe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_intel.py b/test/blocking/test_advisory_intel.py index 914756d5..24047117 100644 --- a/test/blocking/test_advisory_intel.py +++ b/test/blocking/test_advisory_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ip_intel_record.py b/test/blocking/test_advisory_ip_intel_record.py index 6485f0f7..0b6f7e42 100644 --- a/test/blocking/test_advisory_ip_intel_record.py +++ b/test/blocking/test_advisory_ip_intel_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_israeli_alert.py b/test/blocking/test_advisory_israeli_alert.py index cebe23c4..132d3ae2 100644 --- a/test/blocking/test_advisory_israeli_alert.py +++ b/test/blocking/test_advisory_israeli_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_israeli_vulnerability.py b/test/blocking/test_advisory_israeli_vulnerability.py index 486d871d..1d10467f 100644 --- a/test/blocking/test_advisory_israeli_vulnerability.py +++ b/test/blocking/test_advisory_israeli_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_issued.py b/test/blocking/test_advisory_issued.py deleted file mode 100644 index 84bed2bf..00000000 --- a/test/blocking/test_advisory_issued.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued - -class TestAdvisoryIssued(unittest.TestCase): - """AdvisoryIssued unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryIssued: - """Test AdvisoryIssued - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryIssued` - """ - model = AdvisoryIssued() - if include_optional: - return AdvisoryIssued( - var_date = '' - ) - else: - return AdvisoryIssued( - ) - """ - - def testAdvisoryIssued(self): - """Test AdvisoryIssued""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_istio.py b/test/blocking/test_advisory_istio.py index ce3d2923..50e21eed 100644 --- a/test/blocking/test_advisory_istio.py +++ b/test/blocking/test_advisory_istio.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_itw.py b/test/blocking/test_advisory_itw.py index 41c442d4..c779c26d 100644 --- a/test/blocking/test_advisory_itw.py +++ b/test/blocking/test_advisory_itw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_itw_exploit.py b/test/blocking/test_advisory_itw_exploit.py index 7c076987..2263f317 100644 --- a/test/blocking/test_advisory_itw_exploit.py +++ b/test/blocking/test_advisory_itw_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ivanti.py b/test/blocking/test_advisory_ivanti.py index 0430353c..ef73a98d 100644 --- a/test/blocking/test_advisory_ivanti.py +++ b/test/blocking/test_advisory_ivanti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ivanti_rss.py b/test/blocking/test_advisory_ivanti_rss.py index e3d8b7fe..ddbdc664 100644 --- a/test/blocking/test_advisory_ivanti_rss.py +++ b/test/blocking/test_advisory_ivanti_rss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_j_frog.py b/test/blocking/test_advisory_j_frog.py index 7bcc741f..61b99949 100644 --- a/test/blocking/test_advisory_j_frog.py +++ b/test/blocking/test_advisory_j_frog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jenkins.py b/test/blocking/test_advisory_jenkins.py index 486674a1..19967a79 100644 --- a/test/blocking/test_advisory_jenkins.py +++ b/test/blocking/test_advisory_jenkins.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jet_brains.py b/test/blocking/test_advisory_jet_brains.py index 17fff329..e5c675d0 100644 --- a/test/blocking/test_advisory_jet_brains.py +++ b/test/blocking/test_advisory_jet_brains.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jnj_advisory.py b/test/blocking/test_advisory_jnj_advisory.py index 20ed1734..a316d5b4 100644 --- a/test/blocking/test_advisory_jnj_advisory.py +++ b/test/blocking/test_advisory_jnj_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_johnson_controls.py b/test/blocking/test_advisory_johnson_controls.py index 81884c97..5728a37e 100644 --- a/test/blocking/test_advisory_johnson_controls.py +++ b/test/blocking/test_advisory_johnson_controls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_juniper.py b/test/blocking/test_advisory_juniper.py index cb226f58..1b8f0d77 100644 --- a/test/blocking/test_advisory_juniper.py +++ b/test/blocking/test_advisory_juniper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jvn.py b/test/blocking/test_advisory_jvn.py index ff59d7a7..1e475a75 100644 --- a/test/blocking/test_advisory_jvn.py +++ b/test/blocking/test_advisory_jvn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jvn_advisory_item.py b/test/blocking/test_advisory_jvn_advisory_item.py index 0f2a3ef6..1375d62e 100644 --- a/test/blocking/test_advisory_jvn_advisory_item.py +++ b/test/blocking/test_advisory_jvn_advisory_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jvn_reference.py b/test/blocking/test_advisory_jvn_reference.py index 42b6c499..14b8bbb5 100644 --- a/test/blocking/test_advisory_jvn_reference.py +++ b/test/blocking/test_advisory_jvn_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_jvncpe.py b/test/blocking/test_advisory_jvncpe.py index 57edb800..ae8e5578 100644 --- a/test/blocking/test_advisory_jvncpe.py +++ b/test/blocking/test_advisory_jvncpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_k8_s.py b/test/blocking/test_advisory_k8_s.py index de4122aa..935ae856 100644 --- a/test/blocking/test_advisory_k8_s.py +++ b/test/blocking/test_advisory_k8_s.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kaspersky_icscert_advisory.py b/test/blocking/test_advisory_kaspersky_icscert_advisory.py index 13fe2344..3fb6a5ee 100644 --- a/test/blocking/test_advisory_kaspersky_icscert_advisory.py +++ b/test/blocking/test_advisory_kaspersky_icscert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kb.py b/test/blocking/test_advisory_kb.py index 4b15e019..acdff2df 100644 --- a/test/blocking/test_advisory_kb.py +++ b/test/blocking/test_advisory_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kb_threat_description.py b/test/blocking/test_advisory_kb_threat_description.py index c28fe91b..a0f05d5a 100644 --- a/test/blocking/test_advisory_kb_threat_description.py +++ b/test/blocking/test_advisory_kb_threat_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kev_catalog_vulnerability.py b/test/blocking/test_advisory_kev_catalog_vulnerability.py index 6bc675a9..de20828d 100644 --- a/test/blocking/test_advisory_kev_catalog_vulnerability.py +++ b/test/blocking/test_advisory_kev_catalog_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kore_logic.py b/test/blocking/test_advisory_kore_logic.py index 84050748..bb9a1005 100644 --- a/test/blocking/test_advisory_kore_logic.py +++ b/test/blocking/test_advisory_kore_logic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kr_cert_advisory.py b/test/blocking/test_advisory_kr_cert_advisory.py index 198b8f11..b6148727 100644 --- a/test/blocking/test_advisory_kr_cert_advisory.py +++ b/test/blocking/test_advisory_kr_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_kunbus.py b/test/blocking/test_advisory_kunbus.py index 3b2c6cd3..299adbd5 100644 --- a/test/blocking/test_advisory_kunbus.py +++ b/test/blocking/test_advisory_kunbus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_lantronix.py b/test/blocking/test_advisory_lantronix.py index 0e208058..54bfa318 100644 --- a/test/blocking/test_advisory_lantronix.py +++ b/test/blocking/test_advisory_lantronix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_lenovo.py b/test/blocking/test_advisory_lenovo.py index 48305d43..bd89dd9c 100644 --- a/test/blocking/test_advisory_lenovo.py +++ b/test/blocking/test_advisory_lenovo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_lexmark_advisory.py b/test/blocking/test_advisory_lexmark_advisory.py index 4a20acd6..6293122a 100644 --- a/test/blocking/test_advisory_lexmark_advisory.py +++ b/test/blocking/test_advisory_lexmark_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_lg.py b/test/blocking/test_advisory_lg.py index b06b0778..92308849 100644 --- a/test/blocking/test_advisory_lg.py +++ b/test/blocking/test_advisory_lg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_libre_office.py b/test/blocking/test_advisory_libre_office.py index 5fc44d69..c4a190b9 100644 --- a/test/blocking/test_advisory_libre_office.py +++ b/test/blocking/test_advisory_libre_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_linux.py b/test/blocking/test_advisory_linux.py index 66292e33..7a49f83f 100644 --- a/test/blocking/test_advisory_linux.py +++ b/test/blocking/test_advisory_linux.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_log_source.py b/test/blocking/test_advisory_log_source.py index e0f271e0..e3e38f36 100644 --- a/test/blocking/test_advisory_log_source.py +++ b/test/blocking/test_advisory_log_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_lol_advs.py b/test/blocking/test_advisory_lol_advs.py index a12d9d8a..dfcdd6cc 100644 --- a/test/blocking/test_advisory_lol_advs.py +++ b/test/blocking/test_advisory_lol_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryLolAdvs: description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/blocking/test_advisory_m_affected.py b/test/blocking/test_advisory_m_affected.py index 45598852..c19d8575 100644 --- a/test/blocking/test_advisory_m_affected.py +++ b/test/blocking/test_advisory_m_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_branch.py b/test/blocking/test_advisory_m_branch.py index f1d110a9..bfcab36f 100644 --- a/test/blocking/test_advisory_m_branch.py +++ b/test/blocking/test_advisory_m_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_cna.py b/test/blocking/test_advisory_m_cna.py index 5988f127..aa04dae8 100644 --- a/test/blocking/test_advisory_m_cna.py +++ b/test/blocking/test_advisory_m_cna.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_containers.py b/test/blocking/test_advisory_m_containers.py index 237dd7d5..573c3978 100644 --- a/test/blocking/test_advisory_m_containers.py +++ b/test/blocking/test_advisory_m_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -145,7 +145,10 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', diff --git a/test/blocking/test_advisory_m_cve_metadata.py b/test/blocking/test_advisory_m_cve_metadata.py index bf8dc3f2..8e370079 100644 --- a/test/blocking/test_advisory_m_cve_metadata.py +++ b/test/blocking/test_advisory_m_cve_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_cvss_v20.py b/test/blocking/test_advisory_m_cvss_v20.py index bd7da43f..077bab36 100644 --- a/test/blocking/test_advisory_m_cvss_v20.py +++ b/test/blocking/test_advisory_m_cvss_v20.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_cvss_v30.py b/test/blocking/test_advisory_m_cvss_v30.py index bbd1a17e..26e68317 100644 --- a/test/blocking/test_advisory_m_cvss_v30.py +++ b/test/blocking/test_advisory_m_cvss_v30.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_cvss_v31.py b/test/blocking/test_advisory_m_cvss_v31.py index df682b32..582539f5 100644 --- a/test/blocking/test_advisory_m_cvss_v31.py +++ b/test/blocking/test_advisory_m_cvss_v31.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_cvss_v40.py b/test/blocking/test_advisory_m_cvss_v40.py index d32272bd..1502ae3d 100644 --- a/test/blocking/test_advisory_m_cvss_v40.py +++ b/test/blocking/test_advisory_m_cvss_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_descriptions.py b/test/blocking/test_advisory_m_descriptions.py index 404a3932..45e23ba9 100644 --- a/test/blocking/test_advisory_m_descriptions.py +++ b/test/blocking/test_advisory_m_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_document_tracking.py b/test/blocking/test_advisory_m_document_tracking.py index 6eeba59d..37a3272a 100644 --- a/test/blocking/test_advisory_m_document_tracking.py +++ b/test/blocking/test_advisory_m_document_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_files.py b/test/blocking/test_advisory_m_files.py index 1ad2ee6f..13232681 100644 --- a/test/blocking/test_advisory_m_files.py +++ b/test/blocking/test_advisory_m_files.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_full_product_name.py b/test/blocking/test_advisory_m_full_product_name.py index a6ab3956..3d017188 100644 --- a/test/blocking/test_advisory_m_full_product_name.py +++ b/test/blocking/test_advisory_m_full_product_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_identification.py b/test/blocking/test_advisory_m_identification.py index 1ff52207..fdfc2b01 100644 --- a/test/blocking/test_advisory_m_identification.py +++ b/test/blocking/test_advisory_m_identification.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_item.py b/test/blocking/test_advisory_m_item.py index 86a8cda1..c1821f2f 100644 --- a/test/blocking/test_advisory_m_item.py +++ b/test/blocking/test_advisory_m_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_nodes.py b/test/blocking/test_advisory_m_nodes.py index 1e3268f0..4e97f71f 100644 --- a/test/blocking/test_advisory_m_nodes.py +++ b/test/blocking/test_advisory_m_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_problem_types.py b/test/blocking/test_advisory_m_problem_types.py index cce931bb..22ac664c 100644 --- a/test/blocking/test_advisory_m_problem_types.py +++ b/test/blocking/test_advisory_m_problem_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_product_status.py b/test/blocking/test_advisory_m_product_status.py index 40f5ca27..2b46218b 100644 --- a/test/blocking/test_advisory_m_product_status.py +++ b/test/blocking/test_advisory_m_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_product_tree.py b/test/blocking/test_advisory_m_product_tree.py index a44e12c7..a2e7711b 100644 --- a/test/blocking/test_advisory_m_product_tree.py +++ b/test/blocking/test_advisory_m_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_provider_metadata.py b/test/blocking/test_advisory_m_provider_metadata.py index 23f45741..c6ed4766 100644 --- a/test/blocking/test_advisory_m_provider_metadata.py +++ b/test/blocking/test_advisory_m_provider_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_reference.py b/test/blocking/test_advisory_m_reference.py index 092f7bac..5f5c655d 100644 --- a/test/blocking/test_advisory_m_reference.py +++ b/test/blocking/test_advisory_m_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_remediation.py b/test/blocking/test_advisory_m_remediation.py index 085eb518..ee35eacb 100644 --- a/test/blocking/test_advisory_m_remediation.py +++ b/test/blocking/test_advisory_m_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_version.py b/test/blocking/test_advisory_m_version.py index ebbd5343..e9599440 100644 --- a/test/blocking/test_advisory_m_version.py +++ b/test/blocking/test_advisory_m_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_m_vulnerability.py b/test/blocking/test_advisory_m_vulnerability.py index 071e9893..7e3ec7cb 100644 --- a/test/blocking/test_advisory_m_vulnerability.py +++ b/test/blocking/test_advisory_m_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ma_cert.py b/test/blocking/test_advisory_ma_cert.py index 618143f4..176cf849 100644 --- a/test/blocking/test_advisory_ma_cert.py +++ b/test/blocking/test_advisory_ma_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_malicious_package.py b/test/blocking/test_advisory_malicious_package.py index fb72b422..ce663fcd 100644 --- a/test/blocking/test_advisory_malicious_package.py +++ b/test/blocking/test_advisory_malicious_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: malware = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/blocking/test_advisory_manage_engine.py b/test/blocking/test_advisory_manage_engine.py index 6cbd3845..89cb0148 100644 --- a/test/blocking/test_advisory_manage_engine.py +++ b/test/blocking/test_advisory_manage_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_manage_engine_advisory.py b/test/blocking/test_advisory_manage_engine_advisory.py index 62677917..0a7069a0 100644 --- a/test/blocking/test_advisory_manage_engine_advisory.py +++ b/test/blocking/test_advisory_manage_engine_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mbed_tls.py b/test/blocking/test_advisory_mbed_tls.py index 466fd72f..0c72d95f 100644 --- a/test/blocking/test_advisory_mbed_tls.py +++ b/test/blocking/test_advisory_mbed_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mc_afee.py b/test/blocking/test_advisory_mc_afee.py index 9f3e1e14..1f498314 100644 --- a/test/blocking/test_advisory_mc_afee.py +++ b/test/blocking/test_advisory_mc_afee.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mc_afee_score.py b/test/blocking/test_advisory_mc_afee_score.py index 8fff8482..937b0142 100644 --- a/test/blocking/test_advisory_mc_afee_score.py +++ b/test/blocking/test_advisory_mc_afee_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mcpe_applicability.py b/test/blocking/test_advisory_mcpe_applicability.py index 156f7aa3..93cd311d 100644 --- a/test/blocking/test_advisory_mcpe_applicability.py +++ b/test/blocking/test_advisory_mcpe_applicability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mcpe_match.py b/test/blocking/test_advisory_mcpe_match.py index 1f61b0a5..28b448e2 100644 --- a/test/blocking/test_advisory_mcpe_match.py +++ b/test/blocking/test_advisory_mcpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_me_product.py b/test/blocking/test_advisory_me_product.py index 0f837f44..fd471d17 100644 --- a/test/blocking/test_advisory_me_product.py +++ b/test/blocking/test_advisory_me_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mediatek.py b/test/blocking/test_advisory_mediatek.py index da638f02..7835c25e 100644 --- a/test/blocking/test_advisory_mediatek.py +++ b/test/blocking/test_advisory_mediatek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_medtronic_advisory.py b/test/blocking/test_advisory_medtronic_advisory.py index fb0bfd52..ed8d1f03 100644 --- a/test/blocking/test_advisory_medtronic_advisory.py +++ b/test/blocking/test_advisory_medtronic_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mendix.py b/test/blocking/test_advisory_mendix.py index 1f56ffc6..b52dffd3 100644 --- a/test/blocking/test_advisory_mendix.py +++ b/test/blocking/test_advisory_mendix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_meta_advisories.py b/test/blocking/test_advisory_meta_advisories.py index f4047306..49cd7bf1 100644 --- a/test/blocking/test_advisory_meta_advisories.py +++ b/test/blocking/test_advisory_meta_advisories.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_meta_data.py b/test/blocking/test_advisory_meta_data.py index d9d23a4d..6a744e71 100644 --- a/test/blocking/test_advisory_meta_data.py +++ b/test/blocking/test_advisory_meta_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -45,11 +45,9 @@ def make_instance(self, include_optional) -> AdvisoryMetaData: href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.models.issued.issued(), severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.models.updated.updated(), ), cve = [ '' ], diff --git a/test/blocking/test_advisory_metasploit_exploit.py b/test/blocking/test_advisory_metasploit_exploit.py index d36b99ed..8ba1ff7f 100644 --- a/test/blocking/test_advisory_metasploit_exploit.py +++ b/test/blocking/test_advisory_metasploit_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_metric.py b/test/blocking/test_advisory_metric.py index e7b01d5c..d3cbcbea 100644 --- a/test/blocking/test_advisory_metric.py +++ b/test/blocking/test_advisory_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_metric_scenario.py b/test/blocking/test_advisory_metric_scenario.py index 2b43e5a8..5c159b89 100644 --- a/test/blocking/test_advisory_metric_scenario.py +++ b/test/blocking/test_advisory_metric_scenario.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_metrics_other.py b/test/blocking/test_advisory_metrics_other.py index 60f0e7a6..a3cc9e0f 100644 --- a/test/blocking/test_advisory_metrics_other.py +++ b/test/blocking/test_advisory_metrics_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_microsoft_csaf.py b/test/blocking/test_advisory_microsoft_csaf.py index f6608c24..7875d0e1 100644 --- a/test/blocking/test_advisory_microsoft_csaf.py +++ b/test/blocking/test_advisory_microsoft_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: if include_optional: return AdvisoryMicrosoftCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_microsoft_cvrf.py b/test/blocking/test_advisory_microsoft_cvrf.py index ea92edd0..a282a52f 100644 --- a/test/blocking/test_advisory_microsoft_cvrf.py +++ b/test/blocking/test_advisory_microsoft_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_microsoft_driver_block_list.py b/test/blocking/test_advisory_microsoft_driver_block_list.py index 03fd7e44..6a3cbad6 100644 --- a/test/blocking/test_advisory_microsoft_driver_block_list.py +++ b/test/blocking/test_advisory_microsoft_driver_block_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_microsoft_file_metadata.py b/test/blocking/test_advisory_microsoft_file_metadata.py index c18da49f..6a2137fd 100644 --- a/test/blocking/test_advisory_microsoft_file_metadata.py +++ b/test/blocking/test_advisory_microsoft_file_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_microsoft_kb.py b/test/blocking/test_advisory_microsoft_kb.py index 5103d8b4..11cd021a 100644 --- a/test/blocking/test_advisory_microsoft_kb.py +++ b/test/blocking/test_advisory_microsoft_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mikrotik.py b/test/blocking/test_advisory_mikrotik.py index f64545b0..56e3e82d 100644 --- a/test/blocking/test_advisory_mikrotik.py +++ b/test/blocking/test_advisory_mikrotik.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mindray.py b/test/blocking/test_advisory_mindray.py index cd7d91b7..ce6343f2 100644 --- a/test/blocking/test_advisory_mindray.py +++ b/test/blocking/test_advisory_mindray.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_misp_meta.py b/test/blocking/test_advisory_misp_meta.py index ae9c8158..2ff1ae7a 100644 --- a/test/blocking/test_advisory_misp_meta.py +++ b/test/blocking/test_advisory_misp_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_misp_related_item.py b/test/blocking/test_advisory_misp_related_item.py index 387ce6eb..159573bd 100644 --- a/test/blocking/test_advisory_misp_related_item.py +++ b/test/blocking/test_advisory_misp_related_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_misp_value.py b/test/blocking/test_advisory_misp_value.py index bf39c76e..5e81fbbc 100644 --- a/test/blocking/test_advisory_misp_value.py +++ b/test/blocking/test_advisory_misp_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_misp_value_no_id.py b/test/blocking/test_advisory_misp_value_no_id.py index 461923b0..dc7082bc 100644 --- a/test/blocking/test_advisory_misp_value_no_id.py +++ b/test/blocking/test_advisory_misp_value_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitel.py b/test/blocking/test_advisory_mitel.py index 95874759..bd0a4901 100644 --- a/test/blocking/test_advisory_mitel.py +++ b/test/blocking/test_advisory_mitel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitre_attack_group_no_id.py b/test/blocking/test_advisory_mitre_attack_group_no_id.py index d15eb120..cb7e2043 100644 --- a/test/blocking/test_advisory_mitre_attack_group_no_id.py +++ b/test/blocking/test_advisory_mitre_attack_group_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitre_attack_ref.py b/test/blocking/test_advisory_mitre_attack_ref.py index c172b304..cafefefd 100644 --- a/test/blocking/test_advisory_mitre_attack_ref.py +++ b/test/blocking/test_advisory_mitre_attack_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitre_attack_tech_with_refs.py b/test/blocking/test_advisory_mitre_attack_tech_with_refs.py index f149b281..36f3c6eb 100644 --- a/test/blocking/test_advisory_mitre_attack_tech_with_refs.py +++ b/test/blocking/test_advisory_mitre_attack_tech_with_refs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitre_attack_technique.py b/test/blocking/test_advisory_mitre_attack_technique.py index 3222b6ca..12c0d8fb 100644 --- a/test/blocking/test_advisory_mitre_attack_technique.py +++ b/test/blocking/test_advisory_mitre_attack_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitre_cve_list_v5.py b/test/blocking/test_advisory_mitre_cve_list_v5.py index 615e740d..3c2c34cd 100644 --- a/test/blocking/test_advisory_mitre_cve_list_v5.py +++ b/test/blocking/test_advisory_mitre_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_mitre_cve_list_v5_ref.py b/test/blocking/test_advisory_mitre_cve_list_v5_ref.py index 12a5d255..db5b0c99 100644 --- a/test/blocking/test_advisory_mitre_cve_list_v5_ref.py +++ b/test/blocking/test_advisory_mitre_cve_list_v5_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -146,7 +146,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -187,10 +190,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_mitre_group_cti.py b/test/blocking/test_advisory_mitre_group_cti.py index bb09fcd0..f2ec8ed5 100644 --- a/test/blocking/test_advisory_mitre_group_cti.py +++ b/test/blocking/test_advisory_mitre_group_cti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mitsubishi_electric_advisory.py b/test/blocking/test_advisory_mitsubishi_electric_advisory.py index 9b11eb13..8cea7fe3 100644 --- a/test/blocking/test_advisory_mitsubishi_electric_advisory.py +++ b/test/blocking/test_advisory_mitsubishi_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mongo_db.py b/test/blocking/test_advisory_mongo_db.py index 97295920..0038917a 100644 --- a/test/blocking/test_advisory_mongo_db.py +++ b/test/blocking/test_advisory_mongo_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_moxa_advisory.py b/test/blocking/test_advisory_moxa_advisory.py index 17de78cb..147d63b4 100644 --- a/test/blocking/test_advisory_moxa_advisory.py +++ b/test/blocking/test_advisory_moxa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mozilla_advisory.py b/test/blocking/test_advisory_mozilla_advisory.py index 03069b9d..4b8ab676 100644 --- a/test/blocking/test_advisory_mozilla_advisory.py +++ b/test/blocking/test_advisory_mozilla_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mozilla_component.py b/test/blocking/test_advisory_mozilla_component.py index ef886b98..20831df8 100644 --- a/test/blocking/test_advisory_mozilla_component.py +++ b/test/blocking/test_advisory_mozilla_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ms_document_title.py b/test/blocking/test_advisory_ms_document_title.py index 103f3d98..a3c39ec9 100644 --- a/test/blocking/test_advisory_ms_document_title.py +++ b/test/blocking/test_advisory_ms_document_title.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_mscvrf.py b/test/blocking/test_advisory_mscvrf.py index 02c42005..f75d47d2 100644 --- a/test/blocking/test_advisory_mscvrf.py +++ b/test/blocking/test_advisory_mscvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_naver.py b/test/blocking/test_advisory_naver.py index d64e8d1a..ebf3e3ae 100644 --- a/test/blocking/test_advisory_naver.py +++ b/test/blocking/test_advisory_naver.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ncsc.py b/test/blocking/test_advisory_ncsc.py index 136142e6..8471551c 100644 --- a/test/blocking/test_advisory_ncsc.py +++ b/test/blocking/test_advisory_ncsc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: if include_optional: return AdvisoryNCSC( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_ncsccve.py b/test/blocking/test_advisory_ncsccve.py index 0dbf4439..0d27dfc3 100644 --- a/test/blocking/test_advisory_ncsccve.py +++ b/test/blocking/test_advisory_ncsccve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: if include_optional: return AdvisoryNCSCCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_nec.py b/test/blocking/test_advisory_nec.py index 2ba30995..e31b2e9a 100644 --- a/test/blocking/test_advisory_nec.py +++ b/test/blocking/test_advisory_nec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nessus.py b/test/blocking/test_advisory_nessus.py index cd016e2e..42fa9d34 100644 --- a/test/blocking/test_advisory_nessus.py +++ b/test/blocking/test_advisory_nessus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_net_app.py b/test/blocking/test_advisory_net_app.py index ffe03c26..d1331d57 100644 --- a/test/blocking/test_advisory_net_app.py +++ b/test/blocking/test_advisory_net_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_netatalk.py b/test/blocking/test_advisory_netatalk.py index b24c0fa2..13ddad78 100644 --- a/test/blocking/test_advisory_netatalk.py +++ b/test/blocking/test_advisory_netatalk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_netgate.py b/test/blocking/test_advisory_netgate.py index f76b8bba..478c9f2a 100644 --- a/test/blocking/test_advisory_netgate.py +++ b/test/blocking/test_advisory_netgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_netgear.py b/test/blocking/test_advisory_netgear.py index 0c3f0cf6..692eb3b1 100644 --- a/test/blocking/test_advisory_netgear.py +++ b/test/blocking/test_advisory_netgear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_netskope.py b/test/blocking/test_advisory_netskope.py index 6400dafd..167882f2 100644 --- a/test/blocking/test_advisory_netskope.py +++ b/test/blocking/test_advisory_netskope.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nexpose.py b/test/blocking/test_advisory_nexpose.py index 79b8b233..29c041c6 100644 --- a/test/blocking/test_advisory_nexpose.py +++ b/test/blocking/test_advisory_nexpose.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nginx_advisory.py b/test/blocking/test_advisory_nginx_advisory.py index 31b104f2..6df7860b 100644 --- a/test/blocking/test_advisory_nginx_advisory.py +++ b/test/blocking/test_advisory_nginx_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nhs.py b/test/blocking/test_advisory_nhs.py index 336cea3c..181ec93b 100644 --- a/test/blocking/test_advisory_nhs.py +++ b/test/blocking/test_advisory_nhs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ni.py b/test/blocking/test_advisory_ni.py index 34802475..388cb018 100644 --- a/test/blocking/test_advisory_ni.py +++ b/test/blocking/test_advisory_ni.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nist_control.py b/test/blocking/test_advisory_nist_control.py index eb92436c..a6ac65be 100644 --- a/test/blocking/test_advisory_nist_control.py +++ b/test/blocking/test_advisory_nist_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_node_author.py b/test/blocking/test_advisory_node_author.py index a9f3dc7f..7abce36b 100644 --- a/test/blocking/test_advisory_node_author.py +++ b/test/blocking/test_advisory_node_author.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_node_js.py b/test/blocking/test_advisory_node_js.py index 6ba45f97..288bf280 100644 --- a/test/blocking/test_advisory_node_js.py +++ b/test/blocking/test_advisory_node_js.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_node_security.py b/test/blocking/test_advisory_node_security.py index fd2cad86..448f0c6c 100644 --- a/test/blocking/test_advisory_node_security.py +++ b/test/blocking/test_advisory_node_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nokia.py b/test/blocking/test_advisory_nokia.py index c89fd4f6..c4eb78eb 100644 --- a/test/blocking/test_advisory_nokia.py +++ b/test/blocking/test_advisory_nokia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_note.py b/test/blocking/test_advisory_note.py index f8169108..705cc0e1 100644 --- a/test/blocking/test_advisory_note.py +++ b/test/blocking/test_advisory_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_note_pad_plus_plus.py b/test/blocking/test_advisory_note_pad_plus_plus.py index c87c0d3e..909dbc96 100644 --- a/test/blocking/test_advisory_note_pad_plus_plus.py +++ b/test/blocking/test_advisory_note_pad_plus_plus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nozomi.py b/test/blocking/test_advisory_nozomi.py index 831d94d4..5afca417 100644 --- a/test/blocking/test_advisory_nozomi.py +++ b/test/blocking/test_advisory_nozomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ntp.py b/test/blocking/test_advisory_ntp.py index 1633410e..34ab1bb9 100644 --- a/test/blocking/test_advisory_ntp.py +++ b/test/blocking/test_advisory_ntp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nuclei.py b/test/blocking/test_advisory_nuclei.py index b73dea87..979cec8e 100644 --- a/test/blocking/test_advisory_nuclei.py +++ b/test/blocking/test_advisory_nuclei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvd20_configuration.py b/test/blocking/test_advisory_nvd20_configuration.py index 0807dff0..eabcdac8 100644 --- a/test/blocking/test_advisory_nvd20_configuration.py +++ b/test/blocking/test_advisory_nvd20_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvd20_cvecpe_match.py b/test/blocking/test_advisory_nvd20_cvecpe_match.py index 6faa01fb..c814c5b6 100644 --- a/test/blocking/test_advisory_nvd20_cvecpe_match.py +++ b/test/blocking/test_advisory_nvd20_cvecpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvd20_node.py b/test/blocking/test_advisory_nvd20_node.py index d57dc1e9..54a794ee 100644 --- a/test/blocking/test_advisory_nvd20_node.py +++ b/test/blocking/test_advisory_nvd20_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvd20_source.py b/test/blocking/test_advisory_nvd20_source.py index c9634a93..7c2d32a6 100644 --- a/test/blocking/test_advisory_nvd20_source.py +++ b/test/blocking/test_advisory_nvd20_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvdcpe_dictionary.py b/test/blocking/test_advisory_nvdcpe_dictionary.py index ba88a808..1db12389 100644 --- a/test/blocking/test_advisory_nvdcpe_dictionary.py +++ b/test/blocking/test_advisory_nvdcpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nvidia_revision.py b/test/blocking/test_advisory_nvidia_revision.py index e9a54dd5..ac2bda6a 100644 --- a/test/blocking/test_advisory_nvidia_revision.py +++ b/test/blocking/test_advisory_nvidia_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_nz_advisory.py b/test/blocking/test_advisory_nz_advisory.py index 9b917e26..b15bbadf 100644 --- a/test/blocking/test_advisory_nz_advisory.py +++ b/test/blocking/test_advisory_nz_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_o_curl.py b/test/blocking/test_advisory_o_curl.py index 03e82978..bf89d501 100644 --- a/test/blocking/test_advisory_o_curl.py +++ b/test/blocking/test_advisory_o_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_octopus_deploy.py b/test/blocking/test_advisory_octopus_deploy.py index 408af9ca..3d984f16 100644 --- a/test/blocking/test_advisory_octopus_deploy.py +++ b/test/blocking/test_advisory_octopus_deploy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_okta.py b/test/blocking/test_advisory_okta.py index 056c65e3..8058866e 100644 --- a/test/blocking/test_advisory_okta.py +++ b/test/blocking/test_advisory_okta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_omron.py b/test/blocking/test_advisory_omron.py index e3498269..eec133ea 100644 --- a/test/blocking/test_advisory_omron.py +++ b/test/blocking/test_advisory_omron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_one_e.py b/test/blocking/test_advisory_one_e.py index b99bb0fe..1d969cc8 100644 --- a/test/blocking/test_advisory_one_e.py +++ b/test/blocking/test_advisory_one_e.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_bsd.py b/test/blocking/test_advisory_open_bsd.py index 701fc504..5ccaaa97 100644 --- a/test/blocking/test_advisory_open_bsd.py +++ b/test/blocking/test_advisory_open_bsd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_cvdb.py b/test/blocking/test_advisory_open_cvdb.py index 5aa99148..34d6f00c 100644 --- a/test/blocking/test_advisory_open_cvdb.py +++ b/test/blocking/test_advisory_open_cvdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_jdk.py b/test/blocking/test_advisory_open_jdk.py index 25b2cdb5..7bfadcbd 100644 --- a/test/blocking/test_advisory_open_jdk.py +++ b/test/blocking/test_advisory_open_jdk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_jdkcve.py b/test/blocking/test_advisory_open_jdkcve.py index 37b935db..693ffa47 100644 --- a/test/blocking/test_advisory_open_jdkcve.py +++ b/test/blocking/test_advisory_open_jdkcve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_ssh.py b/test/blocking/test_advisory_open_ssh.py index 91d52572..bb7337f4 100644 --- a/test/blocking/test_advisory_open_ssh.py +++ b/test/blocking/test_advisory_open_ssh.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_ssl_sec_adv.py b/test/blocking/test_advisory_open_ssl_sec_adv.py index 828c2fa8..c54de33e 100644 --- a/test/blocking/test_advisory_open_ssl_sec_adv.py +++ b/test/blocking/test_advisory_open_ssl_sec_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_ssl_vulnerability.py b/test/blocking/test_advisory_open_ssl_vulnerability.py index b7d7609d..5c8f52ac 100644 --- a/test/blocking/test_advisory_open_ssl_vulnerability.py +++ b/test/blocking/test_advisory_open_ssl_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_open_stack.py b/test/blocking/test_advisory_open_stack.py index df5e499a..0d72a653 100644 --- a/test/blocking/test_advisory_open_stack.py +++ b/test/blocking/test_advisory_open_stack.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_opengear.py b/test/blocking/test_advisory_opengear.py index e5d10992..70f2fc27 100644 --- a/test/blocking/test_advisory_opengear.py +++ b/test/blocking/test_advisory_opengear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_oracle_cpu.py b/test/blocking/test_advisory_oracle_cpu.py index 31904980..85637a22 100644 --- a/test/blocking/test_advisory_oracle_cpu.py +++ b/test/blocking/test_advisory_oracle_cpu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_oracle_cpucsaf.py b/test/blocking/test_advisory_oracle_cpucsaf.py index 003badce..8544c813 100644 --- a/test/blocking/test_advisory_oracle_cpucsaf.py +++ b/test/blocking/test_advisory_oracle_cpucsaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: if include_optional: return AdvisoryOracleCPUCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_original_ghsa.py b/test/blocking/test_advisory_original_ghsa.py index bf62d628..38d0d4c3 100644 --- a/test/blocking/test_advisory_original_ghsa.py +++ b/test/blocking/test_advisory_original_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_osv.py b/test/blocking/test_advisory_osv.py index d2c70114..df7ccc29 100644 --- a/test/blocking/test_advisory_osv.py +++ b/test/blocking/test_advisory_osv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryOSV: osv = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/blocking/test_advisory_osv_obj.py b/test/blocking/test_advisory_osv_obj.py index e6fc0d12..4c61fddd 100644 --- a/test/blocking/test_advisory_osv_obj.py +++ b/test/blocking/test_advisory_osv_obj.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,8 +38,8 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: return AdvisoryOSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/blocking/test_advisory_osv_package.py b/test/blocking/test_advisory_osv_package.py index dce99fc9..99924099 100644 --- a/test/blocking/test_advisory_osv_package.py +++ b/test/blocking/test_advisory_osv_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_osv_reference.py b/test/blocking/test_advisory_osv_reference.py index 3c22ba68..bd9e9349 100644 --- a/test/blocking/test_advisory_osv_reference.py +++ b/test/blocking/test_advisory_osv_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_otrs.py b/test/blocking/test_advisory_otrs.py index 05b626a6..8a80c216 100644 --- a/test/blocking/test_advisory_otrs.py +++ b/test/blocking/test_advisory_otrs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_oval_cve.py b/test/blocking/test_advisory_oval_cve.py index 4aa9665b..2d2991cf 100644 --- a/test/blocking/test_advisory_oval_cve.py +++ b/test/blocking/test_advisory_oval_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_oval_reference.py b/test/blocking/test_advisory_oval_reference.py index 6ae57070..f4c6eb2f 100644 --- a/test/blocking/test_advisory_oval_reference.py +++ b/test/blocking/test_advisory_oval_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_override.py b/test/blocking/test_advisory_override.py index 0b767066..0bacfafc 100644 --- a/test/blocking/test_advisory_override.py +++ b/test/blocking/test_advisory_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_override_annotation.py b/test/blocking/test_advisory_override_annotation.py index d4f0f0ca..8ffd7698 100644 --- a/test/blocking/test_advisory_override_annotation.py +++ b/test/blocking/test_advisory_override_annotation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_override_configuration.py b/test/blocking/test_advisory_override_configuration.py index 88ac7e1c..363bff66 100644 --- a/test/blocking/test_advisory_override_configuration.py +++ b/test/blocking/test_advisory_override_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_override_cve.py b/test/blocking/test_advisory_override_cve.py index 3bb2693c..44979b70 100644 --- a/test/blocking/test_advisory_override_cve.py +++ b/test/blocking/test_advisory_override_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_own_cloud.py b/test/blocking/test_advisory_own_cloud.py index 3607ab03..d7a3fd0e 100644 --- a/test/blocking/test_advisory_own_cloud.py +++ b/test/blocking/test_advisory_own_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_package.py b/test/blocking/test_advisory_package.py index 7502b627..dafec373 100644 --- a/test/blocking/test_advisory_package.py +++ b/test/blocking/test_advisory_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_package_stat.py b/test/blocking/test_advisory_package_stat.py index 36d5c3db..c0207cf8 100644 --- a/test/blocking/test_advisory_package_stat.py +++ b/test/blocking/test_advisory_package_stat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_packetstorm_exploit.py b/test/blocking/test_advisory_packetstorm_exploit.py index 3e3d8953..27f604ab 100644 --- a/test/blocking/test_advisory_packetstorm_exploit.py +++ b/test/blocking/test_advisory_packetstorm_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_palantir.py b/test/blocking/test_advisory_palantir.py index ae455ec7..93615ce9 100644 --- a/test/blocking/test_advisory_palantir.py +++ b/test/blocking/test_advisory_palantir.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_palo_alto_advisory.py b/test/blocking/test_advisory_palo_alto_advisory.py index 7749e461..219e1add 100644 --- a/test/blocking/test_advisory_palo_alto_advisory.py +++ b/test/blocking/test_advisory_palo_alto_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_panasonic.py b/test/blocking/test_advisory_panasonic.py index d8fc3e27..11e2098b 100644 --- a/test/blocking/test_advisory_panasonic.py +++ b/test/blocking/test_advisory_panasonic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_paper_cut.py b/test/blocking/test_advisory_paper_cut.py index b39cde54..ee529fa3 100644 --- a/test/blocking/test_advisory_paper_cut.py +++ b/test/blocking/test_advisory_paper_cut.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_patch.py b/test/blocking/test_advisory_patch.py index 6e2bfa48..5779a8dc 100644 --- a/test/blocking/test_advisory_patch.py +++ b/test/blocking/test_advisory_patch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_pega.py b/test/blocking/test_advisory_pega.py index 6846e67d..3d8a0aaf 100644 --- a/test/blocking/test_advisory_pega.py +++ b/test/blocking/test_advisory_pega.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_pg_fix.py b/test/blocking/test_advisory_pg_fix.py index 15522447..0ccda3eb 100644 --- a/test/blocking/test_advisory_pg_fix.py +++ b/test/blocking/test_advisory_pg_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_philips_advisory.py b/test/blocking/test_advisory_philips_advisory.py index c793f81e..d9862dd8 100644 --- a/test/blocking/test_advisory_philips_advisory.py +++ b/test/blocking/test_advisory_philips_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_phoenix_contact_advisory.py b/test/blocking/test_advisory_phoenix_contact_advisory.py index 446cec16..ecd40f02 100644 --- a/test/blocking/test_advisory_phoenix_contact_advisory.py +++ b/test/blocking/test_advisory_phoenix_contact_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_phpmy_admin.py b/test/blocking/test_advisory_phpmy_admin.py index d9f5e1df..e38d11e8 100644 --- a/test/blocking/test_advisory_phpmy_admin.py +++ b/test/blocking/test_advisory_phpmy_admin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_pk_cert.py b/test/blocking/test_advisory_pk_cert.py index a9aed666..59e568e7 100644 --- a/test/blocking/test_advisory_pk_cert.py +++ b/test/blocking/test_advisory_pk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_postgres_sql.py b/test/blocking/test_advisory_postgres_sql.py index c6cb8fda..200f46a7 100644 --- a/test/blocking/test_advisory_postgres_sql.py +++ b/test/blocking/test_advisory_postgres_sql.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_power_dns.py b/test/blocking/test_advisory_power_dns.py index 4a147ed0..9f17dedb 100644 --- a/test/blocking/test_advisory_power_dns.py +++ b/test/blocking/test_advisory_power_dns.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_prime_version.py b/test/blocking/test_advisory_prime_version.py index 0b409c73..3cbb043e 100644 --- a/test/blocking/test_advisory_prime_version.py +++ b/test/blocking/test_advisory_prime_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_product.py b/test/blocking/test_advisory_product.py index 4c261b75..35820edb 100644 --- a/test/blocking/test_advisory_product.py +++ b/test/blocking/test_advisory_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,7 +38,9 @@ def make_instance(self, include_optional) -> AdvisoryProduct: return AdvisoryProduct( name = '', product_id = '', - product_identification_helper = { } + product_identification_helper = { + 'key' : null + } ) else: return AdvisoryProduct( diff --git a/test/blocking/test_advisory_product_branch.py b/test/blocking/test_advisory_product_branch.py index f397acd5..ad43951b 100644 --- a/test/blocking/test_advisory_product_branch.py +++ b/test/blocking/test_advisory_product_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -43,14 +43,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ], ) @@ -60,14 +64,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ] diff --git a/test/blocking/test_advisory_product_specific_detail.py b/test/blocking/test_advisory_product_specific_detail.py index bd7a3052..e695fad4 100644 --- a/test/blocking/test_advisory_product_specific_detail.py +++ b/test/blocking/test_advisory_product_specific_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_product_tree.py b/test/blocking/test_advisory_product_tree.py deleted file mode 100644 index ab44c577..00000000 --- a/test/blocking/test_advisory_product_tree.py +++ /dev/null @@ -1,57 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree - -class TestAdvisoryProductTree(unittest.TestCase): - """AdvisoryProductTree unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryProductTree: - """Test AdvisoryProductTree - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryProductTree` - """ - model = AdvisoryProductTree() - if include_optional: - return AdvisoryProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ] - ) - else: - return AdvisoryProductTree( - ) - """ - - def testAdvisoryProductTree(self): - """Test AdvisoryProductTree""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_products_affected.py b/test/blocking/test_advisory_products_affected.py index 7169d34a..4184d652 100644 --- a/test/blocking/test_advisory_products_affected.py +++ b/test/blocking/test_advisory_products_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_progress.py b/test/blocking/test_advisory_progress.py index fe1efb07..777475e7 100644 --- a/test/blocking/test_advisory_progress.py +++ b/test/blocking/test_advisory_progress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_proofpoint.py b/test/blocking/test_advisory_proofpoint.py index 716aae9e..a9b06417 100644 --- a/test/blocking/test_advisory_proofpoint.py +++ b/test/blocking/test_advisory_proofpoint.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ptc.py b/test/blocking/test_advisory_ptc.py index 3c93257f..3c5d43fd 100644 --- a/test/blocking/test_advisory_ptc.py +++ b/test/blocking/test_advisory_ptc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ptm_descriptions.py b/test/blocking/test_advisory_ptm_descriptions.py index 7b1b6dda..9451dc5f 100644 --- a/test/blocking/test_advisory_ptm_descriptions.py +++ b/test/blocking/test_advisory_ptm_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_publisher.py b/test/blocking/test_advisory_publisher.py index 68ae2f04..90ebc5a4 100644 --- a/test/blocking/test_advisory_publisher.py +++ b/test/blocking/test_advisory_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_pure_storage.py b/test/blocking/test_advisory_pure_storage.py index 5a9f3b9a..ce667ded 100644 --- a/test/blocking/test_advisory_pure_storage.py +++ b/test/blocking/test_advisory_pure_storage.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_advisory.py b/test/blocking/test_advisory_py_pa_advisory.py index 5625c2ce..5ac3e943 100644 --- a/test/blocking/test_advisory_py_pa_advisory.py +++ b/test/blocking/test_advisory_py_pa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_affected.py b/test/blocking/test_advisory_py_pa_affected.py index a8a8a734..ec294a67 100644 --- a/test/blocking/test_advisory_py_pa_affected.py +++ b/test/blocking/test_advisory_py_pa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_event.py b/test/blocking/test_advisory_py_pa_event.py index 26e26988..5533d02c 100644 --- a/test/blocking/test_advisory_py_pa_event.py +++ b/test/blocking/test_advisory_py_pa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_package.py b/test/blocking/test_advisory_py_pa_package.py index 2acd7608..8a510073 100644 --- a/test/blocking/test_advisory_py_pa_package.py +++ b/test/blocking/test_advisory_py_pa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_range.py b/test/blocking/test_advisory_py_pa_range.py index 15680bfc..2e099186 100644 --- a/test/blocking/test_advisory_py_pa_range.py +++ b/test/blocking/test_advisory_py_pa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_py_pa_reference.py b/test/blocking/test_advisory_py_pa_reference.py index 81fd4c9e..14aafb5c 100644 --- a/test/blocking/test_advisory_py_pa_reference.py +++ b/test/blocking/test_advisory_py_pa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qnap_advisory.py b/test/blocking/test_advisory_qnap_advisory.py index 71a63500..9cb8a965 100644 --- a/test/blocking/test_advisory_qnap_advisory.py +++ b/test/blocking/test_advisory_qnap_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qqid.py b/test/blocking/test_advisory_qqid.py index 79f4aaf2..37835836 100644 --- a/test/blocking/test_advisory_qqid.py +++ b/test/blocking/test_advisory_qqid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qsb.py b/test/blocking/test_advisory_qsb.py index 09975d0d..9bc69663 100644 --- a/test/blocking/test_advisory_qsb.py +++ b/test/blocking/test_advisory_qsb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qualcomm.py b/test/blocking/test_advisory_qualcomm.py index 7b91c702..19a01b84 100644 --- a/test/blocking/test_advisory_qualcomm.py +++ b/test/blocking/test_advisory_qualcomm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qualys.py b/test/blocking/test_advisory_qualys.py index c2093cfa..9e5ebeb8 100644 --- a/test/blocking/test_advisory_qualys.py +++ b/test/blocking/test_advisory_qualys.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_qualys_qid.py b/test/blocking/test_advisory_qualys_qid.py index 3cf5a5b2..bd87d213 100644 --- a/test/blocking/test_advisory_qualys_qid.py +++ b/test/blocking/test_advisory_qualys_qid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_r_description.py b/test/blocking/test_advisory_r_description.py index d7f65f55..a63aaa8d 100644 --- a/test/blocking/test_advisory_r_description.py +++ b/test/blocking/test_advisory_r_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_r_note.py b/test/blocking/test_advisory_r_note.py index d46f7d81..129012fd 100644 --- a/test/blocking/test_advisory_r_note.py +++ b/test/blocking/test_advisory_r_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_r_revision.py b/test/blocking/test_advisory_r_revision.py index 48d9a14c..9f4a65df 100644 --- a/test/blocking/test_advisory_r_revision.py +++ b/test/blocking/test_advisory_r_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_r_score_set.py b/test/blocking/test_advisory_r_score_set.py index 820f2387..0e794324 100644 --- a/test/blocking/test_advisory_r_score_set.py +++ b/test/blocking/test_advisory_r_score_set.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_r_threat.py b/test/blocking/test_advisory_r_threat.py index 447b12b5..e1d45e1b 100644 --- a/test/blocking/test_advisory_r_threat.py +++ b/test/blocking/test_advisory_r_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_range.py b/test/blocking/test_advisory_range.py index 61d9b115..bdce3d02 100644 --- a/test/blocking/test_advisory_range.py +++ b/test/blocking/test_advisory_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ransomware_exploit.py b/test/blocking/test_advisory_ransomware_exploit.py index dea6cf3e..d3919d6d 100644 --- a/test/blocking/test_advisory_ransomware_exploit.py +++ b/test/blocking/test_advisory_ransomware_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_record_type.py b/test/blocking/test_advisory_record_type.py index 65adca06..2c1eda6d 100644 --- a/test/blocking/test_advisory_record_type.py +++ b/test/blocking/test_advisory_record_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_red_lion.py b/test/blocking/test_advisory_red_lion.py index 59523f8b..86403ed9 100644 --- a/test/blocking/test_advisory_red_lion.py +++ b/test/blocking/test_advisory_red_lion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_redhat_cve.py b/test/blocking/test_advisory_redhat_cve.py index b5ca86db..95f8ccd2 100644 --- a/test/blocking/test_advisory_redhat_cve.py +++ b/test/blocking/test_advisory_redhat_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_reference.py b/test/blocking/test_advisory_reference.py index 757cffda..078cda7f 100644 --- a/test/blocking/test_advisory_reference.py +++ b/test/blocking/test_advisory_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_related_rule.py b/test/blocking/test_advisory_related_rule.py index 7874d508..1a6acc61 100644 --- a/test/blocking/test_advisory_related_rule.py +++ b/test/blocking/test_advisory_related_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_relationship.py b/test/blocking/test_advisory_relationship.py deleted file mode 100644 index cef988d1..00000000 --- a/test/blocking/test_advisory_relationship.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship - -class TestAdvisoryRelationship(unittest.TestCase): - """AdvisoryRelationship unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRelationship: - """Test AdvisoryRelationship - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRelationship` - """ - model = AdvisoryRelationship() - if include_optional: - return AdvisoryRelationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '' - ) - else: - return AdvisoryRelationship( - ) - """ - - def testAdvisoryRelationship(self): - """Test AdvisoryRelationship""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_remediation_data.py b/test/blocking/test_advisory_remediation_data.py index bb521991..f864b67b 100644 --- a/test/blocking/test_advisory_remediation_data.py +++ b/test/blocking/test_advisory_remediation_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_renesas.py b/test/blocking/test_advisory_renesas.py index 8fed63ff..a411baa9 100644 --- a/test/blocking/test_advisory_renesas.py +++ b/test/blocking/test_advisory_renesas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_reported_exploit.py b/test/blocking/test_advisory_reported_exploit.py index 80b40c06..08fb5a4d 100644 --- a/test/blocking/test_advisory_reported_exploit.py +++ b/test/blocking/test_advisory_reported_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_restart_data.py b/test/blocking/test_advisory_restart_data.py index 72d21233..8e81a1d0 100644 --- a/test/blocking/test_advisory_restart_data.py +++ b/test/blocking/test_advisory_restart_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_revision.py b/test/blocking/test_advisory_revision.py deleted file mode 100644 index 52950d96..00000000 --- a/test/blocking/test_advisory_revision.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision - -class TestAdvisoryRevision(unittest.TestCase): - """AdvisoryRevision unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRevision: - """Test AdvisoryRevision - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRevision` - """ - model = AdvisoryRevision() - if include_optional: - return AdvisoryRevision( - var_date = '', - description = '', - number = '' - ) - else: - return AdvisoryRevision( - ) - """ - - def testAdvisoryRevision(self): - """Test AdvisoryRevision""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_revision_history.py b/test/blocking/test_advisory_revision_history.py index d4ee5b92..cffaf9b2 100644 --- a/test/blocking/test_advisory_revision_history.py +++ b/test/blocking/test_advisory_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_revive.py b/test/blocking/test_advisory_revive.py index bdf81c8d..ac48f68a 100644 --- a/test/blocking/test_advisory_revive.py +++ b/test/blocking/test_advisory_revive.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rhel_cve.py b/test/blocking/test_advisory_rhel_cve.py index 1538c70f..f45b219c 100644 --- a/test/blocking/test_advisory_rhel_cve.py +++ b/test/blocking/test_advisory_rhel_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: if include_optional: return AdvisoryRhelCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_roche.py b/test/blocking/test_advisory_roche.py index 1243a955..38987902 100644 --- a/test/blocking/test_advisory_roche.py +++ b/test/blocking/test_advisory_roche.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_roche_cve.py b/test/blocking/test_advisory_roche_cve.py index 22dcdef7..a47cd238 100644 --- a/test/blocking/test_advisory_roche_cve.py +++ b/test/blocking/test_advisory_roche_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rockwell.py b/test/blocking/test_advisory_rockwell.py index 18e76851..6cc3e225 100644 --- a/test/blocking/test_advisory_rockwell.py +++ b/test/blocking/test_advisory_rockwell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rockwell_affected_product.py b/test/blocking/test_advisory_rockwell_affected_product.py index a9bb9985..b7ec0615 100644 --- a/test/blocking/test_advisory_rockwell_affected_product.py +++ b/test/blocking/test_advisory_rockwell_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_advisory.py b/test/blocking/test_advisory_rocky_advisory.py index 1605ee82..0fc9d8e8 100644 --- a/test/blocking/test_advisory_rocky_advisory.py +++ b/test/blocking/test_advisory_rocky_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_cve.py b/test/blocking/test_advisory_rocky_cve.py index af87429a..f55628fc 100644 --- a/test/blocking/test_advisory_rocky_cve.py +++ b/test/blocking/test_advisory_rocky_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_errata.py b/test/blocking/test_advisory_rocky_errata.py index 9a880be1..e2c77bc2 100644 --- a/test/blocking/test_advisory_rocky_errata.py +++ b/test/blocking/test_advisory_rocky_errata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_fix.py b/test/blocking/test_advisory_rocky_fix.py index ddedf1a2..066b2203 100644 --- a/test/blocking/test_advisory_rocky_fix.py +++ b/test/blocking/test_advisory_rocky_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_package.py b/test/blocking/test_advisory_rocky_package.py index fc339a3f..e95de1ac 100644 --- a/test/blocking/test_advisory_rocky_package.py +++ b/test/blocking/test_advisory_rocky_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rocky_version.py b/test/blocking/test_advisory_rocky_version.py index 7dca92ee..9b0e7019 100644 --- a/test/blocking/test_advisory_rocky_version.py +++ b/test/blocking/test_advisory_rocky_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rsync.py b/test/blocking/test_advisory_rsync.py index 67432c3e..ca472f65 100644 --- a/test/blocking/test_advisory_rsync.py +++ b/test/blocking/test_advisory_rsync.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ruckus.py b/test/blocking/test_advisory_ruckus.py index 2ff5cb89..8cb9d3d6 100644 --- a/test/blocking/test_advisory_ruckus.py +++ b/test/blocking/test_advisory_ruckus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rustsec_advisory.py b/test/blocking/test_advisory_rustsec_advisory.py index bbf6cb8a..379d0f2a 100644 --- a/test/blocking/test_advisory_rustsec_advisory.py +++ b/test/blocking/test_advisory_rustsec_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rustsec_affected.py b/test/blocking/test_advisory_rustsec_affected.py index e4ce0801..0b7a623f 100644 --- a/test/blocking/test_advisory_rustsec_affected.py +++ b/test/blocking/test_advisory_rustsec_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rustsec_front_matter_advisory.py b/test/blocking/test_advisory_rustsec_front_matter_advisory.py index da5566f7..eacd7a4c 100644 --- a/test/blocking/test_advisory_rustsec_front_matter_advisory.py +++ b/test/blocking/test_advisory_rustsec_front_matter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_rustsec_front_matter_versions.py b/test/blocking/test_advisory_rustsec_front_matter_versions.py index 90f5800b..8f5544d1 100644 --- a/test/blocking/test_advisory_rustsec_front_matter_versions.py +++ b/test/blocking/test_advisory_rustsec_front_matter_versions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sa_advisory.py b/test/blocking/test_advisory_sa_advisory.py index 3b6d8fb9..c9c3909f 100644 --- a/test/blocking/test_advisory_sa_advisory.py +++ b/test/blocking/test_advisory_sa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_safran.py b/test/blocking/test_advisory_safran.py index 2f0eff56..ea0aa7eb 100644 --- a/test/blocking/test_advisory_safran.py +++ b/test/blocking/test_advisory_safran.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_saint_exploit.py b/test/blocking/test_advisory_saint_exploit.py index 39cddd6f..cb3700e1 100644 --- a/test/blocking/test_advisory_saint_exploit.py +++ b/test/blocking/test_advisory_saint_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sales_force.py b/test/blocking/test_advisory_sales_force.py index 8f72a68a..b13b6600 100644 --- a/test/blocking/test_advisory_sales_force.py +++ b/test/blocking/test_advisory_sales_force.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_samba.py b/test/blocking/test_advisory_samba.py index 1329d558..318ed161 100644 --- a/test/blocking/test_advisory_samba.py +++ b/test/blocking/test_advisory_samba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sandisk.py b/test/blocking/test_advisory_sandisk.py index fd75dbc8..92f1b502 100644 --- a/test/blocking/test_advisory_sandisk.py +++ b/test/blocking/test_advisory_sandisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sans_dshield.py b/test/blocking/test_advisory_sans_dshield.py index 11fb03bd..bb45ecd1 100644 --- a/test/blocking/test_advisory_sans_dshield.py +++ b/test/blocking/test_advisory_sans_dshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sap.py b/test/blocking/test_advisory_sap.py index 13a9d59b..13babdff 100644 --- a/test/blocking/test_advisory_sap.py +++ b/test/blocking/test_advisory_sap.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_schneider_cve.py b/test/blocking/test_advisory_schneider_cve.py index ea06e592..7a844e18 100644 --- a/test/blocking/test_advisory_schneider_cve.py +++ b/test/blocking/test_advisory_schneider_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_schneider_electric_advisory.py b/test/blocking/test_advisory_schneider_electric_advisory.py index a581c9da..32554000 100644 --- a/test/blocking/test_advisory_schneider_electric_advisory.py +++ b/test/blocking/test_advisory_schneider_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_schutzwerk.py b/test/blocking/test_advisory_schutzwerk.py index a3e34c28..97ee92b8 100644 --- a/test/blocking/test_advisory_schutzwerk.py +++ b/test/blocking/test_advisory_schutzwerk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_score_set.py b/test/blocking/test_advisory_score_set.py deleted file mode 100644 index cd983bb1..00000000 --- a/test/blocking/test_advisory_score_set.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet - -class TestAdvisoryScoreSet(unittest.TestCase): - """AdvisoryScoreSet unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryScoreSet: - """Test AdvisoryScoreSet - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryScoreSet` - """ - model = AdvisoryScoreSet() - if include_optional: - return AdvisoryScoreSet( - base_score = '', - vector = '' - ) - else: - return AdvisoryScoreSet( - ) - """ - - def testAdvisoryScoreSet(self): - """Test AdvisoryScoreSet""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_sec_consult.py b/test/blocking/test_advisory_sec_consult.py index 38f1e459..fd5872a6 100644 --- a/test/blocking/test_advisory_sec_consult.py +++ b/test/blocking/test_advisory_sec_consult.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sec_fix.py b/test/blocking/test_advisory_sec_fix.py index 25d445b4..c2cae1b1 100644 --- a/test/blocking/test_advisory_sec_fix.py +++ b/test/blocking/test_advisory_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_security_bulletin.py b/test/blocking/test_advisory_security_bulletin.py index 34ab63fd..6a04932f 100644 --- a/test/blocking/test_advisory_security_bulletin.py +++ b/test/blocking/test_advisory_security_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_security_lab.py b/test/blocking/test_advisory_security_lab.py index 328437a5..0d094446 100644 --- a/test/blocking/test_advisory_security_lab.py +++ b/test/blocking/test_advisory_security_lab.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_seebug_exploit.py b/test/blocking/test_advisory_seebug_exploit.py index b7eabf96..774e965d 100644 --- a/test/blocking/test_advisory_seebug_exploit.py +++ b/test/blocking/test_advisory_seebug_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sel.py b/test/blocking/test_advisory_sel.py index 0fff2c6d..b92da84f 100644 --- a/test/blocking/test_advisory_sel.py +++ b/test/blocking/test_advisory_sel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sentinel_one.py b/test/blocking/test_advisory_sentinel_one.py index 1dfe9f55..800fcc3a 100644 --- a/test/blocking/test_advisory_sentinel_one.py +++ b/test/blocking/test_advisory_sentinel_one.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_service_now.py b/test/blocking/test_advisory_service_now.py index 8ac764de..32c863e0 100644 --- a/test/blocking/test_advisory_service_now.py +++ b/test/blocking/test_advisory_service_now.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_seven_zip.py b/test/blocking/test_advisory_seven_zip.py index 93cbce64..d27ed3f6 100644 --- a/test/blocking/test_advisory_seven_zip.py +++ b/test/blocking/test_advisory_seven_zip.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_severity.py b/test/blocking/test_advisory_severity.py index 4e68ce20..66f3c292 100644 --- a/test/blocking/test_advisory_severity.py +++ b/test/blocking/test_advisory_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_shadow_server_exploited_vulnerability.py b/test/blocking/test_advisory_shadow_server_exploited_vulnerability.py index 08e408a9..4748aaeb 100644 --- a/test/blocking/test_advisory_shadow_server_exploited_vulnerability.py +++ b/test/blocking/test_advisory_shadow_server_exploited_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_shielder.py b/test/blocking/test_advisory_shielder.py index 2357f2e9..ea548eda 100644 --- a/test/blocking/test_advisory_shielder.py +++ b/test/blocking/test_advisory_shielder.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sick.py b/test/blocking/test_advisory_sick.py index 9387a50b..00f2dfe0 100644 --- a/test/blocking/test_advisory_sick.py +++ b/test/blocking/test_advisory_sick.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_acknowledgments.py b/test/blocking/test_advisory_siemens_acknowledgments.py index bd7d545b..11559f2d 100644 --- a/test/blocking/test_advisory_siemens_acknowledgments.py +++ b/test/blocking/test_advisory_siemens_acknowledgments.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_advisory.py b/test/blocking/test_advisory_siemens_advisory.py index dadef267..409a8665 100644 --- a/test/blocking/test_advisory_siemens_advisory.py +++ b/test/blocking/test_advisory_siemens_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_branch.py b/test/blocking/test_advisory_siemens_branch.py index f4d07163..96ed2ed5 100644 --- a/test/blocking/test_advisory_siemens_branch.py +++ b/test/blocking/test_advisory_siemens_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_cvssv3.py b/test/blocking/test_advisory_siemens_cvssv3.py index 6904e76a..a2c5cf2c 100644 --- a/test/blocking/test_advisory_siemens_cvssv3.py +++ b/test/blocking/test_advisory_siemens_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_cwe.py b/test/blocking/test_advisory_siemens_cwe.py index f9d858ea..ede5f4f9 100644 --- a/test/blocking/test_advisory_siemens_cwe.py +++ b/test/blocking/test_advisory_siemens_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_distribution.py b/test/blocking/test_advisory_siemens_distribution.py index 51b0dccf..bb0770e5 100644 --- a/test/blocking/test_advisory_siemens_distribution.py +++ b/test/blocking/test_advisory_siemens_distribution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_document.py b/test/blocking/test_advisory_siemens_document.py index 53c10cac..09d464cc 100644 --- a/test/blocking/test_advisory_siemens_document.py +++ b/test/blocking/test_advisory_siemens_document.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_engine.py b/test/blocking/test_advisory_siemens_engine.py index ce8e0cba..19964a82 100644 --- a/test/blocking/test_advisory_siemens_engine.py +++ b/test/blocking/test_advisory_siemens_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_generator.py b/test/blocking/test_advisory_siemens_generator.py index 1bc48e88..63a4bd64 100644 --- a/test/blocking/test_advisory_siemens_generator.py +++ b/test/blocking/test_advisory_siemens_generator.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_notes.py b/test/blocking/test_advisory_siemens_notes.py index 20af5318..0f93f803 100644 --- a/test/blocking/test_advisory_siemens_notes.py +++ b/test/blocking/test_advisory_siemens_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_product.py b/test/blocking/test_advisory_siemens_product.py index 2c5d0caf..fd7c94e6 100644 --- a/test/blocking/test_advisory_siemens_product.py +++ b/test/blocking/test_advisory_siemens_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_product_identification_helper.py b/test/blocking/test_advisory_siemens_product_identification_helper.py index f4af773a..8f4ec98d 100644 --- a/test/blocking/test_advisory_siemens_product_identification_helper.py +++ b/test/blocking/test_advisory_siemens_product_identification_helper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_product_status.py b/test/blocking/test_advisory_siemens_product_status.py index bec571c5..c2800688 100644 --- a/test/blocking/test_advisory_siemens_product_status.py +++ b/test/blocking/test_advisory_siemens_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_product_tree.py b/test/blocking/test_advisory_siemens_product_tree.py index 97d6f6f2..94239de4 100644 --- a/test/blocking/test_advisory_siemens_product_tree.py +++ b/test/blocking/test_advisory_siemens_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_publisher.py b/test/blocking/test_advisory_siemens_publisher.py index 1ba5b859..d3f0e217 100644 --- a/test/blocking/test_advisory_siemens_publisher.py +++ b/test/blocking/test_advisory_siemens_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_references.py b/test/blocking/test_advisory_siemens_references.py index 5e534ae2..7b37b31b 100644 --- a/test/blocking/test_advisory_siemens_references.py +++ b/test/blocking/test_advisory_siemens_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_remediation.py b/test/blocking/test_advisory_siemens_remediation.py index 2632f32f..38d791e3 100644 --- a/test/blocking/test_advisory_siemens_remediation.py +++ b/test/blocking/test_advisory_siemens_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_revision_history.py b/test/blocking/test_advisory_siemens_revision_history.py index c2a3aa20..1e031649 100644 --- a/test/blocking/test_advisory_siemens_revision_history.py +++ b/test/blocking/test_advisory_siemens_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_score.py b/test/blocking/test_advisory_siemens_score.py index d93ef054..18c74092 100644 --- a/test/blocking/test_advisory_siemens_score.py +++ b/test/blocking/test_advisory_siemens_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_sub_branch.py b/test/blocking/test_advisory_siemens_sub_branch.py index 25d85eaf..7f8e0650 100644 --- a/test/blocking/test_advisory_siemens_sub_branch.py +++ b/test/blocking/test_advisory_siemens_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_sub_sub_branch.py b/test/blocking/test_advisory_siemens_sub_sub_branch.py index 3a380357..7a125c5b 100644 --- a/test/blocking/test_advisory_siemens_sub_sub_branch.py +++ b/test/blocking/test_advisory_siemens_sub_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_tlp.py b/test/blocking/test_advisory_siemens_tlp.py index a6dd4063..8be2767d 100644 --- a/test/blocking/test_advisory_siemens_tlp.py +++ b/test/blocking/test_advisory_siemens_tlp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_tracking.py b/test/blocking/test_advisory_siemens_tracking.py index 1ba788f8..d0eccc05 100644 --- a/test/blocking/test_advisory_siemens_tracking.py +++ b/test/blocking/test_advisory_siemens_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_siemens_vulnerability.py b/test/blocking/test_advisory_siemens_vulnerability.py index 284a675e..9c2a5d70 100644 --- a/test/blocking/test_advisory_siemens_vulnerability.py +++ b/test/blocking/test_advisory_siemens_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sierra_wireless.py b/test/blocking/test_advisory_sierra_wireless.py index 69523102..3605bffa 100644 --- a/test/blocking/test_advisory_sierra_wireless.py +++ b/test/blocking/test_advisory_sierra_wireless.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sigma_rule.py b/test/blocking/test_advisory_sigma_rule.py index 56bc2b23..34ad66e2 100644 --- a/test/blocking/test_advisory_sigma_rule.py +++ b/test/blocking/test_advisory_sigma_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -47,7 +47,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRule: author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_advisory_sigma_rule_rule.py b/test/blocking/test_advisory_sigma_rule_rule.py index b8efe6b8..8182f760 100644 --- a/test/blocking/test_advisory_sigma_rule_rule.py +++ b/test/blocking/test_advisory_sigma_rule_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -39,7 +39,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRuleRule: author = '', var_date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_advisory_sing_cert.py b/test/blocking/test_advisory_sing_cert.py index d437523e..53a1a0e3 100644 --- a/test/blocking/test_advisory_sing_cert.py +++ b/test/blocking/test_advisory_sing_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sitecore.py b/test/blocking/test_advisory_sitecore.py index ab25e70c..bf1b91ff 100644 --- a/test/blocking/test_advisory_sitecore.py +++ b/test/blocking/test_advisory_sitecore.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_slackware.py b/test/blocking/test_advisory_slackware.py index 133ef425..f48e3447 100644 --- a/test/blocking/test_advisory_slackware.py +++ b/test/blocking/test_advisory_slackware.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_software_update.py b/test/blocking/test_advisory_software_update.py index 4a0b32bc..79988868 100644 --- a/test/blocking/test_advisory_software_update.py +++ b/test/blocking/test_advisory_software_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_solar_winds_advisory.py b/test/blocking/test_advisory_solar_winds_advisory.py index 92ff4a17..6d8c7d80 100644 --- a/test/blocking/test_advisory_solar_winds_advisory.py +++ b/test/blocking/test_advisory_solar_winds_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_solr.py b/test/blocking/test_advisory_solr.py index 89224f2a..8985ba7c 100644 --- a/test/blocking/test_advisory_solr.py +++ b/test/blocking/test_advisory_solr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sonatype.py b/test/blocking/test_advisory_sonatype.py index 1b9e2200..f8fe33e1 100644 --- a/test/blocking/test_advisory_sonatype.py +++ b/test/blocking/test_advisory_sonatype.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sonic_wall_advisory.py b/test/blocking/test_advisory_sonic_wall_advisory.py index 6069e53c..383f7158 100644 --- a/test/blocking/test_advisory_sonic_wall_advisory.py +++ b/test/blocking/test_advisory_sonic_wall_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_spacelabs_healthcare_advisory.py b/test/blocking/test_advisory_spacelabs_healthcare_advisory.py index 6936a35d..42b594a4 100644 --- a/test/blocking/test_advisory_spacelabs_healthcare_advisory.py +++ b/test/blocking/test_advisory_spacelabs_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_splunk.py b/test/blocking/test_advisory_splunk.py index fae28d30..f708ddd6 100644 --- a/test/blocking/test_advisory_splunk.py +++ b/test/blocking/test_advisory_splunk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_splunk_product.py b/test/blocking/test_advisory_splunk_product.py index f23b745c..1d58270d 100644 --- a/test/blocking/test_advisory_splunk_product.py +++ b/test/blocking/test_advisory_splunk_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_spring.py b/test/blocking/test_advisory_spring.py index b9638449..8445489b 100644 --- a/test/blocking/test_advisory_spring.py +++ b/test/blocking/test_advisory_spring.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ssa_source.py b/test/blocking/test_advisory_ssa_source.py index 23493840..9889811a 100644 --- a/test/blocking/test_advisory_ssa_source.py +++ b/test/blocking/test_advisory_ssa_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ssd_advisory.py b/test/blocking/test_advisory_ssd_advisory.py index 3202fd1a..9f5dc717 100644 --- a/test/blocking/test_advisory_ssd_advisory.py +++ b/test/blocking/test_advisory_ssd_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_stormshield.py b/test/blocking/test_advisory_stormshield.py index 8881b421..df20bccd 100644 --- a/test/blocking/test_advisory_stormshield.py +++ b/test/blocking/test_advisory_stormshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_stryker_advisory.py b/test/blocking/test_advisory_stryker_advisory.py index 21d913bf..dd3f863f 100644 --- a/test/blocking/test_advisory_stryker_advisory.py +++ b/test/blocking/test_advisory_stryker_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_sudo.py b/test/blocking/test_advisory_sudo.py index b91f8805..964d3ed8 100644 --- a/test/blocking/test_advisory_sudo.py +++ b/test/blocking/test_advisory_sudo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_suse_security.py b/test/blocking/test_advisory_suse_security.py index 63e60b9f..58b0474f 100644 --- a/test/blocking/test_advisory_suse_security.py +++ b/test/blocking/test_advisory_suse_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_swisslog_healthcare_advisory.py b/test/blocking/test_advisory_swisslog_healthcare_advisory.py index a1e9356b..7c339392 100644 --- a/test/blocking/test_advisory_swisslog_healthcare_advisory.py +++ b/test/blocking/test_advisory_swisslog_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_symfony.py b/test/blocking/test_advisory_symfony.py index 88ff2ba7..db7f244a 100644 --- a/test/blocking/test_advisory_symfony.py +++ b/test/blocking/test_advisory_symfony.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_synacktiv.py b/test/blocking/test_advisory_synacktiv.py index 7de0a054..bb2312ad 100644 --- a/test/blocking/test_advisory_synacktiv.py +++ b/test/blocking/test_advisory_synacktiv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_syncro_soft.py b/test/blocking/test_advisory_syncro_soft.py index c51c3d4a..f0d1edea 100644 --- a/test/blocking/test_advisory_syncro_soft.py +++ b/test/blocking/test_advisory_syncro_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_synology.py b/test/blocking/test_advisory_synology.py index 85cbb6d7..a8743753 100644 --- a/test/blocking/test_advisory_synology.py +++ b/test/blocking/test_advisory_synology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_syss.py b/test/blocking/test_advisory_syss.py index a72bb584..861fa8a9 100644 --- a/test/blocking/test_advisory_syss.py +++ b/test/blocking/test_advisory_syss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tailscale.py b/test/blocking/test_advisory_tailscale.py index 157d26fe..88c42cc3 100644 --- a/test/blocking/test_advisory_tailscale.py +++ b/test/blocking/test_advisory_tailscale.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_talos_advisory.py b/test/blocking/test_advisory_talos_advisory.py index f34d631f..9865f13a 100644 --- a/test/blocking/test_advisory_talos_advisory.py +++ b/test/blocking/test_advisory_talos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_team_viewer.py b/test/blocking/test_advisory_team_viewer.py index 767032da..8e4187e1 100644 --- a/test/blocking/test_advisory_team_viewer.py +++ b/test/blocking/test_advisory_team_viewer.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tenable_research_advisory.py b/test/blocking/test_advisory_tenable_research_advisory.py index e6d5bcfd..81e2a5fb 100644 --- a/test/blocking/test_advisory_tenable_research_advisory.py +++ b/test/blocking/test_advisory_tenable_research_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tencent.py b/test/blocking/test_advisory_tencent.py index fac8918b..9e2000ab 100644 --- a/test/blocking/test_advisory_tencent.py +++ b/test/blocking/test_advisory_tencent.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_thales.py b/test/blocking/test_advisory_thales.py index 1f640613..0f927b6f 100644 --- a/test/blocking/test_advisory_thales.py +++ b/test/blocking/test_advisory_thales.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_the_missing_link.py b/test/blocking/test_advisory_the_missing_link.py index b7f48979..a7c56afb 100644 --- a/test/blocking/test_advisory_the_missing_link.py +++ b/test/blocking/test_advisory_the_missing_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_thermo_fisher.py b/test/blocking/test_advisory_thermo_fisher.py index b216caa8..923f4bba 100644 --- a/test/blocking/test_advisory_thermo_fisher.py +++ b/test/blocking/test_advisory_thermo_fisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_threat.py b/test/blocking/test_advisory_threat.py deleted file mode 100644 index cf909aaf..00000000 --- a/test/blocking/test_advisory_threat.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat - -class TestAdvisoryThreat(unittest.TestCase): - """AdvisoryThreat unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryThreat: - """Test AdvisoryThreat - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryThreat` - """ - model = AdvisoryThreat() - if include_optional: - return AdvisoryThreat( - severity = '', - type = '' - ) - else: - return AdvisoryThreat( - ) - """ - - def testAdvisoryThreat(self): - """Test AdvisoryThreat""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_threat_actor_with_external_objects.py b/test/blocking/test_advisory_threat_actor_with_external_objects.py index 9b54ef05..790150f7 100644 --- a/test/blocking/test_advisory_threat_actor_with_external_objects.py +++ b/test/blocking/test_advisory_threat_actor_with_external_objects.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_threat_data.py b/test/blocking/test_advisory_threat_data.py index 94b1a22d..e25a36f6 100644 --- a/test/blocking/test_advisory_threat_data.py +++ b/test/blocking/test_advisory_threat_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ti.py b/test/blocking/test_advisory_ti.py index b0869e84..b560da4c 100644 --- a/test/blocking/test_advisory_ti.py +++ b/test/blocking/test_advisory_ti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tibco.py b/test/blocking/test_advisory_tibco.py index 2a45021a..f4df02ed 100644 --- a/test/blocking/test_advisory_tibco.py +++ b/test/blocking/test_advisory_tibco.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_timeline.py b/test/blocking/test_advisory_timeline.py index 8c603d6c..32d17888 100644 --- a/test/blocking/test_advisory_timeline.py +++ b/test/blocking/test_advisory_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tool.py b/test/blocking/test_advisory_tool.py index ae4fe5b2..05812317 100644 --- a/test/blocking/test_advisory_tool.py +++ b/test/blocking/test_advisory_tool.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tool_ref.py b/test/blocking/test_advisory_tool_ref.py index 5d18ede8..7bef2e55 100644 --- a/test/blocking/test_advisory_tool_ref.py +++ b/test/blocking/test_advisory_tool_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tp_link.py b/test/blocking/test_advisory_tp_link.py index b9068201..4bb5e5ca 100644 --- a/test/blocking/test_advisory_tp_link.py +++ b/test/blocking/test_advisory_tp_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tracking.py b/test/blocking/test_advisory_tracking.py index 8e36cf9d..b1ff1d83 100644 --- a/test/blocking/test_advisory_tracking.py +++ b/test/blocking/test_advisory_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tracking_id.py b/test/blocking/test_advisory_tracking_id.py index 07ca0a0a..ede37512 100644 --- a/test/blocking/test_advisory_tracking_id.py +++ b/test/blocking/test_advisory_tracking_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_trane_technology.py b/test/blocking/test_advisory_trane_technology.py index 5b82e778..521cfa58 100644 --- a/test/blocking/test_advisory_trane_technology.py +++ b/test/blocking/test_advisory_trane_technology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_trend_micro.py b/test/blocking/test_advisory_trend_micro.py index f102ec5f..ec0dbdf9 100644 --- a/test/blocking/test_advisory_trend_micro.py +++ b/test/blocking/test_advisory_trend_micro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_triage_notes.py b/test/blocking/test_advisory_triage_notes.py index 6c405474..97227a35 100644 --- a/test/blocking/test_advisory_triage_notes.py +++ b/test/blocking/test_advisory_triage_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_trustwave.py b/test/blocking/test_advisory_trustwave.py index 827096aa..6b84596a 100644 --- a/test/blocking/test_advisory_trustwave.py +++ b/test/blocking/test_advisory_trustwave.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_tw_cert_advisory.py b/test/blocking/test_advisory_tw_cert_advisory.py index 17df7e66..bc4b592f 100644 --- a/test/blocking/test_advisory_tw_cert_advisory.py +++ b/test/blocking/test_advisory_tw_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ubiquiti.py b/test/blocking/test_advisory_ubiquiti.py index 70bf1db3..7fca45ef 100644 --- a/test/blocking/test_advisory_ubiquiti.py +++ b/test/blocking/test_advisory_ubiquiti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ubuntu_cve.py b/test/blocking/test_advisory_ubuntu_cve.py index 8532c69d..41f20847 100644 --- a/test/blocking/test_advisory_ubuntu_cve.py +++ b/test/blocking/test_advisory_ubuntu_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_ubuntu_package_release_status.py b/test/blocking/test_advisory_ubuntu_package_release_status.py index 4d427b1e..b56caa04 100644 --- a/test/blocking/test_advisory_ubuntu_package_release_status.py +++ b/test/blocking/test_advisory_ubuntu_package_release_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_unify.py b/test/blocking/test_advisory_unify.py index 8a6019e4..5ec63f3a 100644 --- a/test/blocking/test_advisory_unify.py +++ b/test/blocking/test_advisory_unify.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_unisoc.py b/test/blocking/test_advisory_unisoc.py index 88c10eb0..e68e4aca 100644 --- a/test/blocking/test_advisory_unisoc.py +++ b/test/blocking/test_advisory_unisoc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_update.py b/test/blocking/test_advisory_update.py index 201b1a25..ad64be3f 100644 --- a/test/blocking/test_advisory_update.py +++ b/test/blocking/test_advisory_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = None, os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ) + updated = None ) else: return AdvisoryUpdate( diff --git a/test/blocking/test_advisory_updated.py b/test/blocking/test_advisory_updated.py deleted file mode 100644 index 7787049a..00000000 --- a/test/blocking/test_advisory_updated.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated - -class TestAdvisoryUpdated(unittest.TestCase): - """AdvisoryUpdated unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryUpdated: - """Test AdvisoryUpdated - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryUpdated` - """ - model = AdvisoryUpdated() - if include_optional: - return AdvisoryUpdated( - var_date = '' - ) - else: - return AdvisoryUpdated( - ) - """ - - def testAdvisoryUpdated(self): - """Test AdvisoryUpdated""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_usd.py b/test/blocking/test_advisory_usd.py index 6ee96ced..0fbaf9c4 100644 --- a/test/blocking/test_advisory_usd.py +++ b/test/blocking/test_advisory_usd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_usom_advisory.py b/test/blocking/test_advisory_usom_advisory.py index 8b5b42db..e04633a5 100644 --- a/test/blocking/test_advisory_usom_advisory.py +++ b/test/blocking/test_advisory_usom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_v3_acceptance_level.py b/test/blocking/test_advisory_v3_acceptance_level.py index 064c1092..7d8d952a 100644 --- a/test/blocking/test_advisory_v3_acceptance_level.py +++ b/test/blocking/test_advisory_v3_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_van_dyke.py b/test/blocking/test_advisory_van_dyke.py index 91fafe42..33e76577 100644 --- a/test/blocking/test_advisory_van_dyke.py +++ b/test/blocking/test_advisory_van_dyke.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vapid_labs_advisory.py b/test/blocking/test_advisory_vapid_labs_advisory.py index 90d5b602..3ef8b774 100644 --- a/test/blocking/test_advisory_vapid_labs_advisory.py +++ b/test/blocking/test_advisory_vapid_labs_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vc_vulnerable_cpes.py b/test/blocking/test_advisory_vc_vulnerable_cpes.py index 0d55ccdc..2bf9a4b7 100644 --- a/test/blocking/test_advisory_vc_vulnerable_cpes.py +++ b/test/blocking/test_advisory_vc_vulnerable_cpes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vccpe_dictionary.py b/test/blocking/test_advisory_vccpe_dictionary.py index 83b8e471..8e5c873e 100644 --- a/test/blocking/test_advisory_vccpe_dictionary.py +++ b/test/blocking/test_advisory_vccpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vde_advisory.py b/test/blocking/test_advisory_vde_advisory.py index 6c49316a..3ca9fecc 100644 --- a/test/blocking/test_advisory_vde_advisory.py +++ b/test/blocking/test_advisory_vde_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: if include_optional: return AdvisoryVDEAdvisory( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_advisory_veeam.py b/test/blocking/test_advisory_veeam.py index 840d46e0..9db05ae2 100644 --- a/test/blocking/test_advisory_veeam.py +++ b/test/blocking/test_advisory_veeam.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vendor_name_for_threat_actor.py b/test/blocking/test_advisory_vendor_name_for_threat_actor.py index 2d7790ea..0310971e 100644 --- a/test/blocking/test_advisory_vendor_name_for_threat_actor.py +++ b/test/blocking/test_advisory_vendor_name_for_threat_actor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vendor_product.py b/test/blocking/test_advisory_vendor_product.py index b566f19c..80b7b718 100644 --- a/test/blocking/test_advisory_vendor_product.py +++ b/test/blocking/test_advisory_vendor_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vendor_ref.py b/test/blocking/test_advisory_vendor_ref.py index 69ec417d..8308a2ab 100644 --- a/test/blocking/test_advisory_vendor_ref.py +++ b/test/blocking/test_advisory_vendor_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_veritas.py b/test/blocking/test_advisory_veritas.py index 1d41086e..39ab0896 100644 --- a/test/blocking/test_advisory_veritas.py +++ b/test/blocking/test_advisory_veritas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_virtuozzo.py b/test/blocking/test_advisory_virtuozzo.py index 47688641..25740cd2 100644 --- a/test/blocking/test_advisory_virtuozzo.py +++ b/test/blocking/test_advisory_virtuozzo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vlc.py b/test/blocking/test_advisory_vlc.py index 531b07f6..ae872855 100644 --- a/test/blocking/test_advisory_vlc.py +++ b/test/blocking/test_advisory_vlc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vm_ware_advisory.py b/test/blocking/test_advisory_vm_ware_advisory.py index 758181da..9d1e4710 100644 --- a/test/blocking/test_advisory_vm_ware_advisory.py +++ b/test/blocking/test_advisory_vm_ware_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_void_sec.py b/test/blocking/test_advisory_void_sec.py index c5415d3e..eff39853 100644 --- a/test/blocking/test_advisory_void_sec.py +++ b/test/blocking/test_advisory_void_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vuln_check.py b/test/blocking/test_advisory_vuln_check.py index c5430d91..d9e892de 100644 --- a/test/blocking/test_advisory_vuln_check.py +++ b/test/blocking/test_advisory_vuln_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vuln_check_config.py b/test/blocking/test_advisory_vuln_check_config.py index 02072bae..e86d55bf 100644 --- a/test/blocking/test_advisory_vuln_check_config.py +++ b/test/blocking/test_advisory_vuln_check_config.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vuln_check_cve_list_v5.py b/test/blocking/test_advisory_vuln_check_cve_list_v5.py index 55f34bd7..50320ab3 100644 --- a/test/blocking/test_advisory_vuln_check_cve_list_v5.py +++ b/test/blocking/test_advisory_vuln_check_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_vuln_check_kev.py b/test/blocking/test_advisory_vuln_check_kev.py index b53512c2..90df6930 100644 --- a/test/blocking/test_advisory_vuln_check_kev.py +++ b/test/blocking/test_advisory_vuln_check_kev.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vuln_check_package.py b/test/blocking/test_advisory_vuln_check_package.py index 6d034d3b..cb88e5d0 100644 --- a/test/blocking/test_advisory_vuln_check_package.py +++ b/test/blocking/test_advisory_vuln_check_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnerability.py b/test/blocking/test_advisory_vulnerability.py deleted file mode 100644 index 0f91e6f2..00000000 --- a/test/blocking/test_advisory_vulnerability.py +++ /dev/null @@ -1,83 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability - -class TestAdvisoryVulnerability(unittest.TestCase): - """AdvisoryVulnerability unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryVulnerability: - """Test AdvisoryVulnerability - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryVulnerability` - """ - model = AdvisoryVulnerability() - if include_optional: - return AdvisoryVulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ] - ) - else: - return AdvisoryVulnerability( - ) - """ - - def testAdvisoryVulnerability(self): - """Test AdvisoryVulnerability""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_vulnerable_debian_package.py b/test/blocking/test_advisory_vulnerable_debian_package.py index cb31bc9d..034476fa 100644 --- a/test/blocking/test_advisory_vulnerable_debian_package.py +++ b/test/blocking/test_advisory_vulnerable_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnerable_product.py b/test/blocking/test_advisory_vulnerable_product.py index ffbc3ace..864b6f95 100644 --- a/test/blocking/test_advisory_vulnerable_product.py +++ b/test/blocking/test_advisory_vulnerable_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment.py b/test/blocking/test_advisory_vulnrichment.py index 6b5f7731..06416d85 100644 --- a/test/blocking/test_advisory_vulnrichment.py +++ b/test/blocking/test_advisory_vulnrichment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_containers.py b/test/blocking/test_advisory_vulnrichment_containers.py index efaa4c3a..1b16397f 100644 --- a/test/blocking/test_advisory_vulnrichment_containers.py +++ b/test/blocking/test_advisory_vulnrichment_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_content.py b/test/blocking/test_advisory_vulnrichment_content.py index 2d19456f..d7f43734 100644 --- a/test/blocking/test_advisory_vulnrichment_content.py +++ b/test/blocking/test_advisory_vulnrichment_content.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_cve_ref.py b/test/blocking/test_advisory_vulnrichment_cve_ref.py index 5d7fbdf8..72cf2e63 100644 --- a/test/blocking/test_advisory_vulnrichment_cve_ref.py +++ b/test/blocking/test_advisory_vulnrichment_cve_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_metric.py b/test/blocking/test_advisory_vulnrichment_metric.py index e84d4c62..6d2bec34 100644 --- a/test/blocking/test_advisory_vulnrichment_metric.py +++ b/test/blocking/test_advisory_vulnrichment_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_option.py b/test/blocking/test_advisory_vulnrichment_option.py index e5e42ddf..fd5361ca 100644 --- a/test/blocking/test_advisory_vulnrichment_option.py +++ b/test/blocking/test_advisory_vulnrichment_option.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vulnrichment_other.py b/test/blocking/test_advisory_vulnrichment_other.py index dfa16b39..7f337a75 100644 --- a/test/blocking/test_advisory_vulnrichment_other.py +++ b/test/blocking/test_advisory_vulnrichment_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_vyaire_advisory.py b/test/blocking/test_advisory_vyaire_advisory.py index 60740451..905831ca 100644 --- a/test/blocking/test_advisory_vyaire_advisory.py +++ b/test/blocking/test_advisory_vyaire_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_watch_guard.py b/test/blocking/test_advisory_watch_guard.py index cb8f5182..68c37918 100644 --- a/test/blocking/test_advisory_watch_guard.py +++ b/test/blocking/test_advisory_watch_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_whats_app.py b/test/blocking/test_advisory_whats_app.py index 6a67cc06..c86753e3 100644 --- a/test/blocking/test_advisory_whats_app.py +++ b/test/blocking/test_advisory_whats_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wibu.py b/test/blocking/test_advisory_wibu.py index db41e481..5cb65119 100644 --- a/test/blocking/test_advisory_wibu.py +++ b/test/blocking/test_advisory_wibu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wireshark.py b/test/blocking/test_advisory_wireshark.py index 4c9a5304..fafa2830 100644 --- a/test/blocking/test_advisory_wireshark.py +++ b/test/blocking/test_advisory_wireshark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_with_secure.py b/test/blocking/test_advisory_with_secure.py index dc93c3df..99ac6105 100644 --- a/test/blocking/test_advisory_with_secure.py +++ b/test/blocking/test_advisory_with_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wolf_ssl.py b/test/blocking/test_advisory_wolf_ssl.py index 700c2195..a1559fd1 100644 --- a/test/blocking/test_advisory_wolf_ssl.py +++ b/test/blocking/test_advisory_wolf_ssl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wolfi.py b/test/blocking/test_advisory_wolfi.py index 42b7e671..57f48b23 100644 --- a/test/blocking/test_advisory_wolfi.py +++ b/test/blocking/test_advisory_wolfi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wolfi_package.py b/test/blocking/test_advisory_wolfi_package.py index 43ec1e2a..dfeb9a39 100644 --- a/test/blocking/test_advisory_wolfi_package.py +++ b/test/blocking/test_advisory_wolfi_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wolfi_sec_fix.py b/test/blocking/test_advisory_wolfi_sec_fix.py index 21be180b..94b92ec3 100644 --- a/test/blocking/test_advisory_wolfi_sec_fix.py +++ b/test/blocking/test_advisory_wolfi_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wordfence.py b/test/blocking/test_advisory_wordfence.py index d27c2719..4c8825f2 100644 --- a/test/blocking/test_advisory_wordfence.py +++ b/test/blocking/test_advisory_wordfence.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_wrt.py b/test/blocking/test_advisory_wrt.py index 3ae7d2d2..34371b21 100644 --- a/test/blocking/test_advisory_wrt.py +++ b/test/blocking/test_advisory_wrt.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_xdb.py b/test/blocking/test_advisory_xdb.py index 0b5c6c55..f91cdeb9 100644 --- a/test/blocking/test_advisory_xdb.py +++ b/test/blocking/test_advisory_xdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_xen.py b/test/blocking/test_advisory_xen.py index aa06a339..8832a7b2 100644 --- a/test/blocking/test_advisory_xen.py +++ b/test/blocking/test_advisory_xen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_xerox.py b/test/blocking/test_advisory_xerox.py index 46ca7f6a..0c27f502 100644 --- a/test/blocking/test_advisory_xerox.py +++ b/test/blocking/test_advisory_xerox.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_xiaomi.py b/test/blocking/test_advisory_xiaomi.py index 49263f60..352813f4 100644 --- a/test/blocking/test_advisory_xiaomi.py +++ b/test/blocking/test_advisory_xiaomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_xylem.py b/test/blocking/test_advisory_xylem.py index 24fae991..0f2292fe 100644 --- a/test/blocking/test_advisory_xylem.py +++ b/test/blocking/test_advisory_xylem.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_yamaha.py b/test/blocking/test_advisory_yamaha.py index 0670ea9f..24490c09 100644 --- a/test/blocking/test_advisory_yamaha.py +++ b/test/blocking/test_advisory_yamaha.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_yokogawa_advisory.py b/test/blocking/test_advisory_yokogawa_advisory.py index 97e2c470..53fd3b1c 100644 --- a/test/blocking/test_advisory_yokogawa_advisory.py +++ b/test/blocking/test_advisory_yokogawa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_yubico.py b/test/blocking/test_advisory_yubico.py index fd87e568..3cbbb3f2 100644 --- a/test/blocking/test_advisory_yubico.py +++ b/test/blocking/test_advisory_yubico.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zdi.py b/test/blocking/test_advisory_zdi.py index c8b69c4b..b11090b9 100644 --- a/test/blocking/test_advisory_zdi.py +++ b/test/blocking/test_advisory_zdi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zdi_product.py b/test/blocking/test_advisory_zdi_product.py index f83b928e..844883fa 100644 --- a/test/blocking/test_advisory_zdi_product.py +++ b/test/blocking/test_advisory_zdi_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zdi_response.py b/test/blocking/test_advisory_zdi_response.py index 0d814548..34e6f3d9 100644 --- a/test/blocking/test_advisory_zdi_response.py +++ b/test/blocking/test_advisory_zdi_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zdi_response_vendor.py b/test/blocking/test_advisory_zdi_response_vendor.py index 17c13918..2f1cdb84 100644 --- a/test/blocking/test_advisory_zdi_response_vendor.py +++ b/test/blocking/test_advisory_zdi_response_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zdi_vendor.py b/test/blocking/test_advisory_zdi_vendor.py index 9b687dad..767e15e8 100644 --- a/test/blocking/test_advisory_zdi_vendor.py +++ b/test/blocking/test_advisory_zdi_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zebra.py b/test/blocking/test_advisory_zebra.py index acf482fd..f9c8325b 100644 --- a/test/blocking/test_advisory_zebra.py +++ b/test/blocking/test_advisory_zebra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zero_day_advisory.py b/test/blocking/test_advisory_zero_day_advisory.py index aca014d3..21ae7cc0 100644 --- a/test/blocking/test_advisory_zero_day_advisory.py +++ b/test/blocking/test_advisory_zero_day_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zero_science_advisory.py b/test/blocking/test_advisory_zero_science_advisory.py index 8aaf7d38..483b31ff 100644 --- a/test/blocking/test_advisory_zero_science_advisory.py +++ b/test/blocking/test_advisory_zero_science_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zimbra.py b/test/blocking/test_advisory_zimbra.py index f0c01440..22242b83 100644 --- a/test/blocking/test_advisory_zimbra.py +++ b/test/blocking/test_advisory_zimbra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zoom.py b/test/blocking/test_advisory_zoom.py index d6a4e174..f7aaa182 100644 --- a/test/blocking/test_advisory_zoom.py +++ b/test/blocking/test_advisory_zoom.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zscaler.py b/test/blocking/test_advisory_zscaler.py index 4cd960fe..261c8250 100644 --- a/test/blocking/test_advisory_zscaler.py +++ b/test/blocking/test_advisory_zscaler.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zulu_version.py b/test/blocking/test_advisory_zulu_version.py index feaccdad..52a3d9fd 100644 --- a/test/blocking/test_advisory_zulu_version.py +++ b/test/blocking/test_advisory_zulu_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zuso.py b/test/blocking/test_advisory_zuso.py index c05dbac8..c87113b0 100644 --- a/test/blocking/test_advisory_zuso.py +++ b/test/blocking/test_advisory_zuso.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_advisory_zyxel.py b/test/blocking/test_advisory_zyxel.py index 081453a7..ae2befa3 100644 --- a/test/blocking/test_advisory_zyxel.py +++ b/test/blocking/test_advisory_zyxel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_base_metric_v2.py b/test/blocking/test_api_base_metric_v2.py index 8db088ef..6fad1ec9 100644 --- a/test/blocking/test_api_base_metric_v2.py +++ b/test/blocking/test_api_base_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_base_metric_v3.py b/test/blocking/test_api_base_metric_v3.py index 143b2a94..8709ce88 100644 --- a/test/blocking/test_api_base_metric_v3.py +++ b/test/blocking/test_api_base_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_categorization_extended.py b/test/blocking/test_api_categorization_extended.py index 6422a412..7d00cf7e 100644 --- a/test/blocking/test_api_categorization_extended.py +++ b/test/blocking/test_api_categorization_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_client_fingerprints.py b/test/blocking/test_api_client_fingerprints.py index c4cc8246..60be7e13 100644 --- a/test/blocking/test_api_client_fingerprints.py +++ b/test/blocking/test_api_client_fingerprints.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_configurations.py b/test/blocking/test_api_configurations.py index d46b2945..efda1921 100644 --- a/test/blocking/test_api_configurations.py +++ b/test/blocking/test_api_configurations.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cpe.py b/test/blocking/test_api_cpe.py index f4060132..4fde83c9 100644 --- a/test/blocking/test_api_cpe.py +++ b/test/blocking/test_api_cpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cpe_match.py b/test/blocking/test_api_cpe_match.py index c472b257..5822f4dc 100644 --- a/test/blocking/test_api_cpe_match.py +++ b/test/blocking/test_api_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cpe_name.py b/test/blocking/test_api_cpe_name.py index fe1dfb22..3cefb7a1 100644 --- a/test/blocking/test_api_cpe_name.py +++ b/test/blocking/test_api_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cve.py b/test/blocking/test_api_cve.py index f63b310b..0657cd55 100644 --- a/test/blocking/test_api_cve.py +++ b/test/blocking/test_api_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cve_data_meta.py b/test/blocking/test_api_cve_data_meta.py index 6c8a9793..e47871f1 100644 --- a/test/blocking/test_api_cve_data_meta.py +++ b/test/blocking/test_api_cve_data_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cve_data_meta_extended.py b/test/blocking/test_api_cve_data_meta_extended.py index ceda9f1a..5959c7fa 100644 --- a/test/blocking/test_api_cve_data_meta_extended.py +++ b/test/blocking/test_api_cve_data_meta_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cve_extended.py b/test/blocking/test_api_cve_extended.py index 1764e92b..dc4ba697 100644 --- a/test/blocking/test_api_cve_extended.py +++ b/test/blocking/test_api_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cve_items.py b/test/blocking/test_api_cve_items.py index 187992e0..0f8ea620 100644 --- a/test/blocking/test_api_cve_items.py +++ b/test/blocking/test_api_cve_items.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -135,7 +135,43 @@ def make_instance(self, include_optional) -> ApiCveItems: version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.models.api/configurations.api.Configurations( diff --git a/test/blocking/test_api_cve_items_extended.py b/test/blocking/test_api_cve_items_extended.py index fa438e41..2c9a9a52 100644 --- a/test/blocking/test_api_cve_items_extended.py +++ b/test/blocking/test_api_cve_items_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cvssv2.py b/test/blocking/test_api_cvssv2.py index f9c993ad..42e6c6e2 100644 --- a/test/blocking/test_api_cvssv2.py +++ b/test/blocking/test_api_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cvssv3.py b/test/blocking/test_api_cvssv3.py index 78d2109b..3414b8ef 100644 --- a/test/blocking/test_api_cvssv3.py +++ b/test/blocking/test_api_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_cwe.py b/test/blocking/test_api_cwe.py index 794e682d..7bf0a0c0 100644 --- a/test/blocking/test_api_cwe.py +++ b/test/blocking/test_api_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_date_time.py b/test/blocking/test_api_date_time.py deleted file mode 100644 index cd16c372..00000000 --- a/test/blocking/test_api_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.api_date_time import ApiDateTime - -class TestApiDateTime(unittest.TestCase): - """ApiDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> ApiDateTime: - """Test ApiDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `ApiDateTime` - """ - model = ApiDateTime() - if include_optional: - return ApiDateTime( - var_date = '' - ) - else: - return ApiDateTime( - ) - """ - - def testApiDateTime(self): - """Test ApiDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_api_description.py b/test/blocking/test_api_description.py index f6283bbf..8b0b2ee6 100644 --- a/test/blocking/test_api_description.py +++ b/test/blocking/test_api_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_description_data.py b/test/blocking/test_api_description_data.py index 942dd5d1..5200f8b9 100644 --- a/test/blocking/test_api_description_data.py +++ b/test/blocking/test_api_description_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_epss.py b/test/blocking/test_api_epss.py index f2a11795..ec25fe65 100644 --- a/test/blocking/test_api_epss.py +++ b/test/blocking/test_api_epss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_epss_data.py b/test/blocking/test_api_epss_data.py index 0f04fda5..0d818a70 100644 --- a/test/blocking/test_api_epss_data.py +++ b/test/blocking/test_api_epss_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploit_chain.py b/test/blocking/test_api_exploit_chain.py index dfb35460..11a8c15c 100644 --- a/test/blocking/test_api_exploit_chain.py +++ b/test/blocking/test_api_exploit_chain.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploit_chain_cve.py b/test/blocking/test_api_exploit_chain_cve.py index b6ee4357..8df854f2 100644 --- a/test/blocking/test_api_exploit_chain_cve.py +++ b/test/blocking/test_api_exploit_chain_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploit_v3_result.py b/test/blocking/test_api_exploit_v3_result.py index 9287c4e8..8d995252 100644 --- a/test/blocking/test_api_exploit_v3_result.py +++ b/test/blocking/test_api_exploit_v3_result.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploits_change.py b/test/blocking/test_api_exploits_change.py index 007c3a57..b8a6278d 100644 --- a/test/blocking/test_api_exploits_change.py +++ b/test/blocking/test_api_exploits_change.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploits_changelog.py b/test/blocking/test_api_exploits_changelog.py index a7101261..ac7a5614 100644 --- a/test/blocking/test_api_exploits_changelog.py +++ b/test/blocking/test_api_exploits_changelog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -41,8 +41,8 @@ def make_instance(self, include_optional) -> ApiExploitsChangelog: change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.models.new_value.new_value(), - old_value = vulncheck_sdk.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '' ) diff --git a/test/blocking/test_api_exploits_trending.py b/test/blocking/test_api_exploits_trending.py index 42705a35..158d37fd 100644 --- a/test/blocking/test_api_exploits_trending.py +++ b/test/blocking/test_api_exploits_trending.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploits_v3_count.py b/test/blocking/test_api_exploits_v3_count.py index 190ed48d..ec3e6a5d 100644 --- a/test/blocking/test_api_exploits_v3_count.py +++ b/test/blocking/test_api_exploits_v3_count.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_exploits_v3_timeline.py b/test/blocking/test_api_exploits_v3_timeline.py index 2a749dae..56732aa9 100644 --- a/test/blocking/test_api_exploits_v3_timeline.py +++ b/test/blocking/test_api_exploits_v3_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_http_details.py b/test/blocking/test_api_http_details.py index 5e18d290..55cbb72c 100644 --- a/test/blocking/test_api_http_details.py +++ b/test/blocking/test_api_http_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_impact.py b/test/blocking/test_api_impact.py index f8f41ddc..80344fa4 100644 --- a/test/blocking/test_api_impact.py +++ b/test/blocking/test_api_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_impact_extended.py b/test/blocking/test_api_impact_extended.py index 33427978..f5a06208 100644 --- a/test/blocking/test_api_impact_extended.py +++ b/test/blocking/test_api_impact_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_initial_access.py b/test/blocking/test_api_initial_access.py index 04ce4f06..8c6e80eb 100644 --- a/test/blocking/test_api_initial_access.py +++ b/test/blocking/test_api_initial_access.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_initial_access_artifact.py b/test/blocking/test_api_initial_access_artifact.py index f72df667..07ff76e6 100644 --- a/test/blocking/test_api_initial_access_artifact.py +++ b/test/blocking/test_api_initial_access_artifact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_attack_tech.py b/test/blocking/test_api_mitre_attack_tech.py index 2e5b68cb..acfdbcd7 100644 --- a/test/blocking/test_api_mitre_attack_tech.py +++ b/test/blocking/test_api_mitre_attack_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_attack_to_cve.py b/test/blocking/test_api_mitre_attack_to_cve.py index cb5e9d0e..e4a7e200 100644 --- a/test/blocking/test_api_mitre_attack_to_cve.py +++ b/test/blocking/test_api_mitre_attack_to_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_d3fend_technique.py b/test/blocking/test_api_mitre_d3fend_technique.py index 4389c75c..e1b24a83 100644 --- a/test/blocking/test_api_mitre_d3fend_technique.py +++ b/test/blocking/test_api_mitre_d3fend_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_detection_tech.py b/test/blocking/test_api_mitre_detection_tech.py index 5e8196e8..3c7eff4e 100644 --- a/test/blocking/test_api_mitre_detection_tech.py +++ b/test/blocking/test_api_mitre_detection_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_mitigation2_d3fend_mapping.py b/test/blocking/test_api_mitre_mitigation2_d3fend_mapping.py index dac7dc77..f7f570c3 100644 --- a/test/blocking/test_api_mitre_mitigation2_d3fend_mapping.py +++ b/test/blocking/test_api_mitre_mitigation2_d3fend_mapping.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_mitre_mitigation_tech.py b/test/blocking/test_api_mitre_mitigation_tech.py index 844255ff..a3bc3db1 100644 --- a/test/blocking/test_api_mitre_mitigation_tech.py +++ b/test/blocking/test_api_mitre_mitigation_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nodes.py b/test/blocking/test_api_nodes.py index deca4906..f873fd0b 100644 --- a/test/blocking/test_api_nodes.py +++ b/test/blocking/test_api_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_normalized_exploit_v3_entry.py b/test/blocking/test_api_normalized_exploit_v3_entry.py index 62213427..ce836ad3 100644 --- a/test/blocking/test_api_normalized_exploit_v3_entry.py +++ b/test/blocking/test_api_normalized_exploit_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_normalized_report_v3_entry.py b/test/blocking/test_api_normalized_report_v3_entry.py index ad8b38cc..8966b84b 100644 --- a/test/blocking/test_api_normalized_report_v3_entry.py +++ b/test/blocking/test_api_normalized_report_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cpe_match.py b/test/blocking/test_api_nvd20_cpe_match.py index 815a7dfc..2275c652 100644 --- a/test/blocking/test_api_nvd20_cpe_match.py +++ b/test/blocking/test_api_nvd20_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cpe_name.py b/test/blocking/test_api_nvd20_cpe_name.py index e7be98a0..446f9c3a 100644 --- a/test/blocking/test_api_nvd20_cpe_name.py +++ b/test/blocking/test_api_nvd20_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cve.py b/test/blocking/test_api_nvd20_cve.py index 4d7dbb2a..3769543e 100644 --- a/test/blocking/test_api_nvd20_cve.py +++ b/test/blocking/test_api_nvd20_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cve_extended.py b/test/blocking/test_api_nvd20_cve_extended.py index 7314a3c9..7df6997c 100644 --- a/test/blocking/test_api_nvd20_cve_extended.py +++ b/test/blocking/test_api_nvd20_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cvss_data_v2.py b/test/blocking/test_api_nvd20_cvss_data_v2.py index d156aa7d..baab025f 100644 --- a/test/blocking/test_api_nvd20_cvss_data_v2.py +++ b/test/blocking/test_api_nvd20_cvss_data_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cvss_data_v3.py b/test/blocking/test_api_nvd20_cvss_data_v3.py index 4051cb8f..388beef5 100644 --- a/test/blocking/test_api_nvd20_cvss_data_v3.py +++ b/test/blocking/test_api_nvd20_cvss_data_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cvss_metric_v2.py b/test/blocking/test_api_nvd20_cvss_metric_v2.py index d3e13acd..0b25c3f6 100644 --- a/test/blocking/test_api_nvd20_cvss_metric_v2.py +++ b/test/blocking/test_api_nvd20_cvss_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cvss_metric_v3.py b/test/blocking/test_api_nvd20_cvss_metric_v3.py index c0da77fc..9d3e9913 100644 --- a/test/blocking/test_api_nvd20_cvss_metric_v3.py +++ b/test/blocking/test_api_nvd20_cvss_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_cvss_metric_v40.py b/test/blocking/test_api_nvd20_cvss_metric_v40.py index 204d1c8e..a6a753e5 100644 --- a/test/blocking/test_api_nvd20_cvss_metric_v40.py +++ b/test/blocking/test_api_nvd20_cvss_metric_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_description.py b/test/blocking/test_api_nvd20_description.py index 4625545b..6eefa589 100644 --- a/test/blocking/test_api_nvd20_description.py +++ b/test/blocking/test_api_nvd20_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_metric.py b/test/blocking/test_api_nvd20_metric.py index 36ab73be..ef276b3e 100644 --- a/test/blocking/test_api_nvd20_metric.py +++ b/test/blocking/test_api_nvd20_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_metric_extended.py b/test/blocking/test_api_nvd20_metric_extended.py index c9099853..c62abdc3 100644 --- a/test/blocking/test_api_nvd20_metric_extended.py +++ b/test/blocking/test_api_nvd20_metric_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_reference.py b/test/blocking/test_api_nvd20_reference.py index 5651f9fb..8d703de5 100644 --- a/test/blocking/test_api_nvd20_reference.py +++ b/test/blocking/test_api_nvd20_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_reference_extended.py b/test/blocking/test_api_nvd20_reference_extended.py index de62305c..e6af9614 100644 --- a/test/blocking/test_api_nvd20_reference_extended.py +++ b/test/blocking/test_api_nvd20_reference_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_temporal_associated_base_metric.py b/test/blocking/test_api_nvd20_temporal_associated_base_metric.py index fa301ced..ec5ce6cb 100644 --- a/test/blocking/test_api_nvd20_temporal_associated_base_metric.py +++ b/test/blocking/test_api_nvd20_temporal_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_temporal_cvssv2.py b/test/blocking/test_api_nvd20_temporal_cvssv2.py index e0690463..bb20f698 100644 --- a/test/blocking/test_api_nvd20_temporal_cvssv2.py +++ b/test/blocking/test_api_nvd20_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_temporal_cvssv3.py b/test/blocking/test_api_nvd20_temporal_cvssv3.py index a3f9eb7c..f7d562d9 100644 --- a/test/blocking/test_api_nvd20_temporal_cvssv3.py +++ b/test/blocking/test_api_nvd20_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_threat_associated_base_metric.py b/test/blocking/test_api_nvd20_threat_associated_base_metric.py index d347480b..c69c51ab 100644 --- a/test/blocking/test_api_nvd20_threat_associated_base_metric.py +++ b/test/blocking/test_api_nvd20_threat_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_threat_cvssv40.py b/test/blocking/test_api_nvd20_threat_cvssv40.py index f80681c4..d6b1b8ab 100644 --- a/test/blocking/test_api_nvd20_threat_cvssv40.py +++ b/test/blocking/test_api_nvd20_threat_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_vendor_comment.py b/test/blocking/test_api_nvd20_vendor_comment.py index f9079a5f..04a7ed82 100644 --- a/test/blocking/test_api_nvd20_vendor_comment.py +++ b/test/blocking/test_api_nvd20_vendor_comment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_weakness.py b/test/blocking/test_api_nvd20_weakness.py index 018210d2..c30632b5 100644 --- a/test/blocking/test_api_nvd20_weakness.py +++ b/test/blocking/test_api_nvd20_weakness.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_weakness_desc_extended.py b/test/blocking/test_api_nvd20_weakness_desc_extended.py index a2c49996..7ce3bdfa 100644 --- a/test/blocking/test_api_nvd20_weakness_desc_extended.py +++ b/test/blocking/test_api_nvd20_weakness_desc_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_nvd20_weakness_extended.py b/test/blocking/test_api_nvd20_weakness_extended.py index e8e2ef86..c7dd7174 100644 --- a/test/blocking/test_api_nvd20_weakness_extended.py +++ b/test/blocking/test_api_nvd20_weakness_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package.py b/test/blocking/test_api_oss_package.py index b5c2c63a..3b08acf5 100644 --- a/test/blocking/test_api_oss_package.py +++ b/test/blocking/test_api_oss_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package_artifacts.py b/test/blocking/test_api_oss_package_artifacts.py index 127cfda3..094635a2 100644 --- a/test/blocking/test_api_oss_package_artifacts.py +++ b/test/blocking/test_api_oss_package_artifacts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package_download_info.py b/test/blocking/test_api_oss_package_download_info.py index 4ad2a761..f74a5075 100644 --- a/test/blocking/test_api_oss_package_download_info.py +++ b/test/blocking/test_api_oss_package_download_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package_hash_info.py b/test/blocking/test_api_oss_package_hash_info.py index b72b990d..ca9483e9 100644 --- a/test/blocking/test_api_oss_package_hash_info.py +++ b/test/blocking/test_api_oss_package_hash_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package_research_attributes.py b/test/blocking/test_api_oss_package_research_attributes.py index d33eeae4..55183979 100644 --- a/test/blocking/test_api_oss_package_research_attributes.py +++ b/test/blocking/test_api_oss_package_research_attributes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_oss_package_vulnerability.py b/test/blocking/test_api_oss_package_vulnerability.py index 9550a3ed..1d51a724 100644 --- a/test/blocking/test_api_oss_package_vulnerability.py +++ b/test/blocking/test_api_oss_package_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_package.py b/test/blocking/test_api_package.py index 97ec4848..d2191378 100644 --- a/test/blocking/test_api_package.py +++ b/test/blocking/test_api_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type.py b/test/blocking/test_api_problem_type.py index 75eaa771..4c5c6b95 100644 --- a/test/blocking/test_api_problem_type.py +++ b/test/blocking/test_api_problem_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type_data.py b/test/blocking/test_api_problem_type_data.py index bb088c38..091cb895 100644 --- a/test/blocking/test_api_problem_type_data.py +++ b/test/blocking/test_api_problem_type_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type_data_extended.py b/test/blocking/test_api_problem_type_data_extended.py index 280fad4e..5e900a96 100644 --- a/test/blocking/test_api_problem_type_data_extended.py +++ b/test/blocking/test_api_problem_type_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type_description.py b/test/blocking/test_api_problem_type_description.py index b3daf68f..e95dcc43 100644 --- a/test/blocking/test_api_problem_type_description.py +++ b/test/blocking/test_api_problem_type_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type_description_extended.py b/test/blocking/test_api_problem_type_description_extended.py index 7f7f63a8..ac410b8d 100644 --- a/test/blocking/test_api_problem_type_description_extended.py +++ b/test/blocking/test_api_problem_type_description_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_problem_type_extended.py b/test/blocking/test_api_problem_type_extended.py index c7ed52e1..bf95f041 100644 --- a/test/blocking/test_api_problem_type_extended.py +++ b/test/blocking/test_api_problem_type_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_reference.py b/test/blocking/test_api_reference.py index 9eaba1d0..d26b6057 100644 --- a/test/blocking/test_api_reference.py +++ b/test/blocking/test_api_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_reference_data.py b/test/blocking/test_api_reference_data.py index 0edc7b07..88947b4d 100644 --- a/test/blocking/test_api_reference_data.py +++ b/test/blocking/test_api_reference_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_reference_data_extended.py b/test/blocking/test_api_reference_data_extended.py index 7c515c81..c208d9ac 100644 --- a/test/blocking/test_api_reference_data_extended.py +++ b/test/blocking/test_api_reference_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_references.py b/test/blocking/test_api_references.py index af31e0b2..ea744b15 100644 --- a/test/blocking/test_api_references.py +++ b/test/blocking/test_api_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_references_extended.py b/test/blocking/test_api_references_extended.py index ba705837..da42068e 100644 --- a/test/blocking/test_api_references_extended.py +++ b/test/blocking/test_api_references_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_related_attack_pattern.py b/test/blocking/test_api_related_attack_pattern.py index cd47ed12..66fefee5 100644 --- a/test/blocking/test_api_related_attack_pattern.py +++ b/test/blocking/test_api_related_attack_pattern.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_ssvc.py b/test/blocking/test_api_ssvc.py index 21b9b59b..bc44b78d 100644 --- a/test/blocking/test_api_ssvc.py +++ b/test/blocking/test_api_ssvc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_temporal_cvssv2.py b/test/blocking/test_api_temporal_cvssv2.py index c532f0e8..b4344298 100644 --- a/test/blocking/test_api_temporal_cvssv2.py +++ b/test/blocking/test_api_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_temporal_cvssv3.py b/test/blocking/test_api_temporal_cvssv3.py index ced20ed7..f8265c0b 100644 --- a/test/blocking/test_api_temporal_cvssv3.py +++ b/test/blocking/test_api_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_temporal_metric_v2.py b/test/blocking/test_api_temporal_metric_v2.py index 84b0e166..04e86a9f 100644 --- a/test/blocking/test_api_temporal_metric_v2.py +++ b/test/blocking/test_api_temporal_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_temporal_metric_v3.py b/test/blocking/test_api_temporal_metric_v3.py index 9aab433c..c2b77748 100644 --- a/test/blocking/test_api_temporal_metric_v3.py +++ b/test/blocking/test_api_temporal_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_update.py b/test/blocking/test_api_update.py index 1d42b02f..34bb8396 100644 --- a/test/blocking/test_api_update.py +++ b/test/blocking/test_api_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> ApiUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), + issued = None, os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> ApiUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ) + updated = None ) else: return ApiUpdate( diff --git a/test/blocking/test_api_vuln_check_canary.py b/test/blocking/test_api_vuln_check_canary.py index 6c1d51df..1aedcd8f 100644 --- a/test/blocking/test_api_vuln_check_canary.py +++ b/test/blocking/test_api_vuln_check_canary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_api_vulnerability_alias.py b/test/blocking/test_api_vulnerability_alias.py index be8c0c5b..c605ee1d 100644 --- a/test/blocking/test_api_vulnerability_alias.py +++ b/test/blocking/test_api_vulnerability_alias.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_endpoints_api.py b/test/blocking/test_endpoints_api.py index 5a974666..61f30788 100644 --- a/test/blocking/test_endpoints_api.py +++ b/test/blocking/test_endpoints_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_indices_api.py b/test/blocking/test_indices_api.py index a933c3a9..8dad74d2 100644 --- a/test/blocking/test_indices_api.py +++ b/test/blocking/test_indices_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_models_entitlements.py b/test/blocking/test_models_entitlements.py index 0b4aed0f..c5e13c6e 100644 --- a/test/blocking/test_models_entitlements.py +++ b/test/blocking/test_models_entitlements.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_paginate_match.py b/test/blocking/test_paginate_match.py index db81a8f0..d5d56fdc 100644 --- a/test/blocking/test_paginate_match.py +++ b/test/blocking/test_paginate_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_paginate_pagination.py b/test/blocking/test_paginate_pagination.py index 29e6849e..f6313aa1 100644 --- a/test/blocking/test_paginate_pagination.py +++ b/test/blocking/test_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_paginate_param.py b/test/blocking/test_paginate_param.py index efc21ff8..b5796dd2 100644 --- a/test/blocking/test_paginate_param.py +++ b/test/blocking/test_paginate_param.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_params_index_backup.py b/test/blocking/test_params_index_backup.py index 38e34087..6e49f5f0 100644 --- a/test/blocking/test_params_index_backup.py +++ b/test/blocking/test_params_index_backup.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_params_index_backup_list.py b/test/blocking/test_params_index_backup_list.py index f3002c25..c5b7d1d8 100644 --- a/test/blocking/test_params_index_backup_list.py +++ b/test/blocking/test_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_params_index_list.py b/test/blocking/test_params_index_list.py index 28f14eb4..d43004ce 100644 --- a/test/blocking/test_params_index_list.py +++ b/test/blocking/test_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_purl_batch_vuln_finding.py b/test/blocking/test_purl_batch_vuln_finding.py index a9d66eec..ae24ccfb 100644 --- a/test/blocking/test_purl_batch_vuln_finding.py +++ b/test/blocking/test_purl_batch_vuln_finding.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_purl_package_urljson.py b/test/blocking/test_purl_package_urljson.py index e5359e1e..3f99445f 100644 --- a/test/blocking/test_purl_package_urljson.py +++ b/test/blocking/test_purl_package_urljson.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_purl_qualifier_json.py b/test/blocking/test_purl_qualifier_json.py index 606e3477..d722624b 100644 --- a/test/blocking/test_purl_qualifier_json.py +++ b/test/blocking/test_purl_qualifier_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_purls_purl_response.py b/test/blocking/test_purls_purl_response.py index d55e3bf4..f8c7c2b6 100644 --- a/test/blocking/test_purls_purl_response.py +++ b/test/blocking/test_purls_purl_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_purls_vulnerability.py b/test/blocking/test_purls_vulnerability.py index 523b4512..93ba8a21 100644 --- a/test/blocking/test_purls_vulnerability.py +++ b/test/blocking/test_purls_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_array_params_index_backup_list.py b/test/blocking/test_render_response_array_params_index_backup_list.py index 21df2aaf..90d4afdb 100644 --- a/test/blocking/test_render_response_array_params_index_backup_list.py +++ b/test/blocking/test_render_response_array_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_array_params_index_list.py b/test/blocking/test_render_response_array_params_index_list.py index 88ca9d9f..a6ea3eac 100644 --- a/test/blocking/test_render_response_array_params_index_list.py +++ b/test/blocking/test_render_response_array_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py index 06cfd15c..5b095e3d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_a10_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py index 564d582d..a0da077b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index 91b700f4..0d042a8b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index 90f8d346..613daee2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py index 4dfc35a1..d5eeff2f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_acronis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index 04a63c48..5aba6b8c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py index 5a668eb7..0780c78c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_advantech_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py index bd9718ae..54261c85 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py index b1a8ea98..1273a346 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py index 45df2bca..0c7c8f31 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py index 7ad2dacf..db32aa33 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py index 366a9a22..51efc8b2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py index ae896e3a..31f7045a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py index a087babb..a2bfb0d8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py index 082dffdf..25ca1f89 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py index c41daa92..5a874b61 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_amd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py index 20bb0ec0..cd87790d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ami_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py index c631ca05..c06479ee 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py index ec5eea88..701486cc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py index d0f3b920..9bed68a8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py index a222988a..c09aa464 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index 0bcdf566..363bdcce 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py index b8ae5aa5..046279a7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py index 7d2da6d0..2a5214c6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index 4ac68b70..0b6623ec 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py index 1b72a040..804a3b26 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index 44127304..e3a82120 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py index f39f3104..7be9ccde 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py index 925df275..939a7e0f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 62df9ef8..36c01891 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 3a7c2b20..3a0fd969 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py index 3dc74b4e..43360967 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py index d9dfc5e1..a39a7926 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index 0727bb55..1e4227c6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index f735b8fb..da998d32 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index 459813a8..218ed67a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py index 9a16a6cb..8a6ac0b9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py index ba61128f..5865488b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index 422332a2..80df31a2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py index 6ee45bc9..ed0f564f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py index 4b920dda..9aaa69dd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py index 19594a42..1c894ede 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index d2f06aa9..9ba368c5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index 0d71b507..7189d8e7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 7e036dfc..02bd1267 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py index 74f64fff..8e854dad 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_appgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py index 7c3f96a0..1de62ff0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py index 573d2e37..efd668e5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py index 79e8f1a4..6b273b1b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_arista_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py index edde4580..fb37510c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aruba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py index d9eb2702..0ea70be1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_asrg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index ae091eae..5ec07ec5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py index a7d50c06..32860202 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py index f49d55f5..dc1cb5bb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_astra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py index c6813f86..08e54efd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_asus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py index 20c17351..2df36f90 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py index 31f1ef8d..09ced49a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py index 55913959..1a9a8a6d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_atredis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 3595f1bd..70bfea17 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py index 6a568609..28557255 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py index a5ebbf17..fe9b3ce1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py index 0eff1408..9afe6c42 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_avaya_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py index dc5c8767..b9e9a6ea 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py index 0934d79d..aaee5569 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index 71c63e24..df9e618a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py index 9190b0cd..94604589 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_aws_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py index ecb946ed..eb549138 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py index 4d695ac4..97d58b0e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_azul_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py index 00b058c1..a2f2ec52 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py index 6162db2e..3781cb17 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bandr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py index 8b74e993..70e9ebbf 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index be143317..538ceb5d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py index 21f02cc3..0b5bb98b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index 934d235b..88c06efe 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py index 31d11228..6bf83059 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py index 9314ea94..296aa6cb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index 7ab3d00a..9b2bb2fd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py index 80b5fd98..12d57e2b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_binarly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py index 55d50cec..ecf4be16 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py index 138f3e7c..230ecd0e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py index 5a42caa4..17edf578 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py index 47c2f66b..51f72f80 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py index 6fb5325e..39adcd46 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py index f89a5e9f..84c88223 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_botnet_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py index 044389a9..bb7475b5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py index 1174ce20..e68d3dae 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py index cb9c7f54..3f2ba757 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py index be959003..39b6cff6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_carrier_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py index f8cf104a..7640a38c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py index 27fcdc3f..6c7805b1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py index eee1f30f..fc4ee4c7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index 1ec929a0..5c4eba5a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py index 5057521d..219d9260 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py index 6e17f56d..88ef58c2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py index 27fb7da4..110a8175 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py index 1059a1d4..813573a8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py index 734bfb0f..8d822f01 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cesa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py index dabe8c9f..d673a53b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py index 92d6415e..48701857 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_check_point_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py index 5590a7ca..cbcc48ba 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_chrome_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py index cf551994..08776285 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ciena_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py index deb451fe..d8525786 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 5a9535a0..b67de49a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/cisa_csaf_adv.advisory.CisaCsafAdv( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py index 4b05a1bf..602f993f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index 5e66a3ea..9bc95121 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), data = [ vulncheck_sdk.models.advisory/cisco_csaf.advisory.CiscoCSAF( - csaf = vulncheck_sdk.models.csaf.csaf(), + csaf = null, cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py index b2cbba3e..4eb5e631 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py index cd982b41..94b36da7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py index 0710aa74..f4485f22 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index 8693520e..99371819 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py index 4e862c46..645e6cdd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py index b05a5c25..4b05a6cf 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py index 0445111f..2d3022c3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py index 7c0ecbfb..223283c1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py index 16aea570..4a1d1ce4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py index 6b4abf72..de8ebd55 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py index 3f9a2356..2092f36e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py index abf16583..7e240ad1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_container_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py index afa64663..6b122b19 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py index d26ee867..86eaaf53 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_crestron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py index e3f1a70c..b6d1781d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py index 2db831d1..700ad9d6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_curl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index e6582911..dacd51d5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -75,66 +75,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/cvrf.advisory.Cvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.models.advisory/vulnerability.advisory.Vulnerability( - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ], ) ] ) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index 2388d6be..30abb227 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 27596db3..18bcc569 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py index c27eb28a..e127aaa5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py index bf54fcc8..3562b712 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dassault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index c8f93f8f..9286e0f4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py index 692f7db3..a81dece5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py index 5bd65168..b10115d8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py index 141d3eb8..21d76ffa 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py index 49ddce04..20d989bc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py index 8f747bb9..e9ab8d1e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_django_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index f4d21982..43a27e2a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py index 23d969a2..e302c06f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py index 23b45c29..969219ac 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index bf6b0b11..d66215ac 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py index d853df24..5a954dd1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_drupal_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py index 70ab8584..881e897b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py index 98fe4802..b565de53 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_elastic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py index 436153bd..52004c54 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_elspec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py index 72b0808a..9b2fce0c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py index 9de203ec..5f7d74cb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index d4a7c18a..aaa9fc25 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -80,16 +80,16 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.models.discontinued.discontinued(), - eol = vulncheck_sdk.models.eol.eol(), - extended_support = vulncheck_sdk.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py index 8619a496..66a3fea2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_endress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py index e974ccbb..995f96b6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py index 617edac3..823dd63f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py index ca3baeba..68f3f810 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py index 5ba60004..2ce3a924 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_euvd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py index 0532ab3d..01c2bc15 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py index 7119a0f5..297bbab1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py index fba7ca92..25ec3f70 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index 33cb44be..dac5ffec 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py index 32046df5..b20ccc08 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index a2a47d1b..b58da2ff 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py index b5d6c765..b0d6cdee 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_festo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py index 785df3fa..09371971 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index 944b574f..facff1b6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index 727b24e8..9464d316 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py index 8dd3eb69..b3dff741 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py index 9135abe7..b514b4ab 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py index fc548904..4963d06b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py index 7570e412..438871b3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_foxit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py index dd7be7f0..bce785f6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py index abb46dd2..ef72d81f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index c2b276ff..f6e8d469 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index cd8dacfc..2a0acc63 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py index 42e1814e..d8f73a9b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py index 42f723ad..e347f03e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 63a0d26f..c52dc347 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index 9c2700e6..cd9f3ffa 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -82,13 +82,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector_string = '', ), cwes = vulncheck_sdk.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index e7c6dfd2..02fe6441 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index d78b125b..80c42b14 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py index 2493590e..6a7c9f4e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py index 1b296b73..95cb4278 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index d022213c..9a666c1d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py index 4b3d26dc..55f755a4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py index f4bbecf2..4a084829 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_glibc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py index d4b2a126..e891002d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py index fe442d26..9bc94304 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index 4078a8d3..96527da9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py index 9bf3e0b9..c83a7f53 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_grafana_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py index 1e775ad0..7f415c53 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py index 0b004f8a..ffd8a9f1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index dccb580f..6106d55e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py index b87b4183..ea569f64 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index c95eef65..e99bc7ae 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py index fd824bd6..2438ea1f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hcl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py index 2b92a4b8..a97703fd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py index 4c6f2bb8..9bb8e27f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py index 860db4d1..e669ac6f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py index 310495d8..7baa0adb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py index 9d7f0739..a88cf7db 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py index 0a4730d6..4cb373e8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index 82d949e2..c774a052 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py index eb9bc2b1..568b54dc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py index c1b0e8d6..9be676f7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py index e7a7c721..3efe5a2d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py index e50352f4..dede2069 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py index f25d3497..d0503156 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_huawei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py index f2ed12c8..c5167d93 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_iava_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index d4a86ea8..dd2ee08e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py index 60dcfb56..30d1b799 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_idemia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py index f6588271..235b5727 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_igel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py index 32aa8a9e..2be2d64a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py index 7a73b43f..e9bd561e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py index caf2b2e6..8b289382 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py index 2b05af95..2c8e6372 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py index 0a2f0ad8..238a64b9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py index 1534203e..15496638 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_istio_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py index 95f56a36..4b7156e2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index e7fd2849..af1962f8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index 5c3b7802..f21e3414 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index 490a4274..af8c1192 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py index 3bc002b1..daea9390 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py index d2de24eb..5a492d16 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index 4ff32867..9af0a2c3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py index dec94b5e..7542d9e4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py index be8b9172..6fee013d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_juniper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py index 37496d6c..09edbb56 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py index 616191db..390d919e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jvn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py index 706b4bd6..c1e4364e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py index fcb8bb41..54a22c81 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py index 7721fcd9..2ec7a86e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py index ed1f7b09..8ab2d8c9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py index bbed9008..f68df6bf 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index 762ffc1f..fece3099 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py index f68d7974..10eb700c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py index 02379748..b7cee909 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py index a68beca9..f08d86be 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py index bfb3c7ff..c3e85fac 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py index 08f1242d..5f47967c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py index 6bb623aa..f904778b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index d4fd5ce1..c62bc20a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index 66e47285..acc3ace5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py index b61d7573..697e2413 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index 6020470e..4193c533 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi malware = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index d97bfde0..5097177c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py index 182d03cb..e180a028 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py index fb28f88a..f76fbd5c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py index 1f37324c..8509fcd8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py index dbded5f0..b9918c6d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py index 5fdc08f2..833049f2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mendix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py index d793d87f..cdbae5b9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index 72894e91..a7bf2125 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -82,11 +82,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.models.issued.issued(), severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.models.updated.updated(), ), cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py index 4520c3d4..5f647e29 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index 276536e4..7c7d2f73 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/microsoft_csaf.advisory.MicrosoftCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index 17ad03eb..8c738478 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index 72c7de92..050544c9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -75,7 +75,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/microsoft_driver_block_list.advisory.MicrosoftDriverBlockList( date_added = '', file_id = '', - file_metadata = vulncheck_sdk.models.file_metadata.file_metadata(), ) + file_metadata = vulncheck_sdk.models.advisory/microsoft_file_metadata.advisory.MicrosoftFileMetadata( + file_name = '', + maximum_file_version = '', + minimum_file_version = '', + product_name = '', + sha1_hash = '', + sha256_hash = '', ), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py index a547e8fa..4e76d2a6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index 6e12e8c0..e4854874 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index b73b77a2..befb2b71 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py index 2d7313af..4f7e3074 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index db2a504e..a32240f5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index 7e7a7a28..5fd73d19 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py index 0fed34a7..0b2663f5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py index 15877f0d..6f407267 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index 57fbc5ef..7c848d4a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py index c817b47d..9c7824a0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 1b44dfc6..5c5b677f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index fce6ccf0..875b7abb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/ncsc.advisory.NCSC( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index 5428c128..cef40cca 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/ncsccve.advisory.NCSCCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py index eb1bcd77..49d355f9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py index b99a6d04..7bd4de0a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nessus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py index 4f19525d..922423ec 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_net_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py index 0f9dd498..5842d7ef 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index 53a400f9..e21c923b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py index 9dd81409..426e920e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_netgear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py index c504e96c..ffa640a3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_netskope_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py index 29f1c3ff..996c10d2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py index 94d9d66d..e51625ea 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py index 692faf7b..4a18b525 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nhs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py index 4eceec00..a8649f0e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ni_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py index e0b8b48c..98a38b1a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_node_js_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py index e7be59aa..e53abbf3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_node_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index a6bdb287..b259631a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index c3b9089c..d79f53b6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index dac544a9..66e3fe14 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py index 460d3ef6..0a32df5e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ntp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py index facb6ca1..81e212f5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index 43701171..d579af77 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py index 9b0c1f2b..ae05780d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py index cc71041d..be9d9e5b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py index 124f3f0f..54c28bbe 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py index cc635337..f2422bc5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_okta_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 7fbf6a51..55330786 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index f8640a89..dc964227 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py index 01a57cb0..e514b41c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py index a93fa543..de371c69 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index 0cc78654..7d981bfa 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index e7e9519e..545bf930 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py index f7f7756e..047c0a25 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py index a1a73ae8..a262448e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 2cff3497..15081c32 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py index fd3aa9ca..ae73de7b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 943faa11..78030275 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/oracle_cpucsaf.advisory.OracleCPUCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py index 175730e2..8b0d2c3f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi osv = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py index 7277709a..62332bbc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_otrs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index ecf6c566..617ed8b0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py index 331592c3..fe9f877f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py index 1a4d1a82..2fc4be95 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_palantir_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py index cc8c294e..7b0c2e68 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index 4b81f3a2..00a6b18e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py index 1e034a21..f0d171e0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py index 6aa07002..f4b71005 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_pega_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py index 0f02ee80..bb1317e0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py index c915e282..75509a02 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index 2146ae43..0e87a01d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index d865a463..3e0c056f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py index f867ccf1..98707b37 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index 25024e0f..4321a46e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py index d1c1a8e1..f6ea9569 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index 4e0ccd61..be2fca06 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index c8aaf317..e8a691bc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py index 70a5d1b8..2458d5c9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index 65852c3b..982e101a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py index 493538d8..218d77d2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py index 219e8c22..fd913ec6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qqid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index 0854c270..fe8c961d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py index 9eab44bf..734a3637 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py index 47a9780e..5280c149 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qualys_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py index cfd799e6..745cb7f4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py index e151f366..cf0a4b9a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 0b153e52..40ff1426 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py index d6d9d2c6..deffb29f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index b50daf6f..a3e0bc7a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py index d93df2d4..70de1499 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_revive_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index 90ddeb72..dc689b09 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/rhel_cve.advisory.RhelCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py index fb105cd2..4cd4f35d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py index 33dcda98..6fb722ca 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py index 4a6d8578..573b9d23 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 9c22cc9d..e75c489b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index ac5f53ed..a693656c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py index 141cffa0..2c5d585e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py index aac5bf2a..16f7a854 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py index e1e3c08b..78700171 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py index cc4e9414..54925216 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py index e632a85f..f1781500 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py index 48289b37..ba5c56fc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_samba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index 83acafdf..230b25b6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py index 4faab72d..db9f30bc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py index cc15a349..bca88e71 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sap_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py index b9fc926b..05e6a271 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index 16b92103..f572db35 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index b992290e..f7aeed9e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py index dd367a0f..2b515585 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py index 2ac0a76f..463edf47 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py index ee0ff4a0..2e794279 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py index dc878e8c..4f5ba9bb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py index a5152887..49004ee8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index d9593e15..309f7d72 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index 87b1fcb0..411b20a0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py index 74af8fc3..4cd1052e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index 8588e5ab..fda71ed1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py index a8c76f93..9f877ac0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sick_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index 7acd37e4..46347fa0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py index e490a216..f918c7b0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index 99599c95..309c760c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -84,7 +84,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py index cfba4209..b7c1ef75 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py index e11a6557..13270a6a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index d25fd1f1..b284d2c2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py index 0a8ecd41..ca973835 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 2100a0e7..0bfa4ab4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index db21142a..6264e74e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py index c4056fd1..0987f8d1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index a5fd00ab..194ad214 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py index eb66c84d..c696c153 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_splunk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py index 65eba054..78aa4d73 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_spring_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py index 70bec653..e8126d7b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py index f5edff30..04d7717b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py index 5d01bcdb..088d9703 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py index c6f89f8a..cd58e372 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sudo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 50a13fbe..b4b6ab82 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py index 17d5aaa5..c2389a41 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index 49cedb10..e7e411eb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index d9f63a0b..6e954dd9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py index b7d5f274..0467acf5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py index 7b10b214..cea68fdb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_synology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py index 2cf27a32..51b252d5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_syss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index 2feb8fa3..2288c249 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py index 8a1d6b2d..415745dc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py index 5facbc74..00f02eb8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py index e5c2855b..fee77c98 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py index 54c830a1..87950140 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tencent_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py index 5a027f38..1ddf8771 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_thales_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py index 69e85f09..b0e0ca3a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index e73d0350..8fb2a698 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py index 19c14709..ded85a67 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py index dc288a0a..3f2d8f1f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py index 4667cf35..7851182e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tibco_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py index 32b9145f..a4d09cbf 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py index e4d1be0c..b070c4e4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py index 7e43799c..07c7945e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index 26777cad..5e63e348 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py index 41b0398d..39ba2bb3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py index f9c1cf0e..bd24c4a3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py index 168f3840..8ea90840 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py index ff07b78f..2d22c7e9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_unify_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py index 3ce5bae3..3b3961d0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py index 12ed5aac..3de63f87 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.models.issued.issued(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi severity = '', title = '', type = '', - updated = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), ) + updated = vulncheck_sdk.models.issued.issued(), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py index b316cb5c..bb91765b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_usd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py index 60d14b72..b631818b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 20f2078c..006cd4b8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py index 6fe70344..35ec5b80 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py index e1e24ecf..c65cfec1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py index ffb6a6f6..29c08a24 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index e08bc98a..29d29cff 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/vde_advisory.advisory.VDEAdvisory( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py index f9f65323..a161c06b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_veeam_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py index 2a8079c0..21213a4b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_veritas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py index f1aa85d2..db773b8e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index 36f0441b..7d083c72 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py index 6018b8aa..3ade37ac 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index a11e0061..08d10d98 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py index e9829280..93228c3c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index f967b31f..ae4dcf2b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index c22d8e27..1c0e8e54 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py index ea23c9e2..a21bd7f7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py index 99fc8baa..418fb8f1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index 39fa0817..1286e408 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index d17bf6d9..510c5003 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py index e5b148fa..4b15d6e0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index 873e8fb3..624455c4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 2389b278..21d76c76 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index 9d2a4431..bd7b7038 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index b7030295..822c3294 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py index 21c7bebc..a37913e6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index cfe98f11..725a84c9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py index b186c57b..eeb8e37e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py index 236cf43b..ab10ccdc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wrt_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py index 7b0395a5..d15c5fdc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_xen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index 1d6b0d14..bef3bfde 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py index 9ffbdf9f..14f889c7 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py index 943fb2cd..a1d33df5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_xylem_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py index a48237a3..255b0cd1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py index 37eeef63..a7c99672 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index 205af353..37774468 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index 0212c324..d56bbb80 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py index f764901b..3072a888 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py index ace09a2f..0246b314 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py index 4f32466e..2bf00f92 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py index 524217d8..e217c82a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zoom_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index 3d7924ec..b7628057 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py index e63dfa41..ce2e0714 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zuso_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index ac156523..2d977b91 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index ec17eb1f..974a9f54 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py index 8228f0ae..b6f27155 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -172,7 +172,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.models.api/configurations.api.Configurations( diff --git a/test/blocking/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py index ac2ef9ca..17427015 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_cwe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py index 65409581..cbbcb4d9 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_epss_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py index 09dbd9f0..c0cc4448 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index ce86e530..d8632658 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -81,7 +81,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE ransomware_families = 56, threat_actors = 56, ), date_added = '', - epss = vulncheck_sdk.models.epss.epss(), + epss = vulncheck_sdk.models.api/epss.api.EPSS( + epss_percentile = 1.337, + epss_score = 1.337, + last_modified = '', ), exploits = [ vulncheck_sdk.models.api/normalized_exploit_v3_entry.api.NormalizedExploitV3Entry( clone_ssh_url = '', diff --git a/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index e48e7cef..de6cd636 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -78,8 +78,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.models.new_value.new_value(), - old_value = vulncheck_sdk.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '', ) ] diff --git a/test/blocking/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py index 44b03fd7..9b9330d4 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_initial_access_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py index da8aca41..a5926a91 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py index 8aa1a09e..0cf3b60f 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index a0571fb4..9d272367 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index 6d451479..b45041c8 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py index c0b4613e..0482f544 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_oss_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py index b6fc11e4..22465bf5 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.models.issued.issued(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU severity = '', title = '', type = '', - updated = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), ) + updated = vulncheck_sdk.models.issued.issued(), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 81b94e31..54d817b3 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py index 985a2dd1..498b3e06 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index f1f53ffb..11370ba7 100644 --- a/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py b/test/blocking/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py index d9c31733..abb0968b 100644 --- a/test/blocking/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_array_string_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py b/test/blocking/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py index 9ee216a3..02cd0330 100644 --- a/test/blocking/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index f8bd951e..563689f0 100644 --- a/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -38,7 +38,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control return RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata( benchmark = 1.337, meta = vulncheck_sdk.models.v3controllers/purl_response_metadata.v3controllers.PurlResponseMetadata( - purl_struct = vulncheck_sdk.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), timestamp = '', total_documents = 56, ), data = vulncheck_sdk.models.v3controllers/purl_response_data.v3controllers.PurlResponseData( diff --git a/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index 8c80a1f0..4b46d3be 100644 --- a/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -46,7 +46,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control '' ], purl = '', - purl_struct = vulncheck_sdk.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), research_attributes = vulncheck_sdk.models.api/oss_package_research_attributes.api.OSSPackageResearchAttributes( abandoned = True, eol = True, diff --git a/test/aio/test_advisory_status.py b/test/blocking/test_search_error_response.py similarity index 52% rename from test/aio/test_advisory_status.py rename to test/blocking/test_search_error_response.py index 78ae9f56..2274d700 100644 --- a/test/aio/test_advisory_status.py +++ b/test/blocking/test_search_error_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,10 @@ import unittest -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus +from vulncheck_sdk.models.search_error_response import SearchErrorResponse -class TestAdvisoryStatus(unittest.TestCase): - """AdvisoryStatus unit test stubs""" +class TestSearchErrorResponse(unittest.TestCase): + """SearchErrorResponse unit test stubs""" def setUp(self): pass @@ -26,28 +26,28 @@ def setUp(self): def tearDown(self): pass - def make_instance(self, include_optional) -> AdvisoryStatus: - """Test AdvisoryStatus + def make_instance(self, include_optional) -> SearchErrorResponse: + """Test SearchErrorResponse include_optional is a boolean, when False only required params are included, when True both required and optional params are included """ - # uncomment below to create an instance of `AdvisoryStatus` + # uncomment below to create an instance of `SearchErrorResponse` """ - model = AdvisoryStatus() + model = SearchErrorResponse() if include_optional: - return AdvisoryStatus( - product_id = [ + return SearchErrorResponse( + error = True, + errors = [ '' - ], - type = '' + ] ) else: - return AdvisoryStatus( + return SearchErrorResponse( ) """ - def testAdvisoryStatus(self): - """Test AdvisoryStatus""" + def testSearchErrorResponse(self): + """Test SearchErrorResponse""" # inst_req_only = self.make_instance(include_optional=False) # inst_req_and_optional = self.make_instance(include_optional=True) diff --git a/test/blocking/test_search_v4_advisory_meta.py b/test/blocking/test_search_v4_advisory_meta.py new file mode 100644 index 00000000..6bc75923 --- /dev/null +++ b/test/blocking/test_search_v4_advisory_meta.py @@ -0,0 +1,58 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.search_v4_advisory_meta import SearchV4AdvisoryMeta + +class TestSearchV4AdvisoryMeta(unittest.TestCase): + """SearchV4AdvisoryMeta unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4AdvisoryMeta: + """Test SearchV4AdvisoryMeta + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4AdvisoryMeta` + """ + model = SearchV4AdvisoryMeta() + if include_optional: + return SearchV4AdvisoryMeta( + cursor = '', + filtered = 56, + limit = 56, + next_cursor = '', + page = 56, + pages = 56, + total = 56 + ) + else: + return SearchV4AdvisoryMeta( + ) + """ + + def testSearchV4AdvisoryMeta(self): + """Test SearchV4AdvisoryMeta""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_search_v4_advisory_return_value.py b/test/blocking/test_search_v4_advisory_return_value.py new file mode 100644 index 00000000..ae93dcc7 --- /dev/null +++ b/test/blocking/test_search_v4_advisory_return_value.py @@ -0,0 +1,233 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue + +class TestSearchV4AdvisoryReturnValue(unittest.TestCase): + """SearchV4AdvisoryReturnValue unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4AdvisoryReturnValue: + """Test SearchV4AdvisoryReturnValue + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4AdvisoryReturnValue` + """ + model = SearchV4AdvisoryReturnValue() + if include_optional: + return SearchV4AdvisoryReturnValue( + meta = vulncheck_sdk.models.search/v4_advisory_meta.search.V4AdvisoryMeta( + cursor = '', + filtered = 56, + limit = 56, + next_cursor = '', + page = 56, + pages = 56, + total = 56, ), + data = [ + vulncheck_sdk.models.advisory/mitre_cve_list_v5_ref.advisory.MitreCVEListV5Ref( + containers = vulncheck_sdk.models.advisory/m_containers.advisory.MContainers( + adp = [ + vulncheck_sdk.models.advisory/adp_container.advisory.ADPContainer( + affected = [ + vulncheck_sdk.models.advisory/m_affected.advisory.MAffected( + collection_url = '', + cpes = [ + '' + ], + default_status = '', + package_name = '', + package_url = '', + platforms = [ + '' + ], + product = '', + repo = '', + vendor = '', + versions = [ + vulncheck_sdk.models.advisory/m_version.advisory.MVersion( + less_than = '', + less_than_or_equal = '', + status = '', + version = '', + version_type = '', ) + ], ) + ], + date_public = '', + descriptions = [ + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( + lang = '', + value = '', ) + ], + impacts = [ + vulncheck_sdk.models.advisory/impact.advisory.Impact( + capec_id = '', ) + ], + metrics = [ + vulncheck_sdk.models.advisory/metric.advisory.Metric( + cvss_v2_0 = vulncheck_sdk.models.advisory/m_cvss_v20.advisory.MCvssV20( + access_vector = '', + attack_complexity = '', + authentication = '', + availability_impact = '', + base_score = 1.337, + confidentiality_impact = '', + integrity_impact = '', + vector_string = '', + version = '', ), + cvss_v3_0 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( + attack_complexity = '', + attack_vector = '', + availability_impact = '', + base_score = 1.337, + base_severity = '', + confidentiality_impact = '', + integrity_impact = '', + privileges_required = '', + scope = '', + user_interaction = '', + vector_string = '', + version = '', ), + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + attack_complexity = '', + attack_vector = '', + availability_impact = '', + base_score = 1.337, + base_severity = '', + confidentiality_impact = '', + integrity_impact = '', + privileges_required = '', + scope = '', + user_interaction = '', + vector_string = '', + version = '', ), + cvss_v4_0 = vulncheck_sdk.models.advisory/m_cvss_v40.advisory.MCvssV40( + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + automatable = '', + base_score = 1.337, + base_severity = '', + privileges_required = '', + provider_urgency = '', + recovery = '', + safety = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), + format = '', + other = vulncheck_sdk.models.advisory/metrics_other.advisory.MetricsOther( + content = vulncheck_sdk.models.content.content(), + type = '', ), + scenarios = [ + vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + lang = '', + value = '', ) + ], ) + ], + problem_types = [ + vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() + ], + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), + references = [ + vulncheck_sdk.models.advisory/m_reference.advisory.MReference( + name = '', + tags = [ + '' + ], + url = '', ) + ], + tags = [ + '' + ], + title = '', ) + ], + cna = vulncheck_sdk.models.advisory/m_cna.advisory.MCna( + cpe_applicability = [ + vulncheck_sdk.models.advisory/mcpe_applicability.advisory.MCPEApplicability( + negate = True, + nodes = [ + vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( + cpe_match = [ + vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + criteria = '', + match_criteria_id = '', + version_end_excluding = '', + version_end_including = '', + version_start_excluding = '', + version_start_including = '', + vulnerable = True, ) + ], + negate = True, + operator = '', ) + ], + operator = '', ) + ], + credits = [ + vulncheck_sdk.models.advisory/credit.advisory.Credit( + lang = '', + type = '', + value = '', ) + ], + timeline = [ + vulncheck_sdk.models.advisory/timeline.advisory.Timeline( + lang = '', + time = '', + value = '', ) + ], + title = '', ), ), + cve_metadata = vulncheck_sdk.models.advisory/m_cve_metadata.advisory.MCveMetadata( + assigner_org_id = '', + assigner_short_name = '', + cve_id = '', + date_published = '', + date_reserved = '', + date_updated = '', + state = '', ), + data_type = '', + data_version = '', ) + ] + ) + else: + return SearchV4AdvisoryReturnValue( + ) + """ + + def testSearchV4AdvisoryReturnValue(self): + """Test SearchV4AdvisoryReturnValue""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/aio/test_advisory_cwe_node.py b/test/blocking/test_search_v4_feed_item.py similarity index 56% rename from test/aio/test_advisory_cwe_node.py rename to test/blocking/test_search_v4_feed_item.py index 7a5b09d5..d4a7e75e 100644 --- a/test/aio/test_advisory_cwe_node.py +++ b/test/blocking/test_search_v4_feed_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,10 @@ import unittest -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode +from vulncheck_sdk.models.search_v4_feed_item import SearchV4FeedItem -class TestAdvisoryCWENode(unittest.TestCase): - """AdvisoryCWENode unit test stubs""" +class TestSearchV4FeedItem(unittest.TestCase): + """SearchV4FeedItem unit test stubs""" def setUp(self): pass @@ -26,28 +26,27 @@ def setUp(self): def tearDown(self): pass - def make_instance(self, include_optional) -> AdvisoryCWENode: - """Test AdvisoryCWENode + def make_instance(self, include_optional) -> SearchV4FeedItem: + """Test SearchV4FeedItem include_optional is a boolean, when False only required params are included, when True both required and optional params are included """ - # uncomment below to create an instance of `AdvisoryCWENode` + # uncomment below to create an instance of `SearchV4FeedItem` """ - model = AdvisoryCWENode() + model = SearchV4FeedItem() if include_optional: - return AdvisoryCWENode( - cweid = '', + return SearchV4FeedItem( description = '', - id = '', + href = '', name = '' ) else: - return AdvisoryCWENode( + return SearchV4FeedItem( ) """ - def testAdvisoryCWENode(self): - """Test AdvisoryCWENode""" + def testSearchV4FeedItem(self): + """Test SearchV4FeedItem""" # inst_req_only = self.make_instance(include_optional=False) # inst_req_and_optional = self.make_instance(include_optional=True) diff --git a/test/blocking/test_search_v4_list_feed_return_value.py b/test/blocking/test_search_v4_list_feed_return_value.py new file mode 100644 index 00000000..322edbfa --- /dev/null +++ b/test/blocking/test_search_v4_list_feed_return_value.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest + +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue + +class TestSearchV4ListFeedReturnValue(unittest.TestCase): + """SearchV4ListFeedReturnValue unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional) -> SearchV4ListFeedReturnValue: + """Test SearchV4ListFeedReturnValue + include_optional is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `SearchV4ListFeedReturnValue` + """ + model = SearchV4ListFeedReturnValue() + if include_optional: + return SearchV4ListFeedReturnValue( + data = [ + vulncheck_sdk.models.search/v4_feed_item.search.V4FeedItem( + description = '', + href = '', + name = '', ) + ] + ) + else: + return SearchV4ListFeedReturnValue( + ) + """ + + def testSearchV4ListFeedReturnValue(self): + """Test SearchV4ListFeedReturnValue""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/test/blocking/test_v3controllers_backup_response_metadata.py b/test/blocking/test_v3controllers_backup_response_metadata.py index 14b17d57..9d1acfd7 100644 --- a/test/blocking/test_v3controllers_backup_response_metadata.py +++ b/test/blocking/test_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_v3controllers_purl_response_data.py b/test/blocking/test_v3controllers_purl_response_data.py index 113b6065..3145bf8d 100644 --- a/test/blocking/test_v3controllers_purl_response_data.py +++ b/test/blocking/test_v3controllers_purl_response_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_v3controllers_purl_response_metadata.py b/test/blocking/test_v3controllers_purl_response_metadata.py index f1482a00..cd45ac86 100644 --- a/test/blocking/test_v3controllers_purl_response_metadata.py +++ b/test/blocking/test_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_v3controllers_purls_response_metadata.py b/test/blocking/test_v3controllers_purls_response_metadata.py index 165b8f33..674f81cb 100644 --- a/test/blocking/test_v3controllers_purls_response_metadata.py +++ b/test/blocking/test_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/test/blocking/test_v3controllers_response_metadata.py b/test/blocking/test_v3controllers_response_metadata.py index d25529ba..61ae8f30 100644 --- a/test/blocking/test_v3controllers_response_metadata.py +++ b/test/blocking/test_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/vulncheck_sdk/__init__.py b/vulncheck_sdk/__init__.py index 244a785d..16f523b8 100644 --- a/vulncheck_sdk/__init__.py +++ b/vulncheck_sdk/__init__.py @@ -5,9 +5,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,11 @@ """ # noqa: E501 -__version__ = "0.0.41" +__version__ = "0.0.42" # Define package exports __all__ = [ + "AdvisoryApi", "EndpointsApi", "IndicesApi", "ApiResponse", @@ -176,13 +177,11 @@ "AdvisoryCVEDetail", "AdvisoryCVEDetailsLink", "AdvisoryCVEReference", - "AdvisoryCVRFReference", "AdvisoryCVSS", "AdvisoryCVSSV2", "AdvisoryCVSSV3", "AdvisoryCVSSV40", "AdvisoryCVSSV40Threat", - "AdvisoryCWENode", "AdvisoryCanvasExploit", "AdvisoryCapec", "AdvisoryCarestreamAdvisory", @@ -242,7 +241,6 @@ "AdvisoryDanFossCVEDetails", "AdvisoryDanfoss", "AdvisoryDassault", - "AdvisoryDateTime", "AdvisoryDebianCVE", "AdvisoryDebianSecurityAdvisory", "AdvisoryDell", @@ -252,9 +250,7 @@ "AdvisoryDistroVersion", "AdvisoryDjango", "AdvisoryDocumentMetadata", - "AdvisoryDocumentNote", "AdvisoryDocumentPublisher", - "AdvisoryDocumentTracking", "AdvisoryDotCMS", "AdvisoryDragosAdvisory", "AdvisoryDraytek", @@ -369,7 +365,6 @@ "AdvisoryIpIntelRecord", "AdvisoryIsraeliAlert", "AdvisoryIsraeliVulnerability", - "AdvisoryIssued", "AdvisoryIstio", "AdvisoryIvanti", "AdvisoryIvantiRSS", @@ -550,7 +545,6 @@ "AdvisoryProduct", "AdvisoryProductBranch", "AdvisoryProductSpecificDetail", - "AdvisoryProductTree", "AdvisoryProductsAffected", "AdvisoryProgress", "AdvisoryProofpoint", @@ -580,12 +574,10 @@ "AdvisoryRedhatCVE", "AdvisoryReference", "AdvisoryRelatedRule", - "AdvisoryRelationship", "AdvisoryRemediationData", "AdvisoryRenesas", "AdvisoryReportedExploit", "AdvisoryRestartData", - "AdvisoryRevision", "AdvisoryRevisionHistory", "AdvisoryRevive", "AdvisoryRhelCVE", @@ -619,7 +611,6 @@ "AdvisorySchneiderCVE", "AdvisorySchneiderElectricAdvisory", "AdvisorySchutzwerk", - "AdvisoryScoreSet", "AdvisorySecFix", "AdvisorySecurityBulletin", "AdvisorySecurityLab", @@ -671,7 +662,6 @@ "AdvisorySplunk", "AdvisorySplunkProduct", "AdvisorySpring", - "AdvisoryStatus", "AdvisoryStormshield", "AdvisoryStrykerAdvisory", "AdvisorySudo", @@ -693,7 +683,6 @@ "AdvisoryThales", "AdvisoryTheMissingLink", "AdvisoryThermoFisher", - "AdvisoryThreat", "AdvisoryThreatActorWithExternalObjects", "AdvisoryThreatData", "AdvisoryTibco", @@ -714,7 +703,6 @@ "AdvisoryUnify", "AdvisoryUnisoc", "AdvisoryUpdate", - "AdvisoryUpdated", "AdvisoryV3AcceptanceLevel", "AdvisoryVCCPEDictionary", "AdvisoryVCVulnerableCPEs", @@ -736,7 +724,6 @@ "AdvisoryVulnCheckConfig", "AdvisoryVulnCheckKEV", "AdvisoryVulnCheckPackage", - "AdvisoryVulnerability", "AdvisoryVulnerableDebianPackage", "AdvisoryVulnerableProduct", "AdvisoryVulnrichment", @@ -796,7 +783,6 @@ "ApiConfigurations", "ApiCveItems", "ApiCveItemsExtended", - "ApiDateTime", "ApiDescription", "ApiDescriptionData", "ApiEPSS", @@ -1351,6 +1337,11 @@ "RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata", "RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata", "RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata", + "SearchErrorResponse", + "SearchV4AdvisoryMeta", + "SearchV4AdvisoryReturnValue", + "SearchV4FeedItem", + "SearchV4ListFeedReturnValue", "V3controllersBackupResponseMetadata", "V3controllersPurlResponseData", "V3controllersPurlResponseMetadata", @@ -1359,6 +1350,7 @@ ] # import apis into sdk package +from vulncheck_sdk.api.advisory_api import AdvisoryApi as AdvisoryApi from vulncheck_sdk.api.endpoints_api import EndpointsApi as EndpointsApi from vulncheck_sdk.api.indices_api import IndicesApi as IndicesApi @@ -1520,13 +1512,11 @@ from vulncheck_sdk.models.advisory_cve_detail import AdvisoryCVEDetail as AdvisoryCVEDetail from vulncheck_sdk.models.advisory_cve_details_link import AdvisoryCVEDetailsLink as AdvisoryCVEDetailsLink from vulncheck_sdk.models.advisory_cve_reference import AdvisoryCVEReference as AdvisoryCVEReference -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference as AdvisoryCVRFReference from vulncheck_sdk.models.advisory_cvss import AdvisoryCVSS as AdvisoryCVSS from vulncheck_sdk.models.advisory_cvssv2 import AdvisoryCVSSV2 as AdvisoryCVSSV2 from vulncheck_sdk.models.advisory_cvssv3 import AdvisoryCVSSV3 as AdvisoryCVSSV3 from vulncheck_sdk.models.advisory_cvssv40 import AdvisoryCVSSV40 as AdvisoryCVSSV40 from vulncheck_sdk.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat as AdvisoryCVSSV40Threat -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode as AdvisoryCWENode from vulncheck_sdk.models.advisory_canvas_exploit import AdvisoryCanvasExploit as AdvisoryCanvasExploit from vulncheck_sdk.models.advisory_capec import AdvisoryCapec as AdvisoryCapec from vulncheck_sdk.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory as AdvisoryCarestreamAdvisory @@ -1586,7 +1576,6 @@ from vulncheck_sdk.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails as AdvisoryDanFossCVEDetails from vulncheck_sdk.models.advisory_danfoss import AdvisoryDanfoss as AdvisoryDanfoss from vulncheck_sdk.models.advisory_dassault import AdvisoryDassault as AdvisoryDassault -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime as AdvisoryDateTime from vulncheck_sdk.models.advisory_debian_cve import AdvisoryDebianCVE as AdvisoryDebianCVE from vulncheck_sdk.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory as AdvisoryDebianSecurityAdvisory from vulncheck_sdk.models.advisory_dell import AdvisoryDell as AdvisoryDell @@ -1596,9 +1585,7 @@ from vulncheck_sdk.models.advisory_distro_version import AdvisoryDistroVersion as AdvisoryDistroVersion from vulncheck_sdk.models.advisory_django import AdvisoryDjango as AdvisoryDjango from vulncheck_sdk.models.advisory_document_metadata import AdvisoryDocumentMetadata as AdvisoryDocumentMetadata -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote as AdvisoryDocumentNote from vulncheck_sdk.models.advisory_document_publisher import AdvisoryDocumentPublisher as AdvisoryDocumentPublisher -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking as AdvisoryDocumentTracking from vulncheck_sdk.models.advisory_dot_cms import AdvisoryDotCMS as AdvisoryDotCMS from vulncheck_sdk.models.advisory_dragos_advisory import AdvisoryDragosAdvisory as AdvisoryDragosAdvisory from vulncheck_sdk.models.advisory_draytek import AdvisoryDraytek as AdvisoryDraytek @@ -1713,7 +1700,6 @@ from vulncheck_sdk.models.advisory_ip_intel_record import AdvisoryIpIntelRecord as AdvisoryIpIntelRecord from vulncheck_sdk.models.advisory_israeli_alert import AdvisoryIsraeliAlert as AdvisoryIsraeliAlert from vulncheck_sdk.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability as AdvisoryIsraeliVulnerability -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued as AdvisoryIssued from vulncheck_sdk.models.advisory_istio import AdvisoryIstio as AdvisoryIstio from vulncheck_sdk.models.advisory_ivanti import AdvisoryIvanti as AdvisoryIvanti from vulncheck_sdk.models.advisory_ivanti_rss import AdvisoryIvantiRSS as AdvisoryIvantiRSS @@ -1894,7 +1880,6 @@ from vulncheck_sdk.models.advisory_product import AdvisoryProduct as AdvisoryProduct from vulncheck_sdk.models.advisory_product_branch import AdvisoryProductBranch as AdvisoryProductBranch from vulncheck_sdk.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail as AdvisoryProductSpecificDetail -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree as AdvisoryProductTree from vulncheck_sdk.models.advisory_products_affected import AdvisoryProductsAffected as AdvisoryProductsAffected from vulncheck_sdk.models.advisory_progress import AdvisoryProgress as AdvisoryProgress from vulncheck_sdk.models.advisory_proofpoint import AdvisoryProofpoint as AdvisoryProofpoint @@ -1924,12 +1909,10 @@ from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE as AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference as AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule as AdvisoryRelatedRule -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship as AdvisoryRelationship from vulncheck_sdk.models.advisory_remediation_data import AdvisoryRemediationData as AdvisoryRemediationData from vulncheck_sdk.models.advisory_renesas import AdvisoryRenesas as AdvisoryRenesas from vulncheck_sdk.models.advisory_reported_exploit import AdvisoryReportedExploit as AdvisoryReportedExploit from vulncheck_sdk.models.advisory_restart_data import AdvisoryRestartData as AdvisoryRestartData -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision as AdvisoryRevision from vulncheck_sdk.models.advisory_revision_history import AdvisoryRevisionHistory as AdvisoryRevisionHistory from vulncheck_sdk.models.advisory_revive import AdvisoryRevive as AdvisoryRevive from vulncheck_sdk.models.advisory_rhel_cve import AdvisoryRhelCVE as AdvisoryRhelCVE @@ -1963,7 +1946,6 @@ from vulncheck_sdk.models.advisory_schneider_cve import AdvisorySchneiderCVE as AdvisorySchneiderCVE from vulncheck_sdk.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory as AdvisorySchneiderElectricAdvisory from vulncheck_sdk.models.advisory_schutzwerk import AdvisorySchutzwerk as AdvisorySchutzwerk -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet as AdvisoryScoreSet from vulncheck_sdk.models.advisory_sec_fix import AdvisorySecFix as AdvisorySecFix from vulncheck_sdk.models.advisory_security_bulletin import AdvisorySecurityBulletin as AdvisorySecurityBulletin from vulncheck_sdk.models.advisory_security_lab import AdvisorySecurityLab as AdvisorySecurityLab @@ -2015,7 +1997,6 @@ from vulncheck_sdk.models.advisory_splunk import AdvisorySplunk as AdvisorySplunk from vulncheck_sdk.models.advisory_splunk_product import AdvisorySplunkProduct as AdvisorySplunkProduct from vulncheck_sdk.models.advisory_spring import AdvisorySpring as AdvisorySpring -from vulncheck_sdk.models.advisory_status import AdvisoryStatus as AdvisoryStatus from vulncheck_sdk.models.advisory_stormshield import AdvisoryStormshield as AdvisoryStormshield from vulncheck_sdk.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory as AdvisoryStrykerAdvisory from vulncheck_sdk.models.advisory_sudo import AdvisorySudo as AdvisorySudo @@ -2037,7 +2018,6 @@ from vulncheck_sdk.models.advisory_thales import AdvisoryThales as AdvisoryThales from vulncheck_sdk.models.advisory_the_missing_link import AdvisoryTheMissingLink as AdvisoryTheMissingLink from vulncheck_sdk.models.advisory_thermo_fisher import AdvisoryThermoFisher as AdvisoryThermoFisher -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat as AdvisoryThreat from vulncheck_sdk.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects as AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.models.advisory_threat_data import AdvisoryThreatData as AdvisoryThreatData from vulncheck_sdk.models.advisory_tibco import AdvisoryTibco as AdvisoryTibco @@ -2058,7 +2038,6 @@ from vulncheck_sdk.models.advisory_unify import AdvisoryUnify as AdvisoryUnify from vulncheck_sdk.models.advisory_unisoc import AdvisoryUnisoc as AdvisoryUnisoc from vulncheck_sdk.models.advisory_update import AdvisoryUpdate as AdvisoryUpdate -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated as AdvisoryUpdated from vulncheck_sdk.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel as AdvisoryV3AcceptanceLevel from vulncheck_sdk.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary as AdvisoryVCCPEDictionary from vulncheck_sdk.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs as AdvisoryVCVulnerableCPEs @@ -2080,7 +2059,6 @@ from vulncheck_sdk.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig as AdvisoryVulnCheckConfig from vulncheck_sdk.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV as AdvisoryVulnCheckKEV from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage as AdvisoryVulnCheckPackage -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability as AdvisoryVulnerability from vulncheck_sdk.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage as AdvisoryVulnerableDebianPackage from vulncheck_sdk.models.advisory_vulnerable_product import AdvisoryVulnerableProduct as AdvisoryVulnerableProduct from vulncheck_sdk.models.advisory_vulnrichment import AdvisoryVulnrichment as AdvisoryVulnrichment @@ -2140,7 +2118,6 @@ from vulncheck_sdk.models.api_configurations import ApiConfigurations as ApiConfigurations from vulncheck_sdk.models.api_cve_items import ApiCveItems as ApiCveItems from vulncheck_sdk.models.api_cve_items_extended import ApiCveItemsExtended as ApiCveItemsExtended -from vulncheck_sdk.models.api_date_time import ApiDateTime as ApiDateTime from vulncheck_sdk.models.api_description import ApiDescription as ApiDescription from vulncheck_sdk.models.api_description_data import ApiDescriptionData as ApiDescriptionData from vulncheck_sdk.models.api_epss import ApiEPSS as ApiEPSS @@ -2695,6 +2672,11 @@ from vulncheck_sdk.models.render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata import RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata as RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata import RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata as RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata import RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata as RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata +from vulncheck_sdk.models.search_error_response import SearchErrorResponse as SearchErrorResponse +from vulncheck_sdk.models.search_v4_advisory_meta import SearchV4AdvisoryMeta as SearchV4AdvisoryMeta +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue as SearchV4AdvisoryReturnValue +from vulncheck_sdk.models.search_v4_feed_item import SearchV4FeedItem as SearchV4FeedItem +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue as SearchV4ListFeedReturnValue from vulncheck_sdk.models.v3controllers_backup_response_metadata import V3controllersBackupResponseMetadata as V3controllersBackupResponseMetadata from vulncheck_sdk.models.v3controllers_purl_response_data import V3controllersPurlResponseData as V3controllersPurlResponseData from vulncheck_sdk.models.v3controllers_purl_response_metadata import V3controllersPurlResponseMetadata as V3controllersPurlResponseMetadata diff --git a/vulncheck_sdk/aio/__init__.py b/vulncheck_sdk/aio/__init__.py index f05ccba1..4d4f7101 100644 --- a/vulncheck_sdk/aio/__init__.py +++ b/vulncheck_sdk/aio/__init__.py @@ -5,9 +5,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -15,10 +15,11 @@ """ # noqa: E501 -__version__ = "0.0.41" +__version__ = "0.0.42" # Define package exports __all__ = [ + "AdvisoryApi", "EndpointsApi", "IndicesApi", "ApiResponse", @@ -176,13 +177,11 @@ "AdvisoryCVEDetail", "AdvisoryCVEDetailsLink", "AdvisoryCVEReference", - "AdvisoryCVRFReference", "AdvisoryCVSS", "AdvisoryCVSSV2", "AdvisoryCVSSV3", "AdvisoryCVSSV40", "AdvisoryCVSSV40Threat", - "AdvisoryCWENode", "AdvisoryCanvasExploit", "AdvisoryCapec", "AdvisoryCarestreamAdvisory", @@ -242,7 +241,6 @@ "AdvisoryDanFossCVEDetails", "AdvisoryDanfoss", "AdvisoryDassault", - "AdvisoryDateTime", "AdvisoryDebianCVE", "AdvisoryDebianSecurityAdvisory", "AdvisoryDell", @@ -252,9 +250,7 @@ "AdvisoryDistroVersion", "AdvisoryDjango", "AdvisoryDocumentMetadata", - "AdvisoryDocumentNote", "AdvisoryDocumentPublisher", - "AdvisoryDocumentTracking", "AdvisoryDotCMS", "AdvisoryDragosAdvisory", "AdvisoryDraytek", @@ -369,7 +365,6 @@ "AdvisoryIpIntelRecord", "AdvisoryIsraeliAlert", "AdvisoryIsraeliVulnerability", - "AdvisoryIssued", "AdvisoryIstio", "AdvisoryIvanti", "AdvisoryIvantiRSS", @@ -550,7 +545,6 @@ "AdvisoryProduct", "AdvisoryProductBranch", "AdvisoryProductSpecificDetail", - "AdvisoryProductTree", "AdvisoryProductsAffected", "AdvisoryProgress", "AdvisoryProofpoint", @@ -580,12 +574,10 @@ "AdvisoryRedhatCVE", "AdvisoryReference", "AdvisoryRelatedRule", - "AdvisoryRelationship", "AdvisoryRemediationData", "AdvisoryRenesas", "AdvisoryReportedExploit", "AdvisoryRestartData", - "AdvisoryRevision", "AdvisoryRevisionHistory", "AdvisoryRevive", "AdvisoryRhelCVE", @@ -619,7 +611,6 @@ "AdvisorySchneiderCVE", "AdvisorySchneiderElectricAdvisory", "AdvisorySchutzwerk", - "AdvisoryScoreSet", "AdvisorySecFix", "AdvisorySecurityBulletin", "AdvisorySecurityLab", @@ -671,7 +662,6 @@ "AdvisorySplunk", "AdvisorySplunkProduct", "AdvisorySpring", - "AdvisoryStatus", "AdvisoryStormshield", "AdvisoryStrykerAdvisory", "AdvisorySudo", @@ -693,7 +683,6 @@ "AdvisoryThales", "AdvisoryTheMissingLink", "AdvisoryThermoFisher", - "AdvisoryThreat", "AdvisoryThreatActorWithExternalObjects", "AdvisoryThreatData", "AdvisoryTibco", @@ -714,7 +703,6 @@ "AdvisoryUnify", "AdvisoryUnisoc", "AdvisoryUpdate", - "AdvisoryUpdated", "AdvisoryV3AcceptanceLevel", "AdvisoryVCCPEDictionary", "AdvisoryVCVulnerableCPEs", @@ -736,7 +724,6 @@ "AdvisoryVulnCheckConfig", "AdvisoryVulnCheckKEV", "AdvisoryVulnCheckPackage", - "AdvisoryVulnerability", "AdvisoryVulnerableDebianPackage", "AdvisoryVulnerableProduct", "AdvisoryVulnrichment", @@ -796,7 +783,6 @@ "ApiConfigurations", "ApiCveItems", "ApiCveItemsExtended", - "ApiDateTime", "ApiDescription", "ApiDescriptionData", "ApiEPSS", @@ -1351,6 +1337,11 @@ "RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata", "RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata", "RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata", + "SearchErrorResponse", + "SearchV4AdvisoryMeta", + "SearchV4AdvisoryReturnValue", + "SearchV4FeedItem", + "SearchV4ListFeedReturnValue", "V3controllersBackupResponseMetadata", "V3controllersPurlResponseData", "V3controllersPurlResponseMetadata", @@ -1359,6 +1350,7 @@ ] # import apis into sdk package +from vulncheck_sdk.aio.api.advisory_api import AdvisoryApi as AdvisoryApi from vulncheck_sdk.aio.api.endpoints_api import EndpointsApi as EndpointsApi from vulncheck_sdk.aio.api.indices_api import IndicesApi as IndicesApi @@ -1520,13 +1512,11 @@ from vulncheck_sdk.aio.models.advisory_cve_detail import AdvisoryCVEDetail as AdvisoryCVEDetail from vulncheck_sdk.aio.models.advisory_cve_details_link import AdvisoryCVEDetailsLink as AdvisoryCVEDetailsLink from vulncheck_sdk.aio.models.advisory_cve_reference import AdvisoryCVEReference as AdvisoryCVEReference -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference as AdvisoryCVRFReference from vulncheck_sdk.aio.models.advisory_cvss import AdvisoryCVSS as AdvisoryCVSS from vulncheck_sdk.aio.models.advisory_cvssv2 import AdvisoryCVSSV2 as AdvisoryCVSSV2 from vulncheck_sdk.aio.models.advisory_cvssv3 import AdvisoryCVSSV3 as AdvisoryCVSSV3 from vulncheck_sdk.aio.models.advisory_cvssv40 import AdvisoryCVSSV40 as AdvisoryCVSSV40 from vulncheck_sdk.aio.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat as AdvisoryCVSSV40Threat -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode as AdvisoryCWENode from vulncheck_sdk.aio.models.advisory_canvas_exploit import AdvisoryCanvasExploit as AdvisoryCanvasExploit from vulncheck_sdk.aio.models.advisory_capec import AdvisoryCapec as AdvisoryCapec from vulncheck_sdk.aio.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory as AdvisoryCarestreamAdvisory @@ -1586,7 +1576,6 @@ from vulncheck_sdk.aio.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails as AdvisoryDanFossCVEDetails from vulncheck_sdk.aio.models.advisory_danfoss import AdvisoryDanfoss as AdvisoryDanfoss from vulncheck_sdk.aio.models.advisory_dassault import AdvisoryDassault as AdvisoryDassault -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime as AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_debian_cve import AdvisoryDebianCVE as AdvisoryDebianCVE from vulncheck_sdk.aio.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory as AdvisoryDebianSecurityAdvisory from vulncheck_sdk.aio.models.advisory_dell import AdvisoryDell as AdvisoryDell @@ -1596,9 +1585,7 @@ from vulncheck_sdk.aio.models.advisory_distro_version import AdvisoryDistroVersion as AdvisoryDistroVersion from vulncheck_sdk.aio.models.advisory_django import AdvisoryDjango as AdvisoryDjango from vulncheck_sdk.aio.models.advisory_document_metadata import AdvisoryDocumentMetadata as AdvisoryDocumentMetadata -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote as AdvisoryDocumentNote from vulncheck_sdk.aio.models.advisory_document_publisher import AdvisoryDocumentPublisher as AdvisoryDocumentPublisher -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking as AdvisoryDocumentTracking from vulncheck_sdk.aio.models.advisory_dot_cms import AdvisoryDotCMS as AdvisoryDotCMS from vulncheck_sdk.aio.models.advisory_dragos_advisory import AdvisoryDragosAdvisory as AdvisoryDragosAdvisory from vulncheck_sdk.aio.models.advisory_draytek import AdvisoryDraytek as AdvisoryDraytek @@ -1713,7 +1700,6 @@ from vulncheck_sdk.aio.models.advisory_ip_intel_record import AdvisoryIpIntelRecord as AdvisoryIpIntelRecord from vulncheck_sdk.aio.models.advisory_israeli_alert import AdvisoryIsraeliAlert as AdvisoryIsraeliAlert from vulncheck_sdk.aio.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability as AdvisoryIsraeliVulnerability -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued as AdvisoryIssued from vulncheck_sdk.aio.models.advisory_istio import AdvisoryIstio as AdvisoryIstio from vulncheck_sdk.aio.models.advisory_ivanti import AdvisoryIvanti as AdvisoryIvanti from vulncheck_sdk.aio.models.advisory_ivanti_rss import AdvisoryIvantiRSS as AdvisoryIvantiRSS @@ -1894,7 +1880,6 @@ from vulncheck_sdk.aio.models.advisory_product import AdvisoryProduct as AdvisoryProduct from vulncheck_sdk.aio.models.advisory_product_branch import AdvisoryProductBranch as AdvisoryProductBranch from vulncheck_sdk.aio.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail as AdvisoryProductSpecificDetail -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree as AdvisoryProductTree from vulncheck_sdk.aio.models.advisory_products_affected import AdvisoryProductsAffected as AdvisoryProductsAffected from vulncheck_sdk.aio.models.advisory_progress import AdvisoryProgress as AdvisoryProgress from vulncheck_sdk.aio.models.advisory_proofpoint import AdvisoryProofpoint as AdvisoryProofpoint @@ -1924,12 +1909,10 @@ from vulncheck_sdk.aio.models.advisory_redhat_cve import AdvisoryRedhatCVE as AdvisoryRedhatCVE from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference as AdvisoryReference from vulncheck_sdk.aio.models.advisory_related_rule import AdvisoryRelatedRule as AdvisoryRelatedRule -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship as AdvisoryRelationship from vulncheck_sdk.aio.models.advisory_remediation_data import AdvisoryRemediationData as AdvisoryRemediationData from vulncheck_sdk.aio.models.advisory_renesas import AdvisoryRenesas as AdvisoryRenesas from vulncheck_sdk.aio.models.advisory_reported_exploit import AdvisoryReportedExploit as AdvisoryReportedExploit from vulncheck_sdk.aio.models.advisory_restart_data import AdvisoryRestartData as AdvisoryRestartData -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision as AdvisoryRevision from vulncheck_sdk.aio.models.advisory_revision_history import AdvisoryRevisionHistory as AdvisoryRevisionHistory from vulncheck_sdk.aio.models.advisory_revive import AdvisoryRevive as AdvisoryRevive from vulncheck_sdk.aio.models.advisory_rhel_cve import AdvisoryRhelCVE as AdvisoryRhelCVE @@ -1963,7 +1946,6 @@ from vulncheck_sdk.aio.models.advisory_schneider_cve import AdvisorySchneiderCVE as AdvisorySchneiderCVE from vulncheck_sdk.aio.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory as AdvisorySchneiderElectricAdvisory from vulncheck_sdk.aio.models.advisory_schutzwerk import AdvisorySchutzwerk as AdvisorySchutzwerk -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet as AdvisoryScoreSet from vulncheck_sdk.aio.models.advisory_sec_fix import AdvisorySecFix as AdvisorySecFix from vulncheck_sdk.aio.models.advisory_security_bulletin import AdvisorySecurityBulletin as AdvisorySecurityBulletin from vulncheck_sdk.aio.models.advisory_security_lab import AdvisorySecurityLab as AdvisorySecurityLab @@ -2015,7 +1997,6 @@ from vulncheck_sdk.aio.models.advisory_splunk import AdvisorySplunk as AdvisorySplunk from vulncheck_sdk.aio.models.advisory_splunk_product import AdvisorySplunkProduct as AdvisorySplunkProduct from vulncheck_sdk.aio.models.advisory_spring import AdvisorySpring as AdvisorySpring -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus as AdvisoryStatus from vulncheck_sdk.aio.models.advisory_stormshield import AdvisoryStormshield as AdvisoryStormshield from vulncheck_sdk.aio.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory as AdvisoryStrykerAdvisory from vulncheck_sdk.aio.models.advisory_sudo import AdvisorySudo as AdvisorySudo @@ -2037,7 +2018,6 @@ from vulncheck_sdk.aio.models.advisory_thales import AdvisoryThales as AdvisoryThales from vulncheck_sdk.aio.models.advisory_the_missing_link import AdvisoryTheMissingLink as AdvisoryTheMissingLink from vulncheck_sdk.aio.models.advisory_thermo_fisher import AdvisoryThermoFisher as AdvisoryThermoFisher -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat as AdvisoryThreat from vulncheck_sdk.aio.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects as AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.aio.models.advisory_threat_data import AdvisoryThreatData as AdvisoryThreatData from vulncheck_sdk.aio.models.advisory_tibco import AdvisoryTibco as AdvisoryTibco @@ -2058,7 +2038,6 @@ from vulncheck_sdk.aio.models.advisory_unify import AdvisoryUnify as AdvisoryUnify from vulncheck_sdk.aio.models.advisory_unisoc import AdvisoryUnisoc as AdvisoryUnisoc from vulncheck_sdk.aio.models.advisory_update import AdvisoryUpdate as AdvisoryUpdate -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated as AdvisoryUpdated from vulncheck_sdk.aio.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel as AdvisoryV3AcceptanceLevel from vulncheck_sdk.aio.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary as AdvisoryVCCPEDictionary from vulncheck_sdk.aio.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs as AdvisoryVCVulnerableCPEs @@ -2080,7 +2059,6 @@ from vulncheck_sdk.aio.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig as AdvisoryVulnCheckConfig from vulncheck_sdk.aio.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV as AdvisoryVulnCheckKEV from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage as AdvisoryVulnCheckPackage -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability as AdvisoryVulnerability from vulncheck_sdk.aio.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage as AdvisoryVulnerableDebianPackage from vulncheck_sdk.aio.models.advisory_vulnerable_product import AdvisoryVulnerableProduct as AdvisoryVulnerableProduct from vulncheck_sdk.aio.models.advisory_vulnrichment import AdvisoryVulnrichment as AdvisoryVulnrichment @@ -2140,7 +2118,6 @@ from vulncheck_sdk.aio.models.api_configurations import ApiConfigurations as ApiConfigurations from vulncheck_sdk.aio.models.api_cve_items import ApiCveItems as ApiCveItems from vulncheck_sdk.aio.models.api_cve_items_extended import ApiCveItemsExtended as ApiCveItemsExtended -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime as ApiDateTime from vulncheck_sdk.aio.models.api_description import ApiDescription as ApiDescription from vulncheck_sdk.aio.models.api_description_data import ApiDescriptionData as ApiDescriptionData from vulncheck_sdk.aio.models.api_epss import ApiEPSS as ApiEPSS @@ -2695,6 +2672,11 @@ from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata import RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata as RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata import RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata as RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata import RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata as RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata +from vulncheck_sdk.aio.models.search_error_response import SearchErrorResponse as SearchErrorResponse +from vulncheck_sdk.aio.models.search_v4_advisory_meta import SearchV4AdvisoryMeta as SearchV4AdvisoryMeta +from vulncheck_sdk.aio.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue as SearchV4AdvisoryReturnValue +from vulncheck_sdk.aio.models.search_v4_feed_item import SearchV4FeedItem as SearchV4FeedItem +from vulncheck_sdk.aio.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue as SearchV4ListFeedReturnValue from vulncheck_sdk.aio.models.v3controllers_backup_response_metadata import V3controllersBackupResponseMetadata as V3controllersBackupResponseMetadata from vulncheck_sdk.aio.models.v3controllers_purl_response_data import V3controllersPurlResponseData as V3controllersPurlResponseData from vulncheck_sdk.aio.models.v3controllers_purl_response_metadata import V3controllersPurlResponseMetadata as V3controllersPurlResponseMetadata diff --git a/vulncheck_sdk/aio/api/__init__.py b/vulncheck_sdk/aio/api/__init__.py index 0f293340..458da09a 100644 --- a/vulncheck_sdk/aio/api/__init__.py +++ b/vulncheck_sdk/aio/api/__init__.py @@ -1,6 +1,7 @@ # flake8: noqa # import apis into api package +from vulncheck_sdk.aio.api.advisory_api import AdvisoryApi from vulncheck_sdk.aio.api.endpoints_api import EndpointsApi from vulncheck_sdk.aio.api.indices_api import IndicesApi diff --git a/vulncheck_sdk/aio/api/advisory_api.py b/vulncheck_sdk/aio/api/advisory_api.py new file mode 100644 index 00000000..d675207d --- /dev/null +++ b/vulncheck_sdk/aio/api/advisory_api.py @@ -0,0 +1,869 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt +from typing import Any, Dict, List, Optional, Tuple, Union +from typing_extensions import Annotated + +from pydantic import Field, StrictInt, StrictStr +from typing import Optional +from typing_extensions import Annotated +from vulncheck_sdk.aio.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue +from vulncheck_sdk.aio.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue + +from vulncheck_sdk.aio.api_client import ApiClient, RequestSerialized +from vulncheck_sdk.aio.api_response import ApiResponse +from vulncheck_sdk.aio.rest import RESTResponseType + + +class AdvisoryApi: + """NOTE: This class is auto generated by OpenAPI Generator + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + def __init__(self, api_client=None) -> None: + if api_client is None: + api_client = ApiClient.get_default() + self.api_client = api_client + + + @validate_call + async def advisory_get( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> SearchV4AdvisoryReturnValue: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def advisory_get_with_http_info( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[SearchV4AdvisoryReturnValue]: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def advisory_get_without_preload_content( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _advisory_get_serialize( + self, + name, + cve_id, + vendor, + product, + platform, + version, + cpe, + package_name, + purl, + reference_url, + reference_tag, + description_lang, + updated_after, + updated_before, + page, + limit, + start_cursor, + cursor, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com/v4' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if name is not None: + + _query_params.append(('name', name)) + + if cve_id is not None: + + _query_params.append(('cve_id', cve_id)) + + if vendor is not None: + + _query_params.append(('vendor', vendor)) + + if product is not None: + + _query_params.append(('product', product)) + + if platform is not None: + + _query_params.append(('platform', platform)) + + if version is not None: + + _query_params.append(('version', version)) + + if cpe is not None: + + _query_params.append(('cpe', cpe)) + + if package_name is not None: + + _query_params.append(('package_name', package_name)) + + if purl is not None: + + _query_params.append(('purl', purl)) + + if reference_url is not None: + + _query_params.append(('reference_url', reference_url)) + + if reference_tag is not None: + + _query_params.append(('reference_tag', reference_tag)) + + if description_lang is not None: + + _query_params.append(('description_lang', description_lang)) + + if updated_after is not None: + + _query_params.append(('updatedAfter', updated_after)) + + if updated_before is not None: + + _query_params.append(('updatedBefore', updated_before)) + + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/advisory', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def advisory_list_get( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> SearchV4ListFeedReturnValue: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def advisory_list_get_with_http_info( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[SearchV4ListFeedReturnValue]: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def advisory_list_get_without_preload_content( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _advisory_list_get_serialize( + self, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com/v4' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/advisory/list', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + diff --git a/vulncheck_sdk/aio/api/endpoints_api.py b/vulncheck_sdk/aio/api/endpoints_api.py index ad93976e..2f54b983 100644 --- a/vulncheck_sdk/aio/api/endpoints_api.py +++ b/vulncheck_sdk/aio/api/endpoints_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -60,7 +60,7 @@ async def backup_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseArrayParamsIndexBackupList: """Return a list of indexes with backup and endpoint links @@ -125,7 +125,7 @@ async def backup_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseArrayParamsIndexBackupList]: """Return a list of indexes with backup and endpoint links @@ -190,7 +190,7 @@ async def backup_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return a list of indexes with backup and endpoint links @@ -245,7 +245,10 @@ def _backup_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -313,7 +316,7 @@ async def backup_index_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata: """Retrieve a list of backups by index @@ -382,7 +385,7 @@ async def backup_index_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata]: """Retrieve a list of backups by index @@ -451,7 +454,7 @@ async def backup_index_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of backups by index @@ -510,7 +513,10 @@ def _backup_index_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -581,7 +587,7 @@ async def cpe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayStringV3controllersResponseMetadata: """Return CVE 's associated with a specific NIST CPE @@ -654,7 +660,7 @@ async def cpe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayStringV3controllersResponseMetadata]: """Return CVE 's associated with a specific NIST CPE @@ -727,7 +733,7 @@ async def cpe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return CVE 's associated with a specific NIST CPE @@ -790,7 +796,10 @@ def _cpe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -865,7 +874,7 @@ async def entitlements_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ModelsEntitlements: """Retrieve user entitlements @@ -930,7 +939,7 @@ async def entitlements_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[ModelsEntitlements]: """Retrieve user entitlements @@ -995,7 +1004,7 @@ async def entitlements_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve user entitlements @@ -1050,7 +1059,10 @@ def _entitlements_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1117,7 +1129,7 @@ async def index_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseArrayParamsIndexList: """Return a list of available indexes with endpoint links @@ -1182,7 +1194,7 @@ async def index_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseArrayParamsIndexList]: """Return a list of available indexes with endpoint links @@ -1247,7 +1259,7 @@ async def index_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return a list of available indexes with endpoint links @@ -1302,7 +1314,10 @@ def _index_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1369,7 +1384,7 @@ async def openapi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> Dict[str, object]: """Return OpenAPI specification @@ -1433,7 +1448,7 @@ async def openapi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[Dict[str, object]]: """Return OpenAPI specification @@ -1497,7 +1512,7 @@ async def openapi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return OpenAPI specification @@ -1551,7 +1566,10 @@ def _openapi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1619,7 +1637,7 @@ async def pdns_vulncheck_c2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve a list of C2 Hostnames @@ -1688,7 +1706,7 @@ async def pdns_vulncheck_c2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve a list of C2 Hostnames @@ -1757,7 +1775,7 @@ async def pdns_vulncheck_c2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of C2 Hostnames @@ -1816,7 +1834,10 @@ def _pdns_vulncheck_c2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1888,7 +1909,7 @@ async def purl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata: """Request vulnerabilities related to a PURL @@ -1957,7 +1978,7 @@ async def purl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata]: """Request vulnerabilities related to a PURL @@ -2026,7 +2047,7 @@ async def purl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Request vulnerabilities related to a PURL @@ -2085,7 +2106,10 @@ def _purl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2145,7 +2169,7 @@ def _purl_get_serialize( @validate_call async def purls_post( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2157,14 +2181,14 @@ async def purls_post( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2188,7 +2212,7 @@ async def purls_post( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2214,7 +2238,7 @@ async def purls_post( @validate_call async def purls_post_with_http_info( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2226,14 +2250,14 @@ async def purls_post_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata]: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2257,7 +2281,7 @@ async def purls_post_with_http_info( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2283,7 +2307,7 @@ async def purls_post_with_http_info( @validate_call async def purls_post_without_preload_content( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2295,14 +2319,14 @@ async def purls_post_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2326,7 +2350,7 @@ async def purls_post_without_preload_content( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2347,17 +2371,20 @@ async def purls_post_without_preload_content( def _purls_post_serialize( self, - purls, + request_body, _request_auth, _content_type, _headers, _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { - 'purls': '', + 'request_body': '', } _path_params: Dict[str, str] = {} @@ -2374,8 +2401,8 @@ def _purls_post_serialize( # process the header parameters # process the form parameters # process the body parameter - if purls is not None: - _body_params = purls + if request_body is not None: + _body_params = request_body # set the HTTP header `Accept` @@ -2386,6 +2413,19 @@ def _purls_post_serialize( ] ) + # set the HTTP header `Content-Type` + if _content_type: + _header_params['Content-Type'] = _content_type + else: + _default_content_type = ( + self.api_client.select_header_content_type( + [ + 'application/json' + ] + ) + ) + if _default_content_type is not None: + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ @@ -2425,7 +2465,7 @@ async def rules_initial_access_type_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve set of initial-access detection rules @@ -2494,7 +2534,7 @@ async def rules_initial_access_type_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve set of initial-access detection rules @@ -2563,7 +2603,7 @@ async def rules_initial_access_type_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve set of initial-access detection rules @@ -2622,7 +2662,10 @@ def _rules_initial_access_type_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2692,7 +2735,7 @@ async def tags_vulncheck_c2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve a list of C2 IP addresses @@ -2761,7 +2804,7 @@ async def tags_vulncheck_c2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve a list of C2 IP addresses @@ -2830,7 +2873,7 @@ async def tags_vulncheck_c2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of C2 IP addresses @@ -2889,7 +2932,10 @@ def _tags_vulncheck_c2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } diff --git a/vulncheck_sdk/aio/api/indices_api.py b/vulncheck_sdk/aio/api/indices_api.py index c7937b44..7ff55177 100644 --- a/vulncheck_sdk/aio/api/indices_api.py +++ b/vulncheck_sdk/aio/api/indices_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -519,8 +519,7 @@ async def index7zip_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -538,7 +537,7 @@ async def index7zip_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination: """Return vulnerability data stored in index \"7zip\" @@ -578,10 +577,8 @@ async def index7zip_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -634,8 +631,7 @@ async def index7zip_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -684,8 +680,7 @@ async def index7zip_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -703,7 +698,7 @@ async def index7zip_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination]: """Return vulnerability data stored in index \"7zip\" @@ -743,10 +738,8 @@ async def index7zip_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -799,8 +792,7 @@ async def index7zip_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -849,8 +841,7 @@ async def index7zip_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -868,7 +859,7 @@ async def index7zip_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"7zip\" @@ -908,10 +899,8 @@ async def index7zip_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -964,8 +953,7 @@ async def index7zip_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1009,8 +997,7 @@ def _index7zip_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1023,7 +1010,10 @@ def _index7zip_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1107,13 +1097,9 @@ def _index7zip_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -1196,8 +1182,7 @@ async def index_a10_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1215,7 +1200,7 @@ async def index_a10_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination: """Return vulnerability data stored in index \"a10\" @@ -1255,10 +1240,8 @@ async def index_a10_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1311,8 +1294,7 @@ async def index_a10_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1361,8 +1343,7 @@ async def index_a10_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1380,7 +1361,7 @@ async def index_a10_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination]: """Return vulnerability data stored in index \"a10\" @@ -1420,10 +1401,8 @@ async def index_a10_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1476,8 +1455,7 @@ async def index_a10_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1526,8 +1504,7 @@ async def index_a10_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1545,7 +1522,7 @@ async def index_a10_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"a10\" @@ -1585,10 +1562,8 @@ async def index_a10_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1641,8 +1616,7 @@ async def index_a10_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1686,8 +1660,7 @@ def _index_a10_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1700,7 +1673,10 @@ def _index_a10_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1784,13 +1760,9 @@ def _index_a10_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -1873,8 +1845,7 @@ async def index_abb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1892,7 +1863,7 @@ async def index_abb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"abb\" @@ -1932,10 +1903,8 @@ async def index_abb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1988,8 +1957,7 @@ async def index_abb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2038,8 +2006,7 @@ async def index_abb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2057,7 +2024,7 @@ async def index_abb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"abb\" @@ -2097,10 +2064,8 @@ async def index_abb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2153,8 +2118,7 @@ async def index_abb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2203,8 +2167,7 @@ async def index_abb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2222,7 +2185,7 @@ async def index_abb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"abb\" @@ -2262,10 +2225,8 @@ async def index_abb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2318,8 +2279,7 @@ async def index_abb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2363,8 +2323,7 @@ def _index_abb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -2377,7 +2336,10 @@ def _index_abb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2461,13 +2423,9 @@ def _index_abb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -2550,8 +2508,7 @@ async def index_abbott_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2569,7 +2526,7 @@ async def index_abbott_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination: """Return vulnerability data stored in index \"abbott\" @@ -2609,10 +2566,8 @@ async def index_abbott_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2665,8 +2620,7 @@ async def index_abbott_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2715,8 +2669,7 @@ async def index_abbott_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2734,7 +2687,7 @@ async def index_abbott_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination]: """Return vulnerability data stored in index \"abbott\" @@ -2774,10 +2727,8 @@ async def index_abbott_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2830,8 +2781,7 @@ async def index_abbott_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2880,8 +2830,7 @@ async def index_abbott_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2899,7 +2848,7 @@ async def index_abbott_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"abbott\" @@ -2939,10 +2888,8 @@ async def index_abbott_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2995,8 +2942,7 @@ async def index_abbott_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3040,8 +2986,7 @@ def _index_abbott_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3054,7 +2999,10 @@ def _index_abbott_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -3138,13 +3086,9 @@ def _index_abbott_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -3227,8 +3171,7 @@ async def index_absolute_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3246,7 +3189,7 @@ async def index_absolute_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination: """Return vulnerability data stored in index \"absolute\" @@ -3286,10 +3229,8 @@ async def index_absolute_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3342,8 +3283,7 @@ async def index_absolute_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3392,8 +3332,7 @@ async def index_absolute_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3411,7 +3350,7 @@ async def index_absolute_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination]: """Return vulnerability data stored in index \"absolute\" @@ -3451,10 +3390,8 @@ async def index_absolute_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3507,8 +3444,7 @@ async def index_absolute_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3557,8 +3493,7 @@ async def index_absolute_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3576,7 +3511,7 @@ async def index_absolute_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"absolute\" @@ -3616,10 +3551,8 @@ async def index_absolute_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3672,8 +3605,7 @@ async def index_absolute_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3717,8 +3649,7 @@ def _index_absolute_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3731,7 +3662,10 @@ def _index_absolute_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -3815,13 +3749,9 @@ def _index_absolute_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -3904,8 +3834,7 @@ async def index_acronis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3923,7 +3852,7 @@ async def index_acronis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination: """Return vulnerability data stored in index \"acronis\" @@ -3963,10 +3892,8 @@ async def index_acronis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4019,8 +3946,7 @@ async def index_acronis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4069,8 +3995,7 @@ async def index_acronis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4088,7 +4013,7 @@ async def index_acronis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination]: """Return vulnerability data stored in index \"acronis\" @@ -4128,10 +4053,8 @@ async def index_acronis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4184,8 +4107,7 @@ async def index_acronis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4234,8 +4156,7 @@ async def index_acronis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4253,7 +4174,7 @@ async def index_acronis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"acronis\" @@ -4293,10 +4214,8 @@ async def index_acronis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4349,8 +4268,7 @@ async def index_acronis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4394,8 +4312,7 @@ def _index_acronis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -4408,7 +4325,10 @@ def _index_acronis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -4492,13 +4412,9 @@ def _index_acronis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -4581,8 +4497,7 @@ async def index_adobe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4600,7 +4515,7 @@ async def index_adobe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination: """Return vulnerability data stored in index \"adobe\" @@ -4640,10 +4555,8 @@ async def index_adobe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4696,8 +4609,7 @@ async def index_adobe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4746,8 +4658,7 @@ async def index_adobe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4765,7 +4676,7 @@ async def index_adobe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"adobe\" @@ -4805,10 +4716,8 @@ async def index_adobe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4861,8 +4770,7 @@ async def index_adobe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4911,8 +4819,7 @@ async def index_adobe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4930,7 +4837,7 @@ async def index_adobe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"adobe\" @@ -4970,10 +4877,8 @@ async def index_adobe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5026,8 +4931,7 @@ async def index_adobe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5071,8 +4975,7 @@ def _index_adobe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5085,7 +4988,10 @@ def _index_adobe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -5169,13 +5075,9 @@ def _index_adobe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -5258,8 +5160,7 @@ async def index_advantech_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5277,7 +5178,7 @@ async def index_advantech_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination: """Return vulnerability data stored in index \"advantech\" @@ -5317,10 +5218,8 @@ async def index_advantech_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5373,8 +5272,7 @@ async def index_advantech_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5423,8 +5321,7 @@ async def index_advantech_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5442,7 +5339,7 @@ async def index_advantech_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination]: """Return vulnerability data stored in index \"advantech\" @@ -5482,10 +5379,8 @@ async def index_advantech_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5538,8 +5433,7 @@ async def index_advantech_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5588,8 +5482,7 @@ async def index_advantech_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5607,7 +5500,7 @@ async def index_advantech_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"advantech\" @@ -5647,10 +5540,8 @@ async def index_advantech_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5703,8 +5594,7 @@ async def index_advantech_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5748,8 +5638,7 @@ def _index_advantech_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5762,7 +5651,10 @@ def _index_advantech_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -5846,13 +5738,9 @@ def _index_advantech_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -5935,8 +5823,7 @@ async def index_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5954,7 +5841,7 @@ async def index_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination: """Return vulnerability data stored in index \"advisories\" @@ -5994,10 +5881,8 @@ async def index_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6050,8 +5935,7 @@ async def index_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6100,8 +5984,7 @@ async def index_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6119,7 +6002,7 @@ async def index_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination]: """Return vulnerability data stored in index \"advisories\" @@ -6159,10 +6042,8 @@ async def index_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6215,8 +6096,7 @@ async def index_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6265,8 +6145,7 @@ async def index_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6284,7 +6163,7 @@ async def index_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"advisories\" @@ -6324,10 +6203,8 @@ async def index_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6380,8 +6257,7 @@ async def index_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6425,8 +6301,7 @@ def _index_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -6439,7 +6314,10 @@ def _index_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -6523,13 +6401,9 @@ def _index_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -6612,8 +6486,7 @@ async def index_aix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6631,7 +6504,7 @@ async def index_aix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination: """Return vulnerability data stored in index \"aix\" @@ -6671,10 +6544,8 @@ async def index_aix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6727,8 +6598,7 @@ async def index_aix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6777,8 +6647,7 @@ async def index_aix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6796,7 +6665,7 @@ async def index_aix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination]: """Return vulnerability data stored in index \"aix\" @@ -6836,10 +6705,8 @@ async def index_aix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6892,8 +6759,7 @@ async def index_aix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6942,8 +6808,7 @@ async def index_aix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6961,7 +6826,7 @@ async def index_aix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aix\" @@ -7001,10 +6866,8 @@ async def index_aix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7057,8 +6920,7 @@ async def index_aix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7102,8 +6964,7 @@ def _index_aix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7116,7 +6977,10 @@ def _index_aix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -7200,13 +7064,9 @@ def _index_aix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -7289,8 +7149,7 @@ async def index_aleph_research_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7308,7 +7167,7 @@ async def index_aleph_research_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination: """Return vulnerability data stored in index \"aleph-research\" @@ -7348,10 +7207,8 @@ async def index_aleph_research_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7404,8 +7261,7 @@ async def index_aleph_research_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7454,8 +7310,7 @@ async def index_aleph_research_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7473,7 +7328,7 @@ async def index_aleph_research_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination]: """Return vulnerability data stored in index \"aleph-research\" @@ -7513,10 +7368,8 @@ async def index_aleph_research_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7569,8 +7422,7 @@ async def index_aleph_research_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7619,8 +7471,7 @@ async def index_aleph_research_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7638,7 +7489,7 @@ async def index_aleph_research_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aleph-research\" @@ -7678,10 +7529,8 @@ async def index_aleph_research_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7734,8 +7583,7 @@ async def index_aleph_research_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7779,8 +7627,7 @@ def _index_aleph_research_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7793,7 +7640,10 @@ def _index_aleph_research_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -7877,13 +7727,9 @@ def _index_aleph_research_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -7966,8 +7812,7 @@ async def index_alibaba_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7985,7 +7830,7 @@ async def index_alibaba_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8025,10 +7870,8 @@ async def index_alibaba_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8081,8 +7924,7 @@ async def index_alibaba_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8131,8 +7973,7 @@ async def index_alibaba_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8150,7 +7991,7 @@ async def index_alibaba_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination]: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8190,10 +8031,8 @@ async def index_alibaba_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8246,8 +8085,7 @@ async def index_alibaba_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8296,8 +8134,7 @@ async def index_alibaba_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8315,7 +8152,7 @@ async def index_alibaba_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8355,10 +8192,8 @@ async def index_alibaba_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8411,8 +8246,7 @@ async def index_alibaba_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8456,8 +8290,7 @@ def _index_alibaba_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -8470,7 +8303,10 @@ def _index_alibaba_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -8554,13 +8390,9 @@ def _index_alibaba_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -8643,8 +8475,7 @@ async def index_alma_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8662,7 +8493,7 @@ async def index_alma_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination: """Return vulnerability data stored in index \"alma\" @@ -8702,10 +8533,8 @@ async def index_alma_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8758,8 +8587,7 @@ async def index_alma_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8808,8 +8636,7 @@ async def index_alma_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8827,7 +8654,7 @@ async def index_alma_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination]: """Return vulnerability data stored in index \"alma\" @@ -8867,10 +8694,8 @@ async def index_alma_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8923,8 +8748,7 @@ async def index_alma_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8973,8 +8797,7 @@ async def index_alma_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8992,7 +8815,7 @@ async def index_alma_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alma\" @@ -9032,10 +8855,8 @@ async def index_alma_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9088,8 +8909,7 @@ async def index_alma_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9133,8 +8953,7 @@ def _index_alma_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9147,7 +8966,10 @@ def _index_alma_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -9231,13 +9053,9 @@ def _index_alma_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -9320,8 +9138,7 @@ async def index_alpine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9339,7 +9156,7 @@ async def index_alpine_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination: """Return vulnerability data stored in index \"alpine\" @@ -9379,10 +9196,8 @@ async def index_alpine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9435,8 +9250,7 @@ async def index_alpine_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9485,8 +9299,7 @@ async def index_alpine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9504,7 +9317,7 @@ async def index_alpine_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination]: """Return vulnerability data stored in index \"alpine\" @@ -9544,10 +9357,8 @@ async def index_alpine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9600,8 +9411,7 @@ async def index_alpine_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9650,8 +9460,7 @@ async def index_alpine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9669,7 +9478,7 @@ async def index_alpine_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alpine\" @@ -9709,10 +9518,8 @@ async def index_alpine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9765,8 +9572,7 @@ async def index_alpine_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9810,8 +9616,7 @@ def _index_alpine_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9824,7 +9629,10 @@ def _index_alpine_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -9908,13 +9716,9 @@ def _index_alpine_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -9997,8 +9801,7 @@ async def index_alpine_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10016,7 +9819,7 @@ async def index_alpine_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"alpine-purls\" @@ -10056,10 +9859,8 @@ async def index_alpine_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10112,8 +9913,7 @@ async def index_alpine_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10162,8 +9962,7 @@ async def index_alpine_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10181,7 +9980,7 @@ async def index_alpine_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"alpine-purls\" @@ -10221,10 +10020,8 @@ async def index_alpine_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10277,8 +10074,7 @@ async def index_alpine_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10327,8 +10123,7 @@ async def index_alpine_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10346,7 +10141,7 @@ async def index_alpine_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alpine-purls\" @@ -10386,10 +10181,8 @@ async def index_alpine_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10442,8 +10235,7 @@ async def index_alpine_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10487,8 +10279,7 @@ def _index_alpine_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -10501,7 +10292,10 @@ def _index_alpine_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -10585,13 +10379,9 @@ def _index_alpine_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -10674,8 +10464,7 @@ async def index_amazon_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10693,7 +10482,7 @@ async def index_amazon_cve_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination: """Return vulnerability data stored in index \"amazon-cve\" @@ -10733,10 +10522,8 @@ async def index_amazon_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10789,8 +10576,7 @@ async def index_amazon_cve_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10839,8 +10625,7 @@ async def index_amazon_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10858,7 +10643,7 @@ async def index_amazon_cve_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination]: """Return vulnerability data stored in index \"amazon-cve\" @@ -10898,10 +10683,8 @@ async def index_amazon_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10954,8 +10737,7 @@ async def index_amazon_cve_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11004,8 +10786,7 @@ async def index_amazon_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11023,7 +10804,7 @@ async def index_amazon_cve_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amazon-cve\" @@ -11063,10 +10844,8 @@ async def index_amazon_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11119,8 +10898,7 @@ async def index_amazon_cve_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11164,8 +10942,7 @@ def _index_amazon_cve_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11178,7 +10955,10 @@ def _index_amazon_cve_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -11262,13 +11042,9 @@ def _index_amazon_cve_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -11351,8 +11127,7 @@ async def index_amazon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11370,7 +11145,7 @@ async def index_amazon_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination: """Return vulnerability data stored in index \"amazon\" @@ -11410,10 +11185,8 @@ async def index_amazon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11466,8 +11239,7 @@ async def index_amazon_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11516,8 +11288,7 @@ async def index_amazon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11535,7 +11306,7 @@ async def index_amazon_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination]: """Return vulnerability data stored in index \"amazon\" @@ -11575,10 +11346,8 @@ async def index_amazon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11631,8 +11400,7 @@ async def index_amazon_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11681,8 +11449,7 @@ async def index_amazon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11700,7 +11467,7 @@ async def index_amazon_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amazon\" @@ -11740,10 +11507,8 @@ async def index_amazon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11796,8 +11561,7 @@ async def index_amazon_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11841,8 +11605,7 @@ def _index_amazon_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11855,7 +11618,10 @@ def _index_amazon_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -11939,13 +11705,9 @@ def _index_amazon_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -12028,8 +11790,7 @@ async def index_amd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12047,7 +11808,7 @@ async def index_amd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination: """Return vulnerability data stored in index \"amd\" @@ -12087,10 +11848,8 @@ async def index_amd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12143,8 +11902,7 @@ async def index_amd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12193,8 +11951,7 @@ async def index_amd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12212,7 +11969,7 @@ async def index_amd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination]: """Return vulnerability data stored in index \"amd\" @@ -12252,10 +12009,8 @@ async def index_amd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12308,8 +12063,7 @@ async def index_amd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12358,8 +12112,7 @@ async def index_amd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12377,7 +12130,7 @@ async def index_amd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amd\" @@ -12417,10 +12170,8 @@ async def index_amd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12473,8 +12224,7 @@ async def index_amd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12518,8 +12268,7 @@ def _index_amd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -12532,7 +12281,10 @@ def _index_amd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -12616,13 +12368,9 @@ def _index_amd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -12705,8 +12453,7 @@ async def index_ami_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12724,7 +12471,7 @@ async def index_ami_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination: """Return vulnerability data stored in index \"ami\" @@ -12764,10 +12511,8 @@ async def index_ami_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12820,8 +12565,7 @@ async def index_ami_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12870,8 +12614,7 @@ async def index_ami_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12889,7 +12632,7 @@ async def index_ami_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination]: """Return vulnerability data stored in index \"ami\" @@ -12929,10 +12672,8 @@ async def index_ami_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12985,8 +12726,7 @@ async def index_ami_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13035,8 +12775,7 @@ async def index_ami_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13054,7 +12793,7 @@ async def index_ami_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ami\" @@ -13094,10 +12833,8 @@ async def index_ami_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13150,8 +12887,7 @@ async def index_ami_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13195,8 +12931,7 @@ def _index_ami_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13209,7 +12944,10 @@ def _index_ami_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -13293,13 +13031,9 @@ def _index_ami_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -13382,8 +13116,7 @@ async def index_anchore_nvd_override_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13401,7 +13134,7 @@ async def index_anchore_nvd_override_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13441,10 +13174,8 @@ async def index_anchore_nvd_override_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13497,8 +13228,7 @@ async def index_anchore_nvd_override_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13547,8 +13277,7 @@ async def index_anchore_nvd_override_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13566,7 +13295,7 @@ async def index_anchore_nvd_override_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination]: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13606,10 +13335,8 @@ async def index_anchore_nvd_override_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13662,8 +13389,7 @@ async def index_anchore_nvd_override_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13712,8 +13438,7 @@ async def index_anchore_nvd_override_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13731,7 +13456,7 @@ async def index_anchore_nvd_override_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13771,10 +13496,8 @@ async def index_anchore_nvd_override_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13827,8 +13550,7 @@ async def index_anchore_nvd_override_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13872,8 +13594,7 @@ def _index_anchore_nvd_override_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13886,7 +13607,10 @@ def _index_anchore_nvd_override_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -13970,13 +13694,9 @@ def _index_anchore_nvd_override_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -14059,8 +13779,7 @@ async def index_android_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14078,7 +13797,7 @@ async def index_android_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination: """Return vulnerability data stored in index \"android\" @@ -14118,10 +13837,8 @@ async def index_android_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14174,8 +13891,7 @@ async def index_android_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14224,8 +13940,7 @@ async def index_android_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14243,7 +13958,7 @@ async def index_android_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"android\" @@ -14283,10 +13998,8 @@ async def index_android_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14339,8 +14052,7 @@ async def index_android_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14389,8 +14101,7 @@ async def index_android_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14408,7 +14119,7 @@ async def index_android_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"android\" @@ -14448,10 +14159,8 @@ async def index_android_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14504,8 +14213,7 @@ async def index_android_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14549,8 +14257,7 @@ def _index_android_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -14563,7 +14270,10 @@ def _index_android_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -14647,13 +14357,9 @@ def _index_android_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -14736,8 +14442,7 @@ async def index_apache_activemq_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14755,7 +14460,7 @@ async def index_apache_activemq_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination: """Return vulnerability data stored in index \"apache-activemq\" @@ -14795,10 +14500,8 @@ async def index_apache_activemq_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14851,8 +14554,7 @@ async def index_apache_activemq_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14901,8 +14603,7 @@ async def index_apache_activemq_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14920,7 +14621,7 @@ async def index_apache_activemq_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination]: """Return vulnerability data stored in index \"apache-activemq\" @@ -14960,10 +14661,8 @@ async def index_apache_activemq_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15016,8 +14715,7 @@ async def index_apache_activemq_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15066,8 +14764,7 @@ async def index_apache_activemq_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15085,7 +14782,7 @@ async def index_apache_activemq_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-activemq\" @@ -15125,10 +14822,8 @@ async def index_apache_activemq_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15181,8 +14876,7 @@ async def index_apache_activemq_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15226,8 +14920,7 @@ def _index_apache_activemq_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15240,7 +14933,10 @@ def _index_apache_activemq_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -15324,13 +15020,9 @@ def _index_apache_activemq_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -15413,8 +15105,7 @@ async def index_apache_archiva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15432,7 +15123,7 @@ async def index_apache_archiva_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination: """Return vulnerability data stored in index \"apache-archiva\" @@ -15472,10 +15163,8 @@ async def index_apache_archiva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15528,8 +15217,7 @@ async def index_apache_archiva_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15578,8 +15266,7 @@ async def index_apache_archiva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15597,7 +15284,7 @@ async def index_apache_archiva_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination]: """Return vulnerability data stored in index \"apache-archiva\" @@ -15637,10 +15324,8 @@ async def index_apache_archiva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15693,8 +15378,7 @@ async def index_apache_archiva_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15743,8 +15427,7 @@ async def index_apache_archiva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15762,7 +15445,7 @@ async def index_apache_archiva_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-archiva\" @@ -15802,10 +15485,8 @@ async def index_apache_archiva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15858,8 +15539,7 @@ async def index_apache_archiva_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15903,8 +15583,7 @@ def _index_apache_archiva_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15917,7 +15596,10 @@ def _index_apache_archiva_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -16001,13 +15683,9 @@ def _index_apache_archiva_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -16090,8 +15768,7 @@ async def index_apache_arrow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16109,7 +15786,7 @@ async def index_apache_arrow_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination: """Return vulnerability data stored in index \"apache-arrow\" @@ -16149,10 +15826,8 @@ async def index_apache_arrow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16205,8 +15880,7 @@ async def index_apache_arrow_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16255,8 +15929,7 @@ async def index_apache_arrow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16274,7 +15947,7 @@ async def index_apache_arrow_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination]: """Return vulnerability data stored in index \"apache-arrow\" @@ -16314,10 +15987,8 @@ async def index_apache_arrow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16370,8 +16041,7 @@ async def index_apache_arrow_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16420,8 +16090,7 @@ async def index_apache_arrow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16439,7 +16108,7 @@ async def index_apache_arrow_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-arrow\" @@ -16479,10 +16148,8 @@ async def index_apache_arrow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16535,8 +16202,7 @@ async def index_apache_arrow_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16580,8 +16246,7 @@ def _index_apache_arrow_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16594,7 +16259,10 @@ def _index_apache_arrow_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -16678,13 +16346,9 @@ def _index_apache_arrow_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -16767,8 +16431,7 @@ async def index_apache_camel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16786,7 +16449,7 @@ async def index_apache_camel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination: """Return vulnerability data stored in index \"apache-camel\" @@ -16826,10 +16489,8 @@ async def index_apache_camel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16882,8 +16543,7 @@ async def index_apache_camel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16932,8 +16592,7 @@ async def index_apache_camel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16951,7 +16610,7 @@ async def index_apache_camel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination]: """Return vulnerability data stored in index \"apache-camel\" @@ -16991,10 +16650,8 @@ async def index_apache_camel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17047,8 +16704,7 @@ async def index_apache_camel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17097,8 +16753,7 @@ async def index_apache_camel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17116,7 +16771,7 @@ async def index_apache_camel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-camel\" @@ -17156,10 +16811,8 @@ async def index_apache_camel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17212,8 +16865,7 @@ async def index_apache_camel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17257,8 +16909,7 @@ def _index_apache_camel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17271,7 +16922,10 @@ def _index_apache_camel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -17355,13 +17009,9 @@ def _index_apache_camel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -17444,8 +17094,7 @@ async def index_apache_commons_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17463,7 +17112,7 @@ async def index_apache_commons_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination: """Return vulnerability data stored in index \"apache-commons\" @@ -17503,10 +17152,8 @@ async def index_apache_commons_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17559,8 +17206,7 @@ async def index_apache_commons_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17609,8 +17255,7 @@ async def index_apache_commons_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17628,7 +17273,7 @@ async def index_apache_commons_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination]: """Return vulnerability data stored in index \"apache-commons\" @@ -17668,10 +17313,8 @@ async def index_apache_commons_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17724,8 +17367,7 @@ async def index_apache_commons_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17774,8 +17416,7 @@ async def index_apache_commons_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17793,7 +17434,7 @@ async def index_apache_commons_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-commons\" @@ -17833,10 +17474,8 @@ async def index_apache_commons_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17889,8 +17528,7 @@ async def index_apache_commons_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17934,8 +17572,7 @@ def _index_apache_commons_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17948,7 +17585,10 @@ def _index_apache_commons_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -18032,13 +17672,9 @@ def _index_apache_commons_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -18121,8 +17757,7 @@ async def index_apache_couchdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18140,7 +17775,7 @@ async def index_apache_couchdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18180,10 +17815,8 @@ async def index_apache_couchdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18236,8 +17869,7 @@ async def index_apache_couchdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18286,8 +17918,7 @@ async def index_apache_couchdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18305,7 +17936,7 @@ async def index_apache_couchdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination]: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18345,10 +17976,8 @@ async def index_apache_couchdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18401,8 +18030,7 @@ async def index_apache_couchdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18451,8 +18079,7 @@ async def index_apache_couchdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18470,7 +18097,7 @@ async def index_apache_couchdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18510,10 +18137,8 @@ async def index_apache_couchdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18566,8 +18191,7 @@ async def index_apache_couchdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18611,8 +18235,7 @@ def _index_apache_couchdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18625,7 +18248,10 @@ def _index_apache_couchdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -18709,13 +18335,9 @@ def _index_apache_couchdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -18798,8 +18420,7 @@ async def index_apache_flink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18817,7 +18438,7 @@ async def index_apache_flink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination: """Return vulnerability data stored in index \"apache-flink\" @@ -18857,10 +18478,8 @@ async def index_apache_flink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18913,8 +18532,7 @@ async def index_apache_flink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18963,8 +18581,7 @@ async def index_apache_flink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18982,7 +18599,7 @@ async def index_apache_flink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination]: """Return vulnerability data stored in index \"apache-flink\" @@ -19022,10 +18639,8 @@ async def index_apache_flink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19078,8 +18693,7 @@ async def index_apache_flink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19128,8 +18742,7 @@ async def index_apache_flink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19147,7 +18760,7 @@ async def index_apache_flink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-flink\" @@ -19187,10 +18800,8 @@ async def index_apache_flink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19243,8 +18854,7 @@ async def index_apache_flink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19288,8 +18898,7 @@ def _index_apache_flink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19302,7 +18911,10 @@ def _index_apache_flink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -19386,13 +18998,9 @@ def _index_apache_flink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -19475,8 +19083,7 @@ async def index_apache_guacamole_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19494,7 +19101,7 @@ async def index_apache_guacamole_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19534,10 +19141,8 @@ async def index_apache_guacamole_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19590,8 +19195,7 @@ async def index_apache_guacamole_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19640,8 +19244,7 @@ async def index_apache_guacamole_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19659,7 +19262,7 @@ async def index_apache_guacamole_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination]: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19699,10 +19302,8 @@ async def index_apache_guacamole_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19755,8 +19356,7 @@ async def index_apache_guacamole_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19805,8 +19405,7 @@ async def index_apache_guacamole_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19824,7 +19423,7 @@ async def index_apache_guacamole_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19864,10 +19463,8 @@ async def index_apache_guacamole_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19920,8 +19517,7 @@ async def index_apache_guacamole_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19965,8 +19561,7 @@ def _index_apache_guacamole_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19979,7 +19574,10 @@ def _index_apache_guacamole_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -20063,13 +19661,9 @@ def _index_apache_guacamole_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -20152,8 +19746,7 @@ async def index_apache_hadoop_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20171,7 +19764,7 @@ async def index_apache_hadoop_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20211,10 +19804,8 @@ async def index_apache_hadoop_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20267,8 +19858,7 @@ async def index_apache_hadoop_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20317,8 +19907,7 @@ async def index_apache_hadoop_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20336,7 +19925,7 @@ async def index_apache_hadoop_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination]: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20376,10 +19965,8 @@ async def index_apache_hadoop_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20432,8 +20019,7 @@ async def index_apache_hadoop_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20482,8 +20068,7 @@ async def index_apache_hadoop_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20501,7 +20086,7 @@ async def index_apache_hadoop_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20541,10 +20126,8 @@ async def index_apache_hadoop_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20597,8 +20180,7 @@ async def index_apache_hadoop_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20642,8 +20224,7 @@ def _index_apache_hadoop_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20656,7 +20237,10 @@ def _index_apache_hadoop_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -20740,13 +20324,9 @@ def _index_apache_hadoop_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -20829,8 +20409,7 @@ async def index_apache_http_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20848,7 +20427,7 @@ async def index_apache_http_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination: """Return vulnerability data stored in index \"apache-http\" @@ -20888,10 +20467,8 @@ async def index_apache_http_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20944,8 +20521,7 @@ async def index_apache_http_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20994,8 +20570,7 @@ async def index_apache_http_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21013,7 +20588,7 @@ async def index_apache_http_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination]: """Return vulnerability data stored in index \"apache-http\" @@ -21053,10 +20628,8 @@ async def index_apache_http_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21109,8 +20682,7 @@ async def index_apache_http_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21159,8 +20731,7 @@ async def index_apache_http_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21178,7 +20749,7 @@ async def index_apache_http_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-http\" @@ -21218,10 +20789,8 @@ async def index_apache_http_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21274,8 +20843,7 @@ async def index_apache_http_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21319,8 +20887,7 @@ def _index_apache_http_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -21333,7 +20900,10 @@ def _index_apache_http_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -21417,13 +20987,9 @@ def _index_apache_http_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -21506,8 +21072,7 @@ async def index_apache_jspwiki_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21525,7 +21090,7 @@ async def index_apache_jspwiki_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21565,10 +21130,8 @@ async def index_apache_jspwiki_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21621,8 +21184,7 @@ async def index_apache_jspwiki_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21671,8 +21233,7 @@ async def index_apache_jspwiki_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21690,7 +21251,7 @@ async def index_apache_jspwiki_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination]: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21730,10 +21291,8 @@ async def index_apache_jspwiki_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21786,8 +21345,7 @@ async def index_apache_jspwiki_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21836,8 +21394,7 @@ async def index_apache_jspwiki_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21855,7 +21412,7 @@ async def index_apache_jspwiki_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21895,10 +21452,8 @@ async def index_apache_jspwiki_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21951,8 +21506,7 @@ async def index_apache_jspwiki_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21996,8 +21550,7 @@ def _index_apache_jspwiki_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22010,7 +21563,10 @@ def _index_apache_jspwiki_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -22094,13 +21650,9 @@ def _index_apache_jspwiki_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -22183,8 +21735,7 @@ async def index_apache_kafka_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22202,7 +21753,7 @@ async def index_apache_kafka_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination: """Return vulnerability data stored in index \"apache-kafka\" @@ -22242,10 +21793,8 @@ async def index_apache_kafka_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22298,8 +21847,7 @@ async def index_apache_kafka_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22348,8 +21896,7 @@ async def index_apache_kafka_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22367,7 +21914,7 @@ async def index_apache_kafka_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination]: """Return vulnerability data stored in index \"apache-kafka\" @@ -22407,10 +21954,8 @@ async def index_apache_kafka_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22463,8 +22008,7 @@ async def index_apache_kafka_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22513,8 +22057,7 @@ async def index_apache_kafka_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22532,7 +22075,7 @@ async def index_apache_kafka_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-kafka\" @@ -22572,10 +22115,8 @@ async def index_apache_kafka_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22628,8 +22169,7 @@ async def index_apache_kafka_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22673,8 +22213,7 @@ def _index_apache_kafka_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22687,7 +22226,10 @@ def _index_apache_kafka_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -22771,13 +22313,9 @@ def _index_apache_kafka_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -22860,8 +22398,7 @@ async def index_apache_loggingservices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22879,7 +22416,7 @@ async def index_apache_loggingservices_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -22919,10 +22456,8 @@ async def index_apache_loggingservices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22975,8 +22510,7 @@ async def index_apache_loggingservices_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23025,8 +22559,7 @@ async def index_apache_loggingservices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23044,7 +22577,7 @@ async def index_apache_loggingservices_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination]: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -23084,10 +22617,8 @@ async def index_apache_loggingservices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23140,8 +22671,7 @@ async def index_apache_loggingservices_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23190,8 +22720,7 @@ async def index_apache_loggingservices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23209,7 +22738,7 @@ async def index_apache_loggingservices_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -23249,10 +22778,8 @@ async def index_apache_loggingservices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23305,8 +22832,7 @@ async def index_apache_loggingservices_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23350,8 +22876,7 @@ def _index_apache_loggingservices_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -23364,7 +22889,10 @@ def _index_apache_loggingservices_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -23448,13 +22976,9 @@ def _index_apache_loggingservices_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -23537,8 +23061,7 @@ async def index_apache_nifi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23556,7 +23079,7 @@ async def index_apache_nifi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination: """Return vulnerability data stored in index \"apache-nifi\" @@ -23596,10 +23119,8 @@ async def index_apache_nifi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23652,8 +23173,7 @@ async def index_apache_nifi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23702,8 +23222,7 @@ async def index_apache_nifi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23721,7 +23240,7 @@ async def index_apache_nifi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination]: """Return vulnerability data stored in index \"apache-nifi\" @@ -23761,10 +23280,8 @@ async def index_apache_nifi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23817,8 +23334,7 @@ async def index_apache_nifi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23867,8 +23383,7 @@ async def index_apache_nifi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23886,7 +23401,7 @@ async def index_apache_nifi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-nifi\" @@ -23926,10 +23441,8 @@ async def index_apache_nifi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23982,8 +23495,7 @@ async def index_apache_nifi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24027,8 +23539,7 @@ def _index_apache_nifi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24041,7 +23552,10 @@ def _index_apache_nifi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -24125,13 +23639,9 @@ def _index_apache_nifi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -24214,8 +23724,7 @@ async def index_apache_ofbiz_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24233,7 +23742,7 @@ async def index_apache_ofbiz_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24273,10 +23782,8 @@ async def index_apache_ofbiz_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24329,8 +23836,7 @@ async def index_apache_ofbiz_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24379,8 +23885,7 @@ async def index_apache_ofbiz_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24398,7 +23903,7 @@ async def index_apache_ofbiz_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination]: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24438,10 +23943,8 @@ async def index_apache_ofbiz_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24494,8 +23997,7 @@ async def index_apache_ofbiz_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24544,8 +24046,7 @@ async def index_apache_ofbiz_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24563,7 +24064,7 @@ async def index_apache_ofbiz_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24603,10 +24104,8 @@ async def index_apache_ofbiz_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24659,8 +24158,7 @@ async def index_apache_ofbiz_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24704,8 +24202,7 @@ def _index_apache_ofbiz_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24718,7 +24215,10 @@ def _index_apache_ofbiz_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -24802,13 +24302,9 @@ def _index_apache_ofbiz_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -24891,8 +24387,7 @@ async def index_apache_openmeetings_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24910,7 +24405,7 @@ async def index_apache_openmeetings_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -24950,10 +24445,8 @@ async def index_apache_openmeetings_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25006,8 +24499,7 @@ async def index_apache_openmeetings_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25056,8 +24548,7 @@ async def index_apache_openmeetings_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25075,7 +24566,7 @@ async def index_apache_openmeetings_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination]: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -25115,10 +24606,8 @@ async def index_apache_openmeetings_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25171,8 +24660,7 @@ async def index_apache_openmeetings_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25221,8 +24709,7 @@ async def index_apache_openmeetings_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25240,7 +24727,7 @@ async def index_apache_openmeetings_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -25280,10 +24767,8 @@ async def index_apache_openmeetings_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25336,8 +24821,7 @@ async def index_apache_openmeetings_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25381,8 +24865,7 @@ def _index_apache_openmeetings_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -25395,7 +24878,10 @@ def _index_apache_openmeetings_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -25479,13 +24965,9 @@ def _index_apache_openmeetings_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -25568,8 +25050,7 @@ async def index_apache_openoffice_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25587,7 +25068,7 @@ async def index_apache_openoffice_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25627,10 +25108,8 @@ async def index_apache_openoffice_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25683,8 +25162,7 @@ async def index_apache_openoffice_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25733,8 +25211,7 @@ async def index_apache_openoffice_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25752,7 +25229,7 @@ async def index_apache_openoffice_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination]: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25792,10 +25269,8 @@ async def index_apache_openoffice_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25848,8 +25323,7 @@ async def index_apache_openoffice_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25898,8 +25372,7 @@ async def index_apache_openoffice_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25917,7 +25390,7 @@ async def index_apache_openoffice_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25957,10 +25430,8 @@ async def index_apache_openoffice_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26013,8 +25484,7 @@ async def index_apache_openoffice_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26058,8 +25528,7 @@ def _index_apache_openoffice_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26072,7 +25541,10 @@ def _index_apache_openoffice_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -26156,13 +25628,9 @@ def _index_apache_openoffice_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -26245,8 +25713,7 @@ async def index_apache_pulsar_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26264,7 +25731,7 @@ async def index_apache_pulsar_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26304,10 +25771,8 @@ async def index_apache_pulsar_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26360,8 +25825,7 @@ async def index_apache_pulsar_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26410,8 +25874,7 @@ async def index_apache_pulsar_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26429,7 +25892,7 @@ async def index_apache_pulsar_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination]: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26469,10 +25932,8 @@ async def index_apache_pulsar_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26525,8 +25986,7 @@ async def index_apache_pulsar_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26575,8 +26035,7 @@ async def index_apache_pulsar_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26594,7 +26053,7 @@ async def index_apache_pulsar_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26634,10 +26093,8 @@ async def index_apache_pulsar_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26690,8 +26147,7 @@ async def index_apache_pulsar_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26735,8 +26191,7 @@ def _index_apache_pulsar_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26749,7 +26204,10 @@ def _index_apache_pulsar_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -26833,13 +26291,9 @@ def _index_apache_pulsar_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -26922,8 +26376,7 @@ async def index_apache_shiro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26941,7 +26394,7 @@ async def index_apache_shiro_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination: """Return vulnerability data stored in index \"apache-shiro\" @@ -26981,10 +26434,8 @@ async def index_apache_shiro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27037,8 +26488,7 @@ async def index_apache_shiro_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27087,8 +26537,7 @@ async def index_apache_shiro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27106,7 +26555,7 @@ async def index_apache_shiro_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination]: """Return vulnerability data stored in index \"apache-shiro\" @@ -27146,10 +26595,8 @@ async def index_apache_shiro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27202,8 +26649,7 @@ async def index_apache_shiro_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27252,8 +26698,7 @@ async def index_apache_shiro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27271,7 +26716,7 @@ async def index_apache_shiro_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-shiro\" @@ -27311,10 +26756,8 @@ async def index_apache_shiro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27367,8 +26810,7 @@ async def index_apache_shiro_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27412,8 +26854,7 @@ def _index_apache_shiro_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -27426,7 +26867,10 @@ def _index_apache_shiro_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -27510,13 +26954,9 @@ def _index_apache_shiro_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -27599,8 +27039,7 @@ async def index_apache_spark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27618,7 +27057,7 @@ async def index_apache_spark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination: """Return vulnerability data stored in index \"apache-spark\" @@ -27658,10 +27097,8 @@ async def index_apache_spark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27714,8 +27151,7 @@ async def index_apache_spark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27764,8 +27200,7 @@ async def index_apache_spark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27783,7 +27218,7 @@ async def index_apache_spark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination]: """Return vulnerability data stored in index \"apache-spark\" @@ -27823,10 +27258,8 @@ async def index_apache_spark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27879,8 +27312,7 @@ async def index_apache_spark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27929,8 +27361,7 @@ async def index_apache_spark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27948,7 +27379,7 @@ async def index_apache_spark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-spark\" @@ -27988,10 +27419,8 @@ async def index_apache_spark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28044,8 +27473,7 @@ async def index_apache_spark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28089,8 +27517,7 @@ def _index_apache_spark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28103,7 +27530,10 @@ def _index_apache_spark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -28187,13 +27617,9 @@ def _index_apache_spark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -28276,8 +27702,7 @@ async def index_apache_struts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28295,7 +27720,7 @@ async def index_apache_struts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination: """Return vulnerability data stored in index \"apache-struts\" @@ -28335,10 +27760,8 @@ async def index_apache_struts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28391,8 +27814,7 @@ async def index_apache_struts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28441,8 +27863,7 @@ async def index_apache_struts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28460,7 +27881,7 @@ async def index_apache_struts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination]: """Return vulnerability data stored in index \"apache-struts\" @@ -28500,10 +27921,8 @@ async def index_apache_struts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28556,8 +27975,7 @@ async def index_apache_struts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28606,8 +28024,7 @@ async def index_apache_struts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28625,7 +28042,7 @@ async def index_apache_struts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-struts\" @@ -28665,10 +28082,8 @@ async def index_apache_struts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28721,8 +28136,7 @@ async def index_apache_struts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28766,8 +28180,7 @@ def _index_apache_struts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28780,7 +28193,10 @@ def _index_apache_struts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -28864,13 +28280,9 @@ def _index_apache_struts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -28953,8 +28365,7 @@ async def index_apache_subversion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28972,7 +28383,7 @@ async def index_apache_subversion_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination: """Return vulnerability data stored in index \"apache-subversion\" @@ -29012,10 +28423,8 @@ async def index_apache_subversion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29068,8 +28477,7 @@ async def index_apache_subversion_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29118,8 +28526,7 @@ async def index_apache_subversion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29137,7 +28544,7 @@ async def index_apache_subversion_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination]: """Return vulnerability data stored in index \"apache-subversion\" @@ -29177,10 +28584,8 @@ async def index_apache_subversion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29233,8 +28638,7 @@ async def index_apache_subversion_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29283,8 +28687,7 @@ async def index_apache_subversion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29302,7 +28705,7 @@ async def index_apache_subversion_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-subversion\" @@ -29342,10 +28745,8 @@ async def index_apache_subversion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29398,8 +28799,7 @@ async def index_apache_subversion_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29443,8 +28843,7 @@ def _index_apache_subversion_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -29457,7 +28856,10 @@ def _index_apache_subversion_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -29541,13 +28943,9 @@ def _index_apache_subversion_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -29630,8 +29028,7 @@ async def index_apache_superset_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29649,7 +29046,7 @@ async def index_apache_superset_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination: """Return vulnerability data stored in index \"apache-superset\" @@ -29689,10 +29086,8 @@ async def index_apache_superset_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29745,8 +29140,7 @@ async def index_apache_superset_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29795,8 +29189,7 @@ async def index_apache_superset_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29814,7 +29207,7 @@ async def index_apache_superset_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination]: """Return vulnerability data stored in index \"apache-superset\" @@ -29854,10 +29247,8 @@ async def index_apache_superset_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29910,8 +29301,7 @@ async def index_apache_superset_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29960,8 +29350,7 @@ async def index_apache_superset_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29979,7 +29368,7 @@ async def index_apache_superset_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-superset\" @@ -30019,10 +29408,8 @@ async def index_apache_superset_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30075,8 +29462,7 @@ async def index_apache_superset_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30120,8 +29506,7 @@ def _index_apache_superset_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30134,7 +29519,10 @@ def _index_apache_superset_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -30218,13 +29606,9 @@ def _index_apache_superset_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -30307,8 +29691,7 @@ async def index_apache_tomcat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30326,7 +29709,7 @@ async def index_apache_tomcat_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30366,10 +29749,8 @@ async def index_apache_tomcat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30422,8 +29803,7 @@ async def index_apache_tomcat_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30472,8 +29852,7 @@ async def index_apache_tomcat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30491,7 +29870,7 @@ async def index_apache_tomcat_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination]: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30531,10 +29910,8 @@ async def index_apache_tomcat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30587,8 +29964,7 @@ async def index_apache_tomcat_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30637,8 +30013,7 @@ async def index_apache_tomcat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30656,7 +30031,7 @@ async def index_apache_tomcat_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30696,10 +30071,8 @@ async def index_apache_tomcat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30752,8 +30125,7 @@ async def index_apache_tomcat_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30797,8 +30169,7 @@ def _index_apache_tomcat_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30811,7 +30182,10 @@ def _index_apache_tomcat_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -30895,13 +30269,9 @@ def _index_apache_tomcat_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -30984,8 +30354,7 @@ async def index_apache_zookeeper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31003,7 +30372,7 @@ async def index_apache_zookeeper_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31043,10 +30412,8 @@ async def index_apache_zookeeper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31099,8 +30466,7 @@ async def index_apache_zookeeper_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31149,8 +30515,7 @@ async def index_apache_zookeeper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31168,7 +30533,7 @@ async def index_apache_zookeeper_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination]: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31208,10 +30573,8 @@ async def index_apache_zookeeper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31264,8 +30627,7 @@ async def index_apache_zookeeper_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31314,8 +30676,7 @@ async def index_apache_zookeeper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31333,7 +30694,7 @@ async def index_apache_zookeeper_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31373,10 +30734,8 @@ async def index_apache_zookeeper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31429,8 +30788,7 @@ async def index_apache_zookeeper_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31474,8 +30832,7 @@ def _index_apache_zookeeper_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -31488,7 +30845,10 @@ def _index_apache_zookeeper_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -31572,13 +30932,9 @@ def _index_apache_zookeeper_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -31661,8 +31017,7 @@ async def index_appcheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31680,7 +31035,7 @@ async def index_appcheck_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination: """Return vulnerability data stored in index \"appcheck\" @@ -31720,10 +31075,8 @@ async def index_appcheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31776,8 +31129,7 @@ async def index_appcheck_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31826,8 +31178,7 @@ async def index_appcheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31845,7 +31196,7 @@ async def index_appcheck_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination]: """Return vulnerability data stored in index \"appcheck\" @@ -31885,10 +31236,8 @@ async def index_appcheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31941,8 +31290,7 @@ async def index_appcheck_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31991,8 +31339,7 @@ async def index_appcheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32010,7 +31357,7 @@ async def index_appcheck_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"appcheck\" @@ -32050,10 +31397,8 @@ async def index_appcheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32106,8 +31451,7 @@ async def index_appcheck_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32151,8 +31495,7 @@ def _index_appcheck_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32165,7 +31508,10 @@ def _index_appcheck_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -32249,13 +31595,9 @@ def _index_appcheck_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -32338,8 +31680,7 @@ async def index_appgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32357,7 +31698,7 @@ async def index_appgate_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination: """Return vulnerability data stored in index \"appgate\" @@ -32397,10 +31738,8 @@ async def index_appgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32453,8 +31792,7 @@ async def index_appgate_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32503,8 +31841,7 @@ async def index_appgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32522,7 +31859,7 @@ async def index_appgate_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination]: """Return vulnerability data stored in index \"appgate\" @@ -32562,10 +31899,8 @@ async def index_appgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32618,8 +31953,7 @@ async def index_appgate_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32668,8 +32002,7 @@ async def index_appgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32687,7 +32020,7 @@ async def index_appgate_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"appgate\" @@ -32727,10 +32060,8 @@ async def index_appgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32783,8 +32114,7 @@ async def index_appgate_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32828,8 +32158,7 @@ def _index_appgate_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32842,7 +32171,10 @@ def _index_appgate_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -32926,13 +32258,9 @@ def _index_appgate_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -33015,8 +32343,7 @@ async def index_apple_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33034,7 +32361,7 @@ async def index_apple_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination: """Return vulnerability data stored in index \"apple\" @@ -33074,10 +32401,8 @@ async def index_apple_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33130,8 +32455,7 @@ async def index_apple_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33180,8 +32504,7 @@ async def index_apple_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33199,7 +32522,7 @@ async def index_apple_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"apple\" @@ -33239,10 +32562,8 @@ async def index_apple_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33295,8 +32616,7 @@ async def index_apple_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33345,8 +32665,7 @@ async def index_apple_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33364,7 +32683,7 @@ async def index_apple_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apple\" @@ -33404,10 +32723,8 @@ async def index_apple_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33460,8 +32777,7 @@ async def index_apple_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33505,8 +32821,7 @@ def _index_apple_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -33519,7 +32834,10 @@ def _index_apple_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -33603,13 +32921,9 @@ def _index_apple_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -33692,8 +33006,7 @@ async def index_arch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33711,7 +33024,7 @@ async def index_arch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination: """Return vulnerability data stored in index \"arch\" @@ -33751,10 +33064,8 @@ async def index_arch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33807,8 +33118,7 @@ async def index_arch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33857,8 +33167,7 @@ async def index_arch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33876,7 +33185,7 @@ async def index_arch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination]: """Return vulnerability data stored in index \"arch\" @@ -33916,10 +33225,8 @@ async def index_arch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33972,8 +33279,7 @@ async def index_arch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34022,8 +33328,7 @@ async def index_arch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34041,7 +33346,7 @@ async def index_arch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"arch\" @@ -34081,10 +33386,8 @@ async def index_arch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34137,8 +33440,7 @@ async def index_arch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34182,8 +33484,7 @@ def _index_arch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34196,7 +33497,10 @@ def _index_arch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -34280,13 +33584,9 @@ def _index_arch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -34369,8 +33669,7 @@ async def index_arista_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34388,7 +33687,7 @@ async def index_arista_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination: """Return vulnerability data stored in index \"arista\" @@ -34428,10 +33727,8 @@ async def index_arista_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34484,8 +33781,7 @@ async def index_arista_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34534,8 +33830,7 @@ async def index_arista_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34553,7 +33848,7 @@ async def index_arista_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination]: """Return vulnerability data stored in index \"arista\" @@ -34593,10 +33888,8 @@ async def index_arista_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34649,8 +33942,7 @@ async def index_arista_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34699,8 +33991,7 @@ async def index_arista_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34718,7 +34009,7 @@ async def index_arista_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"arista\" @@ -34758,10 +34049,8 @@ async def index_arista_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34814,8 +34103,7 @@ async def index_arista_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34859,8 +34147,7 @@ def _index_arista_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34873,7 +34160,10 @@ def _index_arista_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -34957,13 +34247,9 @@ def _index_arista_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -35046,8 +34332,7 @@ async def index_aruba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35065,7 +34350,7 @@ async def index_aruba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination: """Return vulnerability data stored in index \"aruba\" @@ -35105,10 +34390,8 @@ async def index_aruba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35161,8 +34444,7 @@ async def index_aruba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35211,8 +34493,7 @@ async def index_aruba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35230,7 +34511,7 @@ async def index_aruba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination]: """Return vulnerability data stored in index \"aruba\" @@ -35270,10 +34551,8 @@ async def index_aruba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35326,8 +34605,7 @@ async def index_aruba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35376,8 +34654,7 @@ async def index_aruba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35395,7 +34672,7 @@ async def index_aruba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aruba\" @@ -35435,10 +34712,8 @@ async def index_aruba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35491,8 +34766,7 @@ async def index_aruba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35536,8 +34810,7 @@ def _index_aruba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -35550,7 +34823,10 @@ def _index_aruba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -35634,13 +34910,9 @@ def _index_aruba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -35723,8 +34995,7 @@ async def index_asrg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35742,7 +35013,7 @@ async def index_asrg_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination: """Return vulnerability data stored in index \"asrg\" @@ -35782,10 +35053,8 @@ async def index_asrg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35838,8 +35107,7 @@ async def index_asrg_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35888,8 +35156,7 @@ async def index_asrg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35907,7 +35174,7 @@ async def index_asrg_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination]: """Return vulnerability data stored in index \"asrg\" @@ -35947,10 +35214,8 @@ async def index_asrg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36003,8 +35268,7 @@ async def index_asrg_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36053,8 +35317,7 @@ async def index_asrg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36072,7 +35335,7 @@ async def index_asrg_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asrg\" @@ -36112,10 +35375,8 @@ async def index_asrg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36168,8 +35429,7 @@ async def index_asrg_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36213,8 +35473,7 @@ def _index_asrg_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36227,7 +35486,10 @@ def _index_asrg_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -36311,13 +35573,9 @@ def _index_asrg_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -36400,8 +35658,7 @@ async def index_assetnote_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36419,7 +35676,7 @@ async def index_assetnote_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination: """Return vulnerability data stored in index \"assetnote\" @@ -36459,10 +35716,8 @@ async def index_assetnote_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36515,8 +35770,7 @@ async def index_assetnote_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36565,8 +35819,7 @@ async def index_assetnote_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36584,7 +35837,7 @@ async def index_assetnote_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination]: """Return vulnerability data stored in index \"assetnote\" @@ -36624,10 +35877,8 @@ async def index_assetnote_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36680,8 +35931,7 @@ async def index_assetnote_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36730,8 +35980,7 @@ async def index_assetnote_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36749,7 +35998,7 @@ async def index_assetnote_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"assetnote\" @@ -36789,10 +36038,8 @@ async def index_assetnote_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36845,8 +36092,7 @@ async def index_assetnote_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36890,8 +36136,7 @@ def _index_assetnote_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36904,7 +36149,10 @@ def _index_assetnote_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -36988,13 +36236,9 @@ def _index_assetnote_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -37077,8 +36321,7 @@ async def index_asterisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37096,7 +36339,7 @@ async def index_asterisk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination: """Return vulnerability data stored in index \"asterisk\" @@ -37136,10 +36379,8 @@ async def index_asterisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37192,8 +36433,7 @@ async def index_asterisk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37242,8 +36482,7 @@ async def index_asterisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37261,7 +36500,7 @@ async def index_asterisk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination]: """Return vulnerability data stored in index \"asterisk\" @@ -37301,10 +36540,8 @@ async def index_asterisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37357,8 +36594,7 @@ async def index_asterisk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37407,8 +36643,7 @@ async def index_asterisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37426,7 +36661,7 @@ async def index_asterisk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asterisk\" @@ -37466,10 +36701,8 @@ async def index_asterisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37522,8 +36755,7 @@ async def index_asterisk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37567,8 +36799,7 @@ def _index_asterisk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -37581,7 +36812,10 @@ def _index_asterisk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -37665,13 +36899,9 @@ def _index_asterisk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -37754,8 +36984,7 @@ async def index_astra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37773,7 +37002,7 @@ async def index_astra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination: """Return vulnerability data stored in index \"astra\" @@ -37813,10 +37042,8 @@ async def index_astra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37869,8 +37096,7 @@ async def index_astra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37919,8 +37145,7 @@ async def index_astra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37938,7 +37163,7 @@ async def index_astra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination]: """Return vulnerability data stored in index \"astra\" @@ -37978,10 +37203,8 @@ async def index_astra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38034,8 +37257,7 @@ async def index_astra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38084,8 +37306,7 @@ async def index_astra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38103,7 +37324,7 @@ async def index_astra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"astra\" @@ -38143,10 +37364,8 @@ async def index_astra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38199,8 +37418,7 @@ async def index_astra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38244,8 +37462,7 @@ def _index_astra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38258,7 +37475,10 @@ def _index_astra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -38342,13 +37562,9 @@ def _index_astra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -38431,8 +37647,7 @@ async def index_asus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38450,7 +37665,7 @@ async def index_asus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination: """Return vulnerability data stored in index \"asus\" @@ -38490,10 +37705,8 @@ async def index_asus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38546,8 +37759,7 @@ async def index_asus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38596,8 +37808,7 @@ async def index_asus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38615,7 +37826,7 @@ async def index_asus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination]: """Return vulnerability data stored in index \"asus\" @@ -38655,10 +37866,8 @@ async def index_asus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38711,8 +37920,7 @@ async def index_asus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38761,8 +37969,7 @@ async def index_asus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38780,7 +37987,7 @@ async def index_asus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asus\" @@ -38820,10 +38027,8 @@ async def index_asus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38876,8 +38081,7 @@ async def index_asus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38921,8 +38125,7 @@ def _index_asus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38935,7 +38138,10 @@ def _index_asus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -39019,13 +38225,9 @@ def _index_asus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -39108,8 +38310,7 @@ async def index_atlassian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39127,7 +38328,7 @@ async def index_atlassian_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination: """Return vulnerability data stored in index \"atlassian\" @@ -39167,10 +38368,8 @@ async def index_atlassian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39223,8 +38422,7 @@ async def index_atlassian_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39273,8 +38471,7 @@ async def index_atlassian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39292,7 +38489,7 @@ async def index_atlassian_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"atlassian\" @@ -39332,10 +38529,8 @@ async def index_atlassian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39388,8 +38583,7 @@ async def index_atlassian_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39438,8 +38632,7 @@ async def index_atlassian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39457,7 +38650,7 @@ async def index_atlassian_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atlassian\" @@ -39497,10 +38690,8 @@ async def index_atlassian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39553,8 +38744,7 @@ async def index_atlassian_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39598,8 +38788,7 @@ def _index_atlassian_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39612,7 +38801,10 @@ def _index_atlassian_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -39696,13 +38888,9 @@ def _index_atlassian_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -39785,8 +38973,7 @@ async def index_atlassian_vulns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39804,7 +38991,7 @@ async def index_atlassian_vulns_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -39844,10 +39031,8 @@ async def index_atlassian_vulns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39900,8 +39085,7 @@ async def index_atlassian_vulns_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39950,8 +39134,7 @@ async def index_atlassian_vulns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39969,7 +39152,7 @@ async def index_atlassian_vulns_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination]: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -40009,10 +39192,8 @@ async def index_atlassian_vulns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40065,8 +39246,7 @@ async def index_atlassian_vulns_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40115,8 +39295,7 @@ async def index_atlassian_vulns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40134,7 +39313,7 @@ async def index_atlassian_vulns_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -40174,10 +39353,8 @@ async def index_atlassian_vulns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40230,8 +39407,7 @@ async def index_atlassian_vulns_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40275,8 +39451,7 @@ def _index_atlassian_vulns_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40289,7 +39464,10 @@ def _index_atlassian_vulns_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -40373,13 +39551,9 @@ def _index_atlassian_vulns_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -40462,8 +39636,7 @@ async def index_atredis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40481,7 +39654,7 @@ async def index_atredis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination: """Return vulnerability data stored in index \"atredis\" @@ -40521,10 +39694,8 @@ async def index_atredis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40577,8 +39748,7 @@ async def index_atredis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40627,8 +39797,7 @@ async def index_atredis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40646,7 +39815,7 @@ async def index_atredis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination]: """Return vulnerability data stored in index \"atredis\" @@ -40686,10 +39855,8 @@ async def index_atredis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40742,8 +39909,7 @@ async def index_atredis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40792,8 +39958,7 @@ async def index_atredis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40811,7 +39976,7 @@ async def index_atredis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atredis\" @@ -40851,10 +40016,8 @@ async def index_atredis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40907,8 +40070,7 @@ async def index_atredis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40952,8 +40114,7 @@ def _index_atredis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40966,7 +40127,10 @@ def _index_atredis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -41050,13 +40214,9 @@ def _index_atredis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -41139,8 +40299,7 @@ async def index_audiocodes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41158,7 +40317,7 @@ async def index_audiocodes_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination: """Return vulnerability data stored in index \"audiocodes\" @@ -41198,10 +40357,8 @@ async def index_audiocodes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41254,8 +40411,7 @@ async def index_audiocodes_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41304,8 +40460,7 @@ async def index_audiocodes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41323,7 +40478,7 @@ async def index_audiocodes_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination]: """Return vulnerability data stored in index \"audiocodes\" @@ -41363,10 +40518,8 @@ async def index_audiocodes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41419,8 +40572,7 @@ async def index_audiocodes_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41469,8 +40621,7 @@ async def index_audiocodes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41488,7 +40639,7 @@ async def index_audiocodes_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"audiocodes\" @@ -41528,10 +40679,8 @@ async def index_audiocodes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41584,8 +40733,7 @@ async def index_audiocodes_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41629,8 +40777,7 @@ def _index_audiocodes_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41643,7 +40790,10 @@ def _index_audiocodes_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -41727,13 +40877,9 @@ def _index_audiocodes_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -41816,8 +40962,7 @@ async def index_auscert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41835,7 +40980,7 @@ async def index_auscert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination: """Return vulnerability data stored in index \"auscert\" @@ -41875,10 +41020,8 @@ async def index_auscert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41931,8 +41074,7 @@ async def index_auscert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41981,8 +41123,7 @@ async def index_auscert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42000,7 +41141,7 @@ async def index_auscert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination]: """Return vulnerability data stored in index \"auscert\" @@ -42040,10 +41181,8 @@ async def index_auscert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42096,8 +41235,7 @@ async def index_auscert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42146,8 +41284,7 @@ async def index_auscert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42165,7 +41302,7 @@ async def index_auscert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"auscert\" @@ -42205,10 +41342,8 @@ async def index_auscert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42261,8 +41396,7 @@ async def index_auscert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42306,8 +41440,7 @@ def _index_auscert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42320,7 +41453,10 @@ def _index_auscert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -42404,13 +41540,9 @@ def _index_auscert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -42493,8 +41625,7 @@ async def index_autodesk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42512,7 +41643,7 @@ async def index_autodesk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination: """Return vulnerability data stored in index \"autodesk\" @@ -42552,10 +41683,8 @@ async def index_autodesk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42608,8 +41737,7 @@ async def index_autodesk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42658,8 +41786,7 @@ async def index_autodesk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42677,7 +41804,7 @@ async def index_autodesk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination]: """Return vulnerability data stored in index \"autodesk\" @@ -42717,10 +41844,8 @@ async def index_autodesk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42773,8 +41898,7 @@ async def index_autodesk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42823,8 +41947,7 @@ async def index_autodesk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42842,7 +41965,7 @@ async def index_autodesk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"autodesk\" @@ -42882,10 +42005,8 @@ async def index_autodesk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42938,8 +42059,7 @@ async def index_autodesk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42983,8 +42103,7 @@ def _index_autodesk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42997,7 +42116,10 @@ def _index_autodesk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -43081,13 +42203,9 @@ def _index_autodesk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -43170,8 +42288,7 @@ async def index_avaya_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43189,7 +42306,7 @@ async def index_avaya_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination: """Return vulnerability data stored in index \"avaya\" @@ -43229,10 +42346,8 @@ async def index_avaya_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43285,8 +42400,7 @@ async def index_avaya_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43335,8 +42449,7 @@ async def index_avaya_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43354,7 +42467,7 @@ async def index_avaya_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination]: """Return vulnerability data stored in index \"avaya\" @@ -43394,10 +42507,8 @@ async def index_avaya_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43450,8 +42561,7 @@ async def index_avaya_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43500,8 +42610,7 @@ async def index_avaya_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43519,7 +42628,7 @@ async def index_avaya_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avaya\" @@ -43559,10 +42668,8 @@ async def index_avaya_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43615,8 +42722,7 @@ async def index_avaya_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43660,8 +42766,7 @@ def _index_avaya_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43674,7 +42779,10 @@ def _index_avaya_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -43758,13 +42866,9 @@ def _index_avaya_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -43847,8 +42951,7 @@ async def index_aveva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43866,7 +42969,7 @@ async def index_aveva_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"aveva\" @@ -43906,10 +43009,8 @@ async def index_aveva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43962,8 +43063,7 @@ async def index_aveva_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44012,8 +43112,7 @@ async def index_aveva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44031,7 +43130,7 @@ async def index_aveva_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"aveva\" @@ -44071,10 +43170,8 @@ async def index_aveva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44127,8 +43224,7 @@ async def index_aveva_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44177,8 +43273,7 @@ async def index_aveva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44196,7 +43291,7 @@ async def index_aveva_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aveva\" @@ -44236,10 +43331,8 @@ async def index_aveva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44292,8 +43385,7 @@ async def index_aveva_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44337,8 +43429,7 @@ def _index_aveva_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -44351,7 +43442,10 @@ def _index_aveva_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -44435,13 +43529,9 @@ def _index_aveva_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -44524,8 +43614,7 @@ async def index_avidml_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44543,7 +43632,7 @@ async def index_avidml_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination: """Return vulnerability data stored in index \"avidml-advs\" @@ -44583,10 +43672,8 @@ async def index_avidml_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44639,8 +43726,7 @@ async def index_avidml_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44689,8 +43775,7 @@ async def index_avidml_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44708,7 +43793,7 @@ async def index_avidml_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination]: """Return vulnerability data stored in index \"avidml-advs\" @@ -44748,10 +43833,8 @@ async def index_avidml_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44804,8 +43887,7 @@ async def index_avidml_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44854,8 +43936,7 @@ async def index_avidml_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44873,7 +43954,7 @@ async def index_avidml_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avidml-advs\" @@ -44913,10 +43994,8 @@ async def index_avidml_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44969,8 +44048,7 @@ async def index_avidml_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45014,8 +44092,7 @@ def _index_avidml_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45028,7 +44105,10 @@ def _index_avidml_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -45112,13 +44192,9 @@ def _index_avidml_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -45201,8 +44277,7 @@ async def index_avigilon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45220,7 +44295,7 @@ async def index_avigilon_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination: """Return vulnerability data stored in index \"avigilon\" @@ -45260,10 +44335,8 @@ async def index_avigilon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45316,8 +44389,7 @@ async def index_avigilon_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45366,8 +44438,7 @@ async def index_avigilon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45385,7 +44456,7 @@ async def index_avigilon_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination]: """Return vulnerability data stored in index \"avigilon\" @@ -45425,10 +44496,8 @@ async def index_avigilon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45481,8 +44550,7 @@ async def index_avigilon_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45531,8 +44599,7 @@ async def index_avigilon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45550,7 +44617,7 @@ async def index_avigilon_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avigilon\" @@ -45590,10 +44657,8 @@ async def index_avigilon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45646,8 +44711,7 @@ async def index_avigilon_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45691,8 +44755,7 @@ def _index_avigilon_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45705,7 +44768,10 @@ def _index_avigilon_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -45789,13 +44855,9 @@ def _index_avigilon_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -45878,8 +44940,7 @@ async def index_aws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45897,7 +44958,7 @@ async def index_aws_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination: """Return vulnerability data stored in index \"aws\" @@ -45937,10 +44998,8 @@ async def index_aws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45993,8 +45052,7 @@ async def index_aws_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46043,8 +45101,7 @@ async def index_aws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46062,7 +45119,7 @@ async def index_aws_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination]: """Return vulnerability data stored in index \"aws\" @@ -46102,10 +45159,8 @@ async def index_aws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46158,8 +45213,7 @@ async def index_aws_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46208,8 +45262,7 @@ async def index_aws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46227,7 +45280,7 @@ async def index_aws_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aws\" @@ -46267,10 +45320,8 @@ async def index_aws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46323,8 +45374,7 @@ async def index_aws_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46368,8 +45418,7 @@ def _index_aws_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -46382,7 +45431,10 @@ def _index_aws_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -46466,13 +45518,9 @@ def _index_aws_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -46555,8 +45603,7 @@ async def index_axis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46574,7 +45621,7 @@ async def index_axis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination: """Return vulnerability data stored in index \"axis\" @@ -46614,10 +45661,8 @@ async def index_axis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46670,8 +45715,7 @@ async def index_axis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46720,8 +45764,7 @@ async def index_axis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46739,7 +45782,7 @@ async def index_axis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination]: """Return vulnerability data stored in index \"axis\" @@ -46779,10 +45822,8 @@ async def index_axis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46835,8 +45876,7 @@ async def index_axis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46885,8 +45925,7 @@ async def index_axis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46904,7 +45943,7 @@ async def index_axis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"axis\" @@ -46944,10 +45983,8 @@ async def index_axis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47000,8 +46037,7 @@ async def index_axis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47045,8 +46081,7 @@ def _index_axis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47059,7 +46094,10 @@ def _index_axis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -47143,13 +46181,9 @@ def _index_axis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -47232,8 +46266,7 @@ async def index_azul_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47251,7 +46284,7 @@ async def index_azul_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination: """Return vulnerability data stored in index \"azul\" @@ -47291,10 +46324,8 @@ async def index_azul_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47347,8 +46378,7 @@ async def index_azul_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47397,8 +46427,7 @@ async def index_azul_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47416,7 +46445,7 @@ async def index_azul_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination]: """Return vulnerability data stored in index \"azul\" @@ -47456,10 +46485,8 @@ async def index_azul_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47512,8 +46539,7 @@ async def index_azul_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47562,8 +46588,7 @@ async def index_azul_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47581,7 +46606,7 @@ async def index_azul_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"azul\" @@ -47621,10 +46646,8 @@ async def index_azul_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47677,8 +46700,7 @@ async def index_azul_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47722,8 +46744,7 @@ def _index_azul_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47736,7 +46757,10 @@ def _index_azul_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -47820,13 +46844,9 @@ def _index_azul_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -47909,8 +46929,7 @@ async def index_bandr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47928,7 +46947,7 @@ async def index_bandr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination: """Return vulnerability data stored in index \"bandr\" @@ -47968,10 +46987,8 @@ async def index_bandr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48024,8 +47041,7 @@ async def index_bandr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48074,8 +47090,7 @@ async def index_bandr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48093,7 +47108,7 @@ async def index_bandr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination]: """Return vulnerability data stored in index \"bandr\" @@ -48133,10 +47148,8 @@ async def index_bandr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48189,8 +47202,7 @@ async def index_bandr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48239,8 +47251,7 @@ async def index_bandr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48258,7 +47269,7 @@ async def index_bandr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bandr\" @@ -48298,10 +47309,8 @@ async def index_bandr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48354,8 +47363,7 @@ async def index_bandr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48399,8 +47407,7 @@ def _index_bandr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -48413,7 +47420,10 @@ def _index_bandr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -48497,13 +47507,9 @@ def _index_bandr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -48586,8 +47592,7 @@ async def index_baxter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48605,7 +47610,7 @@ async def index_baxter_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination: """Return vulnerability data stored in index \"baxter\" @@ -48645,10 +47650,8 @@ async def index_baxter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48701,8 +47704,7 @@ async def index_baxter_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48751,8 +47753,7 @@ async def index_baxter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48770,7 +47771,7 @@ async def index_baxter_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"baxter\" @@ -48810,10 +47811,8 @@ async def index_baxter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48866,8 +47865,7 @@ async def index_baxter_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48916,8 +47914,7 @@ async def index_baxter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48935,7 +47932,7 @@ async def index_baxter_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"baxter\" @@ -48975,10 +47972,8 @@ async def index_baxter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49031,8 +48026,7 @@ async def index_baxter_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49076,8 +48070,7 @@ def _index_baxter_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49090,7 +48083,10 @@ def _index_baxter_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -49174,13 +48170,9 @@ def _index_baxter_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -49263,8 +48255,7 @@ async def index_bbraun_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49282,7 +48273,7 @@ async def index_bbraun_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bbraun\" @@ -49322,10 +48313,8 @@ async def index_bbraun_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49378,8 +48367,7 @@ async def index_bbraun_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49428,8 +48416,7 @@ async def index_bbraun_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49447,7 +48434,7 @@ async def index_bbraun_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bbraun\" @@ -49487,10 +48474,8 @@ async def index_bbraun_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49543,8 +48528,7 @@ async def index_bbraun_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49593,8 +48577,7 @@ async def index_bbraun_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49612,7 +48595,7 @@ async def index_bbraun_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bbraun\" @@ -49652,10 +48635,8 @@ async def index_bbraun_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49708,8 +48689,7 @@ async def index_bbraun_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49753,8 +48733,7 @@ def _index_bbraun_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49767,7 +48746,10 @@ def _index_bbraun_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -49851,13 +48833,9 @@ def _index_bbraun_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -49940,8 +48918,7 @@ async def index_bd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49959,7 +48936,7 @@ async def index_bd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bd\" @@ -49999,10 +48976,8 @@ async def index_bd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50055,8 +49030,7 @@ async def index_bd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50105,8 +49079,7 @@ async def index_bd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50124,7 +49097,7 @@ async def index_bd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bd\" @@ -50164,10 +49137,8 @@ async def index_bd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50220,8 +49191,7 @@ async def index_bd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50270,8 +49240,7 @@ async def index_bd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50289,7 +49258,7 @@ async def index_bd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bd\" @@ -50329,10 +49298,8 @@ async def index_bd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50385,8 +49352,7 @@ async def index_bd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50430,8 +49396,7 @@ def _index_bd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -50444,7 +49409,10 @@ def _index_bd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -50528,13 +49496,9 @@ def _index_bd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -50617,8 +49581,7 @@ async def index_bdu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50636,7 +49599,7 @@ async def index_bdu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bdu\" @@ -50676,10 +49639,8 @@ async def index_bdu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50732,8 +49693,7 @@ async def index_bdu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50782,8 +49742,7 @@ async def index_bdu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50801,7 +49760,7 @@ async def index_bdu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bdu\" @@ -50841,10 +49800,8 @@ async def index_bdu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50897,8 +49854,7 @@ async def index_bdu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50947,8 +49903,7 @@ async def index_bdu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50966,7 +49921,7 @@ async def index_bdu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bdu\" @@ -51006,10 +49961,8 @@ async def index_bdu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51062,8 +50015,7 @@ async def index_bdu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51107,8 +50059,7 @@ def _index_bdu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51121,7 +50072,10 @@ def _index_bdu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -51205,13 +50159,9 @@ def _index_bdu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -51294,8 +50244,7 @@ async def index_beckhoff_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51313,7 +50262,7 @@ async def index_beckhoff_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination: """Return vulnerability data stored in index \"beckhoff\" @@ -51353,10 +50302,8 @@ async def index_beckhoff_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51409,8 +50356,7 @@ async def index_beckhoff_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51459,8 +50405,7 @@ async def index_beckhoff_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51478,7 +50423,7 @@ async def index_beckhoff_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"beckhoff\" @@ -51518,10 +50463,8 @@ async def index_beckhoff_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51574,8 +50517,7 @@ async def index_beckhoff_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51624,8 +50566,7 @@ async def index_beckhoff_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51643,7 +50584,7 @@ async def index_beckhoff_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beckhoff\" @@ -51683,10 +50624,8 @@ async def index_beckhoff_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51739,8 +50678,7 @@ async def index_beckhoff_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51784,8 +50722,7 @@ def _index_beckhoff_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51798,7 +50735,10 @@ def _index_beckhoff_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -51882,13 +50822,9 @@ def _index_beckhoff_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -51971,8 +50907,7 @@ async def index_beckman_coulter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51990,7 +50925,7 @@ async def index_beckman_coulter_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52030,10 +50965,8 @@ async def index_beckman_coulter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52086,8 +51019,7 @@ async def index_beckman_coulter_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52136,8 +51068,7 @@ async def index_beckman_coulter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52155,7 +51086,7 @@ async def index_beckman_coulter_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination]: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52195,10 +51126,8 @@ async def index_beckman_coulter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52251,8 +51180,7 @@ async def index_beckman_coulter_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52301,8 +51229,7 @@ async def index_beckman_coulter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52320,7 +51247,7 @@ async def index_beckman_coulter_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52360,10 +51287,8 @@ async def index_beckman_coulter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52416,8 +51341,7 @@ async def index_beckman_coulter_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52461,8 +51385,7 @@ def _index_beckman_coulter_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -52475,7 +51398,10 @@ def _index_beckman_coulter_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -52559,13 +51485,9 @@ def _index_beckman_coulter_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -52648,8 +51570,7 @@ async def index_belden_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52667,7 +51588,7 @@ async def index_belden_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination: """Return vulnerability data stored in index \"belden\" @@ -52707,10 +51628,8 @@ async def index_belden_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52763,8 +51682,7 @@ async def index_belden_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52813,8 +51731,7 @@ async def index_belden_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52832,7 +51749,7 @@ async def index_belden_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"belden\" @@ -52872,10 +51789,8 @@ async def index_belden_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52928,8 +51843,7 @@ async def index_belden_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52978,8 +51892,7 @@ async def index_belden_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52997,7 +51910,7 @@ async def index_belden_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"belden\" @@ -53037,10 +51950,8 @@ async def index_belden_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53093,8 +52004,7 @@ async def index_belden_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53138,8 +52048,7 @@ def _index_belden_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53152,7 +52061,10 @@ def _index_belden_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -53236,13 +52148,9 @@ def _index_belden_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -53325,8 +52233,7 @@ async def index_beyond_trust_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53344,7 +52251,7 @@ async def index_beyond_trust_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination: """Return vulnerability data stored in index \"beyond-trust\" @@ -53384,10 +52291,8 @@ async def index_beyond_trust_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53440,8 +52345,7 @@ async def index_beyond_trust_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53490,8 +52394,7 @@ async def index_beyond_trust_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53509,7 +52412,7 @@ async def index_beyond_trust_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination]: """Return vulnerability data stored in index \"beyond-trust\" @@ -53549,10 +52452,8 @@ async def index_beyond_trust_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53605,8 +52506,7 @@ async def index_beyond_trust_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53655,8 +52555,7 @@ async def index_beyond_trust_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53674,7 +52573,7 @@ async def index_beyond_trust_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beyond-trust\" @@ -53714,10 +52613,8 @@ async def index_beyond_trust_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53770,8 +52667,7 @@ async def index_beyond_trust_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53815,8 +52711,7 @@ def _index_beyond_trust_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53829,7 +52724,10 @@ def _index_beyond_trust_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -53913,13 +52811,9 @@ def _index_beyond_trust_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -54002,8 +52896,7 @@ async def index_binarly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54021,7 +52914,7 @@ async def index_binarly_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination: """Return vulnerability data stored in index \"binarly\" @@ -54061,10 +52954,8 @@ async def index_binarly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54117,8 +53008,7 @@ async def index_binarly_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54167,8 +53057,7 @@ async def index_binarly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54186,7 +53075,7 @@ async def index_binarly_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination]: """Return vulnerability data stored in index \"binarly\" @@ -54226,10 +53115,8 @@ async def index_binarly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54282,8 +53169,7 @@ async def index_binarly_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54332,8 +53218,7 @@ async def index_binarly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54351,7 +53236,7 @@ async def index_binarly_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"binarly\" @@ -54391,10 +53276,8 @@ async def index_binarly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54447,8 +53330,7 @@ async def index_binarly_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54492,8 +53374,7 @@ def _index_binarly_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -54506,7 +53387,10 @@ def _index_binarly_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -54590,13 +53474,9 @@ def _index_binarly_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -54679,8 +53559,7 @@ async def index_bitdefender_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54698,7 +53577,7 @@ async def index_bitdefender_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination: """Return vulnerability data stored in index \"bitdefender\" @@ -54738,10 +53617,8 @@ async def index_bitdefender_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54794,8 +53671,7 @@ async def index_bitdefender_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54844,8 +53720,7 @@ async def index_bitdefender_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54863,7 +53738,7 @@ async def index_bitdefender_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination]: """Return vulnerability data stored in index \"bitdefender\" @@ -54903,10 +53778,8 @@ async def index_bitdefender_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54959,8 +53832,7 @@ async def index_bitdefender_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55009,8 +53881,7 @@ async def index_bitdefender_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55028,7 +53899,7 @@ async def index_bitdefender_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bitdefender\" @@ -55068,10 +53939,8 @@ async def index_bitdefender_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55124,8 +53993,7 @@ async def index_bitdefender_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55169,8 +54037,7 @@ def _index_bitdefender_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55183,7 +54050,10 @@ def _index_bitdefender_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -55267,13 +54137,9 @@ def _index_bitdefender_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -55356,8 +54222,7 @@ async def index_blackberry_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55375,7 +54240,7 @@ async def index_blackberry_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination: """Return vulnerability data stored in index \"blackberry\" @@ -55415,10 +54280,8 @@ async def index_blackberry_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55471,8 +54334,7 @@ async def index_blackberry_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55521,8 +54383,7 @@ async def index_blackberry_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55540,7 +54401,7 @@ async def index_blackberry_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination]: """Return vulnerability data stored in index \"blackberry\" @@ -55580,10 +54441,8 @@ async def index_blackberry_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55636,8 +54495,7 @@ async def index_blackberry_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55686,8 +54544,7 @@ async def index_blackberry_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55705,7 +54562,7 @@ async def index_blackberry_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"blackberry\" @@ -55745,10 +54602,8 @@ async def index_blackberry_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55801,8 +54656,7 @@ async def index_blackberry_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55846,8 +54700,7 @@ def _index_blackberry_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55860,7 +54713,10 @@ def _index_blackberry_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -55944,13 +54800,9 @@ def _index_blackberry_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -56033,8 +54885,7 @@ async def index_bls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56052,7 +54903,7 @@ async def index_bls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination: """Return vulnerability data stored in index \"bls\" @@ -56092,10 +54943,8 @@ async def index_bls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56148,8 +54997,7 @@ async def index_bls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56198,8 +55046,7 @@ async def index_bls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56217,7 +55064,7 @@ async def index_bls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination]: """Return vulnerability data stored in index \"bls\" @@ -56257,10 +55104,8 @@ async def index_bls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56313,8 +55158,7 @@ async def index_bls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56363,8 +55207,7 @@ async def index_bls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56382,7 +55225,7 @@ async def index_bls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bls\" @@ -56422,10 +55265,8 @@ async def index_bls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56478,8 +55319,7 @@ async def index_bls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56523,8 +55363,7 @@ def _index_bls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -56537,7 +55376,10 @@ def _index_bls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -56621,13 +55463,9 @@ def _index_bls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -56710,8 +55548,7 @@ async def index_bosch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56729,7 +55566,7 @@ async def index_bosch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bosch\" @@ -56769,10 +55606,8 @@ async def index_bosch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56825,8 +55660,7 @@ async def index_bosch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56875,8 +55709,7 @@ async def index_bosch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56894,7 +55727,7 @@ async def index_bosch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bosch\" @@ -56934,10 +55767,8 @@ async def index_bosch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56990,8 +55821,7 @@ async def index_bosch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57040,8 +55870,7 @@ async def index_bosch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57059,7 +55888,7 @@ async def index_bosch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bosch\" @@ -57099,10 +55928,8 @@ async def index_bosch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57155,8 +55982,7 @@ async def index_bosch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57200,8 +56026,7 @@ def _index_bosch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57214,7 +56039,10 @@ def _index_bosch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -57298,13 +56126,9 @@ def _index_bosch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -57387,8 +56211,7 @@ async def index_boston_scientific_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57406,7 +56229,7 @@ async def index_boston_scientific_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination: """Return vulnerability data stored in index \"boston-scientific\" @@ -57446,10 +56269,8 @@ async def index_boston_scientific_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57502,8 +56323,7 @@ async def index_boston_scientific_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57552,8 +56372,7 @@ async def index_boston_scientific_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57571,7 +56390,7 @@ async def index_boston_scientific_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"boston-scientific\" @@ -57611,10 +56430,8 @@ async def index_boston_scientific_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57667,8 +56484,7 @@ async def index_boston_scientific_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57717,8 +56533,7 @@ async def index_boston_scientific_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57736,7 +56551,7 @@ async def index_boston_scientific_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"boston-scientific\" @@ -57776,10 +56591,8 @@ async def index_boston_scientific_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57832,8 +56645,7 @@ async def index_boston_scientific_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57877,8 +56689,7 @@ def _index_boston_scientific_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57891,7 +56702,10 @@ def _index_boston_scientific_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -57975,13 +56789,9 @@ def _index_boston_scientific_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -58064,8 +56874,7 @@ async def index_botnets_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58083,7 +56892,7 @@ async def index_botnets_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination: """Return vulnerability data stored in index \"botnets\" @@ -58123,10 +56932,8 @@ async def index_botnets_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58179,8 +56986,7 @@ async def index_botnets_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58229,8 +57035,7 @@ async def index_botnets_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58248,7 +57053,7 @@ async def index_botnets_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination]: """Return vulnerability data stored in index \"botnets\" @@ -58288,10 +57093,8 @@ async def index_botnets_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58344,8 +57147,7 @@ async def index_botnets_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58394,8 +57196,7 @@ async def index_botnets_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58413,7 +57214,7 @@ async def index_botnets_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"botnets\" @@ -58453,10 +57254,8 @@ async def index_botnets_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58509,8 +57308,7 @@ async def index_botnets_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58554,8 +57352,7 @@ def _index_botnets_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -58568,7 +57365,10 @@ def _index_botnets_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -58652,13 +57452,9 @@ def _index_botnets_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -58741,8 +57537,7 @@ async def index_ca_cyber_centre_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58760,7 +57555,7 @@ async def index_ca_cyber_centre_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -58800,10 +57595,8 @@ async def index_ca_cyber_centre_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58856,8 +57649,7 @@ async def index_ca_cyber_centre_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58906,8 +57698,7 @@ async def index_ca_cyber_centre_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58925,7 +57716,7 @@ async def index_ca_cyber_centre_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -58965,10 +57756,8 @@ async def index_ca_cyber_centre_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59021,8 +57810,7 @@ async def index_ca_cyber_centre_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59071,8 +57859,7 @@ async def index_ca_cyber_centre_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59090,7 +57877,7 @@ async def index_ca_cyber_centre_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -59130,10 +57917,8 @@ async def index_ca_cyber_centre_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59186,8 +57971,7 @@ async def index_ca_cyber_centre_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59231,8 +58015,7 @@ def _index_ca_cyber_centre_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59245,7 +58028,10 @@ def _index_ca_cyber_centre_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -59329,13 +58115,9 @@ def _index_ca_cyber_centre_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -59418,8 +58200,7 @@ async def index_canvas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59437,7 +58218,7 @@ async def index_canvas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination: """Return vulnerability data stored in index \"canvas\" @@ -59477,10 +58258,8 @@ async def index_canvas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59533,8 +58312,7 @@ async def index_canvas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59583,8 +58361,7 @@ async def index_canvas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59602,7 +58379,7 @@ async def index_canvas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination]: """Return vulnerability data stored in index \"canvas\" @@ -59642,10 +58419,8 @@ async def index_canvas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59698,8 +58473,7 @@ async def index_canvas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59748,8 +58522,7 @@ async def index_canvas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59767,7 +58540,7 @@ async def index_canvas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"canvas\" @@ -59807,10 +58580,8 @@ async def index_canvas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59863,8 +58634,7 @@ async def index_canvas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59908,8 +58678,7 @@ def _index_canvas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59922,7 +58691,10 @@ def _index_canvas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -60006,13 +58778,9 @@ def _index_canvas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -60095,8 +58863,7 @@ async def index_carestream_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60114,7 +58881,7 @@ async def index_carestream_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination: """Return vulnerability data stored in index \"carestream\" @@ -60154,10 +58921,8 @@ async def index_carestream_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60210,8 +58975,7 @@ async def index_carestream_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60260,8 +59024,7 @@ async def index_carestream_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60279,7 +59042,7 @@ async def index_carestream_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"carestream\" @@ -60319,10 +59082,8 @@ async def index_carestream_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60375,8 +59136,7 @@ async def index_carestream_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60425,8 +59185,7 @@ async def index_carestream_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60444,7 +59203,7 @@ async def index_carestream_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"carestream\" @@ -60484,10 +59243,8 @@ async def index_carestream_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60540,8 +59297,7 @@ async def index_carestream_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60585,8 +59341,7 @@ def _index_carestream_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60599,7 +59354,10 @@ def _index_carestream_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -60683,13 +59441,9 @@ def _index_carestream_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -60772,8 +59526,7 @@ async def index_cargo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60791,7 +59544,7 @@ async def index_cargo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"cargo\" @@ -60831,10 +59584,8 @@ async def index_cargo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60887,8 +59638,7 @@ async def index_cargo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60937,8 +59687,7 @@ async def index_cargo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60956,7 +59705,7 @@ async def index_cargo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"cargo\" @@ -60996,10 +59745,8 @@ async def index_cargo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61052,8 +59799,7 @@ async def index_cargo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61102,8 +59848,7 @@ async def index_cargo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61121,7 +59866,7 @@ async def index_cargo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cargo\" @@ -61161,10 +59906,8 @@ async def index_cargo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61217,8 +59960,7 @@ async def index_cargo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61262,8 +60004,7 @@ def _index_cargo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61276,7 +60017,10 @@ def _index_cargo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -61360,13 +60104,9 @@ def _index_cargo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -61449,8 +60189,7 @@ async def index_carrier_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61468,7 +60207,7 @@ async def index_carrier_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination: """Return vulnerability data stored in index \"carrier\" @@ -61508,10 +60247,8 @@ async def index_carrier_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61564,8 +60301,7 @@ async def index_carrier_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61614,8 +60350,7 @@ async def index_carrier_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61633,7 +60368,7 @@ async def index_carrier_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination]: """Return vulnerability data stored in index \"carrier\" @@ -61673,10 +60408,8 @@ async def index_carrier_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61729,8 +60462,7 @@ async def index_carrier_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61779,8 +60511,7 @@ async def index_carrier_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61798,7 +60529,7 @@ async def index_carrier_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"carrier\" @@ -61838,10 +60569,8 @@ async def index_carrier_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61894,8 +60623,7 @@ async def index_carrier_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61939,8 +60667,7 @@ def _index_carrier_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61953,7 +60680,10 @@ def _index_carrier_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -62037,13 +60767,9 @@ def _index_carrier_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -62126,8 +60852,7 @@ async def index_cbl_mariner_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62145,7 +60870,7 @@ async def index_cbl_mariner_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62185,10 +60910,8 @@ async def index_cbl_mariner_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62241,8 +60964,7 @@ async def index_cbl_mariner_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62291,8 +61013,7 @@ async def index_cbl_mariner_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62310,7 +61031,7 @@ async def index_cbl_mariner_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination]: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62350,10 +61071,8 @@ async def index_cbl_mariner_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62406,8 +61125,7 @@ async def index_cbl_mariner_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62456,8 +61174,7 @@ async def index_cbl_mariner_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62475,7 +61192,7 @@ async def index_cbl_mariner_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62515,10 +61232,8 @@ async def index_cbl_mariner_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62571,8 +61286,7 @@ async def index_cbl_mariner_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62616,8 +61330,7 @@ def _index_cbl_mariner_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62630,7 +61343,10 @@ def _index_cbl_mariner_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -62714,13 +61430,9 @@ def _index_cbl_mariner_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -62803,8 +61515,7 @@ async def index_centos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62822,7 +61533,7 @@ async def index_centos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination: """Return vulnerability data stored in index \"centos\" @@ -62862,10 +61573,8 @@ async def index_centos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62918,8 +61627,7 @@ async def index_centos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62968,8 +61676,7 @@ async def index_centos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62987,7 +61694,7 @@ async def index_centos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination]: """Return vulnerability data stored in index \"centos\" @@ -63027,10 +61734,8 @@ async def index_centos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63083,8 +61788,7 @@ async def index_centos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63133,8 +61837,7 @@ async def index_centos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63152,7 +61855,7 @@ async def index_centos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"centos\" @@ -63192,10 +61895,8 @@ async def index_centos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63248,8 +61949,7 @@ async def index_centos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63293,8 +61993,7 @@ def _index_centos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63307,7 +62006,10 @@ def _index_centos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -63391,13 +62093,9 @@ def _index_centos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -63480,8 +62178,7 @@ async def index_cert_be_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63499,7 +62196,7 @@ async def index_cert_be_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination: """Return vulnerability data stored in index \"cert-be\" @@ -63539,10 +62236,8 @@ async def index_cert_be_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63595,8 +62290,7 @@ async def index_cert_be_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63645,8 +62339,7 @@ async def index_cert_be_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63664,7 +62357,7 @@ async def index_cert_be_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination]: """Return vulnerability data stored in index \"cert-be\" @@ -63704,10 +62397,8 @@ async def index_cert_be_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63760,8 +62451,7 @@ async def index_cert_be_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63810,8 +62500,7 @@ async def index_cert_be_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63829,7 +62518,7 @@ async def index_cert_be_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-be\" @@ -63869,10 +62558,8 @@ async def index_cert_be_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63925,8 +62612,7 @@ async def index_cert_be_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63970,8 +62656,7 @@ def _index_cert_be_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63984,7 +62669,10 @@ def _index_cert_be_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -64068,13 +62756,9 @@ def _index_cert_be_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -64157,8 +62841,7 @@ async def index_cert_in_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64176,7 +62859,7 @@ async def index_cert_in_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination: """Return vulnerability data stored in index \"cert-in\" @@ -64216,10 +62899,8 @@ async def index_cert_in_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64272,8 +62953,7 @@ async def index_cert_in_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64322,8 +63002,7 @@ async def index_cert_in_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64341,7 +63020,7 @@ async def index_cert_in_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination]: """Return vulnerability data stored in index \"cert-in\" @@ -64381,10 +63060,8 @@ async def index_cert_in_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64437,8 +63114,7 @@ async def index_cert_in_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64487,8 +63163,7 @@ async def index_cert_in_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64506,7 +63181,7 @@ async def index_cert_in_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-in\" @@ -64546,10 +63221,8 @@ async def index_cert_in_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64602,8 +63275,7 @@ async def index_cert_in_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64647,8 +63319,7 @@ def _index_cert_in_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64661,7 +63332,10 @@ def _index_cert_in_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -64745,13 +63419,9 @@ def _index_cert_in_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -64834,8 +63504,7 @@ async def index_cert_ir_security_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64853,7 +63522,7 @@ async def index_cert_ir_security_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -64893,10 +63562,8 @@ async def index_cert_ir_security_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64949,8 +63616,7 @@ async def index_cert_ir_security_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64999,8 +63665,7 @@ async def index_cert_ir_security_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65018,7 +63683,7 @@ async def index_cert_ir_security_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination]: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -65058,10 +63723,8 @@ async def index_cert_ir_security_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65114,8 +63777,7 @@ async def index_cert_ir_security_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65164,8 +63826,7 @@ async def index_cert_ir_security_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65183,7 +63844,7 @@ async def index_cert_ir_security_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -65223,10 +63884,8 @@ async def index_cert_ir_security_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65279,8 +63938,7 @@ async def index_cert_ir_security_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65324,8 +63982,7 @@ def _index_cert_ir_security_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -65338,7 +63995,10 @@ def _index_cert_ir_security_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -65422,13 +64082,9 @@ def _index_cert_ir_security_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -65511,8 +64167,7 @@ async def index_cert_se_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65530,7 +64185,7 @@ async def index_cert_se_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination: """Return vulnerability data stored in index \"cert-se\" @@ -65570,10 +64225,8 @@ async def index_cert_se_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65626,8 +64279,7 @@ async def index_cert_se_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65676,8 +64328,7 @@ async def index_cert_se_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65695,7 +64346,7 @@ async def index_cert_se_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination]: """Return vulnerability data stored in index \"cert-se\" @@ -65735,10 +64386,8 @@ async def index_cert_se_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65791,8 +64440,7 @@ async def index_cert_se_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65841,8 +64489,7 @@ async def index_cert_se_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65860,7 +64507,7 @@ async def index_cert_se_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-se\" @@ -65900,10 +64547,8 @@ async def index_cert_se_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65956,8 +64601,7 @@ async def index_cert_se_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66001,8 +64645,7 @@ def _index_cert_se_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66015,7 +64658,10 @@ def _index_cert_se_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -66099,13 +64745,9 @@ def _index_cert_se_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -66188,8 +64830,7 @@ async def index_cert_ua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66207,7 +64848,7 @@ async def index_cert_ua_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination: """Return vulnerability data stored in index \"cert-ua\" @@ -66247,10 +64888,8 @@ async def index_cert_ua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66303,8 +64942,7 @@ async def index_cert_ua_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66353,8 +64991,7 @@ async def index_cert_ua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66372,7 +65009,7 @@ async def index_cert_ua_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination]: """Return vulnerability data stored in index \"cert-ua\" @@ -66412,10 +65049,8 @@ async def index_cert_ua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66468,8 +65103,7 @@ async def index_cert_ua_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66518,8 +65152,7 @@ async def index_cert_ua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66537,7 +65170,7 @@ async def index_cert_ua_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-ua\" @@ -66577,10 +65210,8 @@ async def index_cert_ua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66633,8 +65264,7 @@ async def index_cert_ua_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66678,8 +65308,7 @@ def _index_cert_ua_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66692,7 +65321,10 @@ def _index_cert_ua_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -66776,13 +65408,9 @@ def _index_cert_ua_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -66865,8 +65493,7 @@ async def index_certeu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66884,7 +65511,7 @@ async def index_certeu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination: """Return vulnerability data stored in index \"certeu\" @@ -66924,10 +65551,8 @@ async def index_certeu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66980,8 +65605,7 @@ async def index_certeu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67030,8 +65654,7 @@ async def index_certeu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67049,7 +65672,7 @@ async def index_certeu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"certeu\" @@ -67089,10 +65712,8 @@ async def index_certeu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67145,8 +65766,7 @@ async def index_certeu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67195,8 +65815,7 @@ async def index_certeu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67214,7 +65833,7 @@ async def index_certeu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"certeu\" @@ -67254,10 +65873,8 @@ async def index_certeu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67310,8 +65927,7 @@ async def index_certeu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67355,8 +65971,7 @@ def _index_certeu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -67369,7 +65984,10 @@ def _index_certeu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -67453,13 +66071,9 @@ def _index_certeu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -67542,8 +66156,7 @@ async def index_certfr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67561,7 +66174,7 @@ async def index_certfr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination: """Return vulnerability data stored in index \"certfr\" @@ -67601,10 +66214,8 @@ async def index_certfr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67657,8 +66268,7 @@ async def index_certfr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67707,8 +66317,7 @@ async def index_certfr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67726,7 +66335,7 @@ async def index_certfr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"certfr\" @@ -67766,10 +66375,8 @@ async def index_certfr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67822,8 +66429,7 @@ async def index_certfr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67872,8 +66478,7 @@ async def index_certfr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67891,7 +66496,7 @@ async def index_certfr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"certfr\" @@ -67931,10 +66536,8 @@ async def index_certfr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67987,8 +66590,7 @@ async def index_certfr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68032,8 +66634,7 @@ def _index_certfr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68046,7 +66647,10 @@ def _index_certfr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -68130,13 +66734,9 @@ def _index_certfr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -68219,8 +66819,7 @@ async def index_chainguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68238,7 +66837,7 @@ async def index_chainguard_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination: """Return vulnerability data stored in index \"chainguard\" @@ -68278,10 +66877,8 @@ async def index_chainguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68334,8 +66931,7 @@ async def index_chainguard_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68384,8 +66980,7 @@ async def index_chainguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68403,7 +66998,7 @@ async def index_chainguard_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination]: """Return vulnerability data stored in index \"chainguard\" @@ -68443,10 +67038,8 @@ async def index_chainguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68499,8 +67092,7 @@ async def index_chainguard_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68549,8 +67141,7 @@ async def index_chainguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68568,7 +67159,7 @@ async def index_chainguard_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"chainguard\" @@ -68608,10 +67199,8 @@ async def index_chainguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68664,8 +67253,7 @@ async def index_chainguard_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68709,8 +67297,7 @@ def _index_chainguard_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68723,7 +67310,10 @@ def _index_chainguard_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -68807,13 +67397,9 @@ def _index_chainguard_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -68896,8 +67482,7 @@ async def index_checkpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68915,7 +67500,7 @@ async def index_checkpoint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination: """Return vulnerability data stored in index \"checkpoint\" @@ -68955,10 +67540,8 @@ async def index_checkpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69011,8 +67594,7 @@ async def index_checkpoint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69061,8 +67643,7 @@ async def index_checkpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69080,7 +67661,7 @@ async def index_checkpoint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination]: """Return vulnerability data stored in index \"checkpoint\" @@ -69120,10 +67701,8 @@ async def index_checkpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69176,8 +67755,7 @@ async def index_checkpoint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69226,8 +67804,7 @@ async def index_checkpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69245,7 +67822,7 @@ async def index_checkpoint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"checkpoint\" @@ -69285,10 +67862,8 @@ async def index_checkpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69341,8 +67916,7 @@ async def index_checkpoint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69386,8 +67960,7 @@ def _index_checkpoint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -69400,7 +67973,10 @@ def _index_checkpoint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -69484,13 +68060,9 @@ def _index_checkpoint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -69573,8 +68145,7 @@ async def index_chrome_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69592,7 +68163,7 @@ async def index_chrome_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination: """Return vulnerability data stored in index \"chrome\" @@ -69632,10 +68203,8 @@ async def index_chrome_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69688,8 +68257,7 @@ async def index_chrome_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69738,8 +68306,7 @@ async def index_chrome_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69757,7 +68324,7 @@ async def index_chrome_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination]: """Return vulnerability data stored in index \"chrome\" @@ -69797,10 +68364,8 @@ async def index_chrome_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69853,8 +68418,7 @@ async def index_chrome_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69903,8 +68467,7 @@ async def index_chrome_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69922,7 +68485,7 @@ async def index_chrome_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"chrome\" @@ -69962,10 +68525,8 @@ async def index_chrome_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70018,8 +68579,7 @@ async def index_chrome_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70063,8 +68623,7 @@ def _index_chrome_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70077,7 +68636,10 @@ def _index_chrome_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -70161,13 +68723,9 @@ def _index_chrome_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -70250,8 +68808,7 @@ async def index_ciena_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70269,7 +68826,7 @@ async def index_ciena_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination: """Return vulnerability data stored in index \"ciena\" @@ -70309,10 +68866,8 @@ async def index_ciena_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70365,8 +68920,7 @@ async def index_ciena_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70415,8 +68969,7 @@ async def index_ciena_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70434,7 +68987,7 @@ async def index_ciena_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination]: """Return vulnerability data stored in index \"ciena\" @@ -70474,10 +69027,8 @@ async def index_ciena_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70530,8 +69081,7 @@ async def index_ciena_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70580,8 +69130,7 @@ async def index_ciena_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70599,7 +69148,7 @@ async def index_ciena_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ciena\" @@ -70639,10 +69188,8 @@ async def index_ciena_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70695,8 +69242,7 @@ async def index_ciena_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70740,8 +69286,7 @@ def _index_ciena_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70754,7 +69299,10 @@ def _index_ciena_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -70838,13 +69386,9 @@ def _index_ciena_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -70927,8 +69471,7 @@ async def index_cisa_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70946,7 +69489,7 @@ async def index_cisa_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination: """Return vulnerability data stored in index \"cisa-alerts\" @@ -70986,10 +69529,8 @@ async def index_cisa_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71042,8 +69583,7 @@ async def index_cisa_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71092,8 +69632,7 @@ async def index_cisa_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71111,7 +69650,7 @@ async def index_cisa_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination]: """Return vulnerability data stored in index \"cisa-alerts\" @@ -71151,10 +69690,8 @@ async def index_cisa_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71207,8 +69744,7 @@ async def index_cisa_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71257,8 +69793,7 @@ async def index_cisa_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71276,7 +69811,7 @@ async def index_cisa_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-alerts\" @@ -71316,10 +69851,8 @@ async def index_cisa_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71372,8 +69905,7 @@ async def index_cisa_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71417,8 +69949,7 @@ def _index_cisa_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -71431,7 +69962,10 @@ def _index_cisa_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -71515,13 +70049,9 @@ def _index_cisa_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -71604,8 +70134,7 @@ async def index_cisa_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71623,7 +70152,7 @@ async def index_cisa_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71663,10 +70192,8 @@ async def index_cisa_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71719,8 +70246,7 @@ async def index_cisa_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71769,8 +70295,7 @@ async def index_cisa_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71788,7 +70313,7 @@ async def index_cisa_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination]: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71828,10 +70353,8 @@ async def index_cisa_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71884,8 +70407,7 @@ async def index_cisa_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71934,8 +70456,7 @@ async def index_cisa_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71953,7 +70474,7 @@ async def index_cisa_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71993,10 +70514,8 @@ async def index_cisa_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72049,8 +70568,7 @@ async def index_cisa_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72094,8 +70612,7 @@ def _index_cisa_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72108,7 +70625,10 @@ def _index_cisa_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -72192,13 +70712,9 @@ def _index_cisa_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -72281,8 +70797,7 @@ async def index_cisa_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72300,7 +70815,7 @@ async def index_cisa_kev_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"cisa-kev\" @@ -72340,10 +70855,8 @@ async def index_cisa_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72396,8 +70909,7 @@ async def index_cisa_kev_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72446,8 +70958,7 @@ async def index_cisa_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72465,7 +70976,7 @@ async def index_cisa_kev_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"cisa-kev\" @@ -72505,10 +71016,8 @@ async def index_cisa_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72561,8 +71070,7 @@ async def index_cisa_kev_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72611,8 +71119,7 @@ async def index_cisa_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72630,7 +71137,7 @@ async def index_cisa_kev_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-kev\" @@ -72670,10 +71177,8 @@ async def index_cisa_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72726,8 +71231,7 @@ async def index_cisa_kev_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72771,8 +71275,7 @@ def _index_cisa_kev_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72785,7 +71288,10 @@ def _index_cisa_kev_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -72869,13 +71375,9 @@ def _index_cisa_kev_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -72958,8 +71460,7 @@ async def index_cisco_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72977,7 +71478,7 @@ async def index_cisco_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73017,10 +71518,8 @@ async def index_cisco_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73073,8 +71572,7 @@ async def index_cisco_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73123,8 +71621,7 @@ async def index_cisco_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73142,7 +71639,7 @@ async def index_cisco_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination]: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73182,10 +71679,8 @@ async def index_cisco_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73238,8 +71733,7 @@ async def index_cisco_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73288,8 +71782,7 @@ async def index_cisco_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73307,7 +71800,7 @@ async def index_cisco_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73347,10 +71840,8 @@ async def index_cisco_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73403,8 +71894,7 @@ async def index_cisco_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73448,8 +71938,7 @@ def _index_cisco_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -73462,7 +71951,10 @@ def _index_cisco_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -73546,13 +72038,9 @@ def _index_cisco_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -73635,8 +72123,7 @@ async def index_cisco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73654,7 +72141,7 @@ async def index_cisco_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cisco\" @@ -73694,10 +72181,8 @@ async def index_cisco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73750,8 +72235,7 @@ async def index_cisco_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73800,8 +72284,7 @@ async def index_cisco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73819,7 +72302,7 @@ async def index_cisco_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cisco\" @@ -73859,10 +72342,8 @@ async def index_cisco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73915,8 +72396,7 @@ async def index_cisco_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73965,8 +72445,7 @@ async def index_cisco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73984,7 +72463,7 @@ async def index_cisco_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco\" @@ -74024,10 +72503,8 @@ async def index_cisco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74080,8 +72557,7 @@ async def index_cisco_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74125,8 +72601,7 @@ def _index_cisco_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74139,7 +72614,10 @@ def _index_cisco_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -74223,13 +72701,9 @@ def _index_cisco_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -74312,8 +72786,7 @@ async def index_cisco_known_good_values_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74331,7 +72804,7 @@ async def index_cisco_known_good_values_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74371,10 +72844,8 @@ async def index_cisco_known_good_values_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74427,8 +72898,7 @@ async def index_cisco_known_good_values_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74477,8 +72947,7 @@ async def index_cisco_known_good_values_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74496,7 +72965,7 @@ async def index_cisco_known_good_values_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination]: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74536,10 +73005,8 @@ async def index_cisco_known_good_values_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74592,8 +73059,7 @@ async def index_cisco_known_good_values_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74642,8 +73108,7 @@ async def index_cisco_known_good_values_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74661,7 +73126,7 @@ async def index_cisco_known_good_values_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74701,10 +73166,8 @@ async def index_cisco_known_good_values_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74757,8 +73220,7 @@ async def index_cisco_known_good_values_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74802,8 +73264,7 @@ def _index_cisco_known_good_values_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74816,7 +73277,10 @@ def _index_cisco_known_good_values_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -74900,13 +73364,9 @@ def _index_cisco_known_good_values_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -74989,8 +73449,7 @@ async def index_cisco_talos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75008,7 +73467,7 @@ async def index_cisco_talos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cisco-talos\" @@ -75048,10 +73507,8 @@ async def index_cisco_talos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75104,8 +73561,7 @@ async def index_cisco_talos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75154,8 +73610,7 @@ async def index_cisco_talos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75173,7 +73628,7 @@ async def index_cisco_talos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cisco-talos\" @@ -75213,10 +73668,8 @@ async def index_cisco_talos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75269,8 +73722,7 @@ async def index_cisco_talos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75319,8 +73771,7 @@ async def index_cisco_talos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75338,7 +73789,7 @@ async def index_cisco_talos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-talos\" @@ -75378,10 +73829,8 @@ async def index_cisco_talos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75434,8 +73883,7 @@ async def index_cisco_talos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75479,8 +73927,7 @@ def _index_cisco_talos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -75493,7 +73940,10 @@ def _index_cisco_talos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -75577,13 +74027,9 @@ def _index_cisco_talos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -75666,8 +74112,7 @@ async def index_citrix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75685,7 +74130,7 @@ async def index_citrix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination: """Return vulnerability data stored in index \"citrix\" @@ -75725,10 +74170,8 @@ async def index_citrix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75781,8 +74224,7 @@ async def index_citrix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75831,8 +74273,7 @@ async def index_citrix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75850,7 +74291,7 @@ async def index_citrix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"citrix\" @@ -75890,10 +74331,8 @@ async def index_citrix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75946,8 +74385,7 @@ async def index_citrix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75996,8 +74434,7 @@ async def index_citrix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76015,7 +74452,7 @@ async def index_citrix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"citrix\" @@ -76055,10 +74492,8 @@ async def index_citrix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76111,8 +74546,7 @@ async def index_citrix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76156,8 +74590,7 @@ def _index_citrix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76170,7 +74603,10 @@ def _index_citrix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -76254,13 +74690,9 @@ def _index_citrix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -76343,8 +74775,7 @@ async def index_claroty_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76362,7 +74793,7 @@ async def index_claroty_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"claroty\" @@ -76402,10 +74833,8 @@ async def index_claroty_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76458,8 +74887,7 @@ async def index_claroty_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76508,8 +74936,7 @@ async def index_claroty_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76527,7 +74954,7 @@ async def index_claroty_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"claroty\" @@ -76567,10 +74994,8 @@ async def index_claroty_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76623,8 +75048,7 @@ async def index_claroty_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76673,8 +75097,7 @@ async def index_claroty_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76692,7 +75115,7 @@ async def index_claroty_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"claroty\" @@ -76732,10 +75155,8 @@ async def index_claroty_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76788,8 +75209,7 @@ async def index_claroty_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76833,8 +75253,7 @@ def _index_claroty_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76847,7 +75266,10 @@ def _index_claroty_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -76931,13 +75353,9 @@ def _index_claroty_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -77020,8 +75438,7 @@ async def index_cloudbees_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77039,7 +75456,7 @@ async def index_cloudbees_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination: """Return vulnerability data stored in index \"cloudbees\" @@ -77079,10 +75496,8 @@ async def index_cloudbees_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77135,8 +75550,7 @@ async def index_cloudbees_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77185,8 +75599,7 @@ async def index_cloudbees_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77204,7 +75617,7 @@ async def index_cloudbees_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination]: """Return vulnerability data stored in index \"cloudbees\" @@ -77244,10 +75657,8 @@ async def index_cloudbees_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77300,8 +75711,7 @@ async def index_cloudbees_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77350,8 +75760,7 @@ async def index_cloudbees_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77369,7 +75778,7 @@ async def index_cloudbees_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cloudbees\" @@ -77409,10 +75818,8 @@ async def index_cloudbees_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77465,8 +75872,7 @@ async def index_cloudbees_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77510,8 +75916,7 @@ def _index_cloudbees_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -77524,7 +75929,10 @@ def _index_cloudbees_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -77608,13 +76016,9 @@ def _index_cloudbees_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -77697,8 +76101,7 @@ async def index_cloudvulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77716,7 +76119,7 @@ async def index_cloudvulndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cloudvulndb\" @@ -77756,10 +76159,8 @@ async def index_cloudvulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77812,8 +76213,7 @@ async def index_cloudvulndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77862,8 +76262,7 @@ async def index_cloudvulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77881,7 +76280,7 @@ async def index_cloudvulndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cloudvulndb\" @@ -77921,10 +76320,8 @@ async def index_cloudvulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77977,8 +76374,7 @@ async def index_cloudvulndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78027,8 +76423,7 @@ async def index_cloudvulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78046,7 +76441,7 @@ async def index_cloudvulndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cloudvulndb\" @@ -78086,10 +76481,8 @@ async def index_cloudvulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78142,8 +76535,7 @@ async def index_cloudvulndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78187,8 +76579,7 @@ def _index_cloudvulndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78201,7 +76592,10 @@ def _index_cloudvulndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -78285,13 +76679,9 @@ def _index_cloudvulndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -78374,8 +76764,7 @@ async def index_cnnvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78393,7 +76782,7 @@ async def index_cnnvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination: """Return vulnerability data stored in index \"cnnvd\" @@ -78433,10 +76822,8 @@ async def index_cnnvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78489,8 +76876,7 @@ async def index_cnnvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78539,8 +76925,7 @@ async def index_cnnvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78558,7 +76943,7 @@ async def index_cnnvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination]: """Return vulnerability data stored in index \"cnnvd\" @@ -78598,10 +76983,8 @@ async def index_cnnvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78654,8 +77037,7 @@ async def index_cnnvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78704,8 +77086,7 @@ async def index_cnnvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78723,7 +77104,7 @@ async def index_cnnvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnnvd\" @@ -78763,10 +77144,8 @@ async def index_cnnvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78819,8 +77198,7 @@ async def index_cnnvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78864,8 +77242,7 @@ def _index_cnnvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78878,7 +77255,10 @@ def _index_cnnvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -78962,13 +77342,9 @@ def _index_cnnvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -79051,8 +77427,7 @@ async def index_cnvd_bulletins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79070,7 +77445,7 @@ async def index_cnvd_bulletins_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79110,10 +77485,8 @@ async def index_cnvd_bulletins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79166,8 +77539,7 @@ async def index_cnvd_bulletins_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79216,8 +77588,7 @@ async def index_cnvd_bulletins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79235,7 +77606,7 @@ async def index_cnvd_bulletins_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination]: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79275,10 +77646,8 @@ async def index_cnvd_bulletins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79331,8 +77700,7 @@ async def index_cnvd_bulletins_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79381,8 +77749,7 @@ async def index_cnvd_bulletins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79400,7 +77767,7 @@ async def index_cnvd_bulletins_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79440,10 +77807,8 @@ async def index_cnvd_bulletins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79496,8 +77861,7 @@ async def index_cnvd_bulletins_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79541,8 +77905,7 @@ def _index_cnvd_bulletins_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -79555,7 +77918,10 @@ def _index_cnvd_bulletins_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -79639,13 +78005,9 @@ def _index_cnvd_bulletins_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -79728,8 +78090,7 @@ async def index_cnvd_flaws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79747,7 +78108,7 @@ async def index_cnvd_flaws_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -79787,10 +78148,8 @@ async def index_cnvd_flaws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79843,8 +78202,7 @@ async def index_cnvd_flaws_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79893,8 +78251,7 @@ async def index_cnvd_flaws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79912,7 +78269,7 @@ async def index_cnvd_flaws_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination]: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -79952,10 +78309,8 @@ async def index_cnvd_flaws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80008,8 +78363,7 @@ async def index_cnvd_flaws_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80058,8 +78412,7 @@ async def index_cnvd_flaws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80077,7 +78430,7 @@ async def index_cnvd_flaws_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -80117,10 +78470,8 @@ async def index_cnvd_flaws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80173,8 +78524,7 @@ async def index_cnvd_flaws_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80218,8 +78568,7 @@ def _index_cnvd_flaws_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80232,7 +78581,10 @@ def _index_cnvd_flaws_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -80316,13 +78668,9 @@ def _index_cnvd_flaws_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -80405,8 +78753,7 @@ async def index_cocoapods_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80424,7 +78771,7 @@ async def index_cocoapods_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"cocoapods\" @@ -80464,10 +78811,8 @@ async def index_cocoapods_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80520,8 +78865,7 @@ async def index_cocoapods_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80570,8 +78914,7 @@ async def index_cocoapods_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80589,7 +78932,7 @@ async def index_cocoapods_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"cocoapods\" @@ -80629,10 +78972,8 @@ async def index_cocoapods_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80685,8 +79026,7 @@ async def index_cocoapods_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80735,8 +79075,7 @@ async def index_cocoapods_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80754,7 +79093,7 @@ async def index_cocoapods_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cocoapods\" @@ -80794,10 +79133,8 @@ async def index_cocoapods_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80850,8 +79187,7 @@ async def index_cocoapods_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80895,8 +79231,7 @@ def _index_cocoapods_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80909,7 +79244,10 @@ def _index_cocoapods_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -80993,13 +79331,9 @@ def _index_cocoapods_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -81082,8 +79416,7 @@ async def index_codesys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81101,7 +79434,7 @@ async def index_codesys_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination: """Return vulnerability data stored in index \"codesys\" @@ -81141,10 +79474,8 @@ async def index_codesys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81197,8 +79528,7 @@ async def index_codesys_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81247,8 +79577,7 @@ async def index_codesys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81266,7 +79595,7 @@ async def index_codesys_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"codesys\" @@ -81306,10 +79635,8 @@ async def index_codesys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81362,8 +79689,7 @@ async def index_codesys_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81412,8 +79738,7 @@ async def index_codesys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81431,7 +79756,7 @@ async def index_codesys_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"codesys\" @@ -81471,10 +79796,8 @@ async def index_codesys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81527,8 +79850,7 @@ async def index_codesys_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81572,8 +79894,7 @@ def _index_codesys_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -81586,7 +79907,10 @@ def _index_codesys_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -81670,13 +79994,9 @@ def _index_codesys_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -81759,8 +80079,7 @@ async def index_commvault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81778,7 +80097,7 @@ async def index_commvault_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination: """Return vulnerability data stored in index \"commvault\" @@ -81818,10 +80137,8 @@ async def index_commvault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81874,8 +80191,7 @@ async def index_commvault_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81924,8 +80240,7 @@ async def index_commvault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81943,7 +80258,7 @@ async def index_commvault_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination]: """Return vulnerability data stored in index \"commvault\" @@ -81983,10 +80298,8 @@ async def index_commvault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82039,8 +80352,7 @@ async def index_commvault_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82089,8 +80401,7 @@ async def index_commvault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82108,7 +80419,7 @@ async def index_commvault_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"commvault\" @@ -82148,10 +80459,8 @@ async def index_commvault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82204,8 +80513,7 @@ async def index_commvault_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82249,8 +80557,7 @@ def _index_commvault_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82263,7 +80570,10 @@ def _index_commvault_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -82347,13 +80657,9 @@ def _index_commvault_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -82436,8 +80742,7 @@ async def index_compass_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82455,7 +80760,7 @@ async def index_compass_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination: """Return vulnerability data stored in index \"compass-security\" @@ -82495,10 +80800,8 @@ async def index_compass_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82551,8 +80854,7 @@ async def index_compass_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82601,8 +80903,7 @@ async def index_compass_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82620,7 +80921,7 @@ async def index_compass_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination]: """Return vulnerability data stored in index \"compass-security\" @@ -82660,10 +80961,8 @@ async def index_compass_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82716,8 +81015,7 @@ async def index_compass_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82766,8 +81064,7 @@ async def index_compass_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82785,7 +81082,7 @@ async def index_compass_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"compass-security\" @@ -82825,10 +81122,8 @@ async def index_compass_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82881,8 +81176,7 @@ async def index_compass_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82926,8 +81220,7 @@ def _index_compass_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82940,7 +81233,10 @@ def _index_compass_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -83024,13 +81320,9 @@ def _index_compass_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -83113,8 +81405,7 @@ async def index_composer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83132,7 +81423,7 @@ async def index_composer_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"composer\" @@ -83172,10 +81463,8 @@ async def index_composer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83228,8 +81517,7 @@ async def index_composer_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83278,8 +81566,7 @@ async def index_composer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83297,7 +81584,7 @@ async def index_composer_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"composer\" @@ -83337,10 +81624,8 @@ async def index_composer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83393,8 +81678,7 @@ async def index_composer_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83443,8 +81727,7 @@ async def index_composer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83462,7 +81745,7 @@ async def index_composer_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"composer\" @@ -83502,10 +81785,8 @@ async def index_composer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83558,8 +81839,7 @@ async def index_composer_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83603,8 +81883,7 @@ def _index_composer_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83617,7 +81896,10 @@ def _index_composer_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -83701,13 +81983,9 @@ def _index_composer_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -83790,8 +82068,7 @@ async def index_conan_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83809,7 +82086,7 @@ async def index_conan_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"conan\" @@ -83849,10 +82126,8 @@ async def index_conan_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83905,8 +82180,7 @@ async def index_conan_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83955,8 +82229,7 @@ async def index_conan_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83974,7 +82247,7 @@ async def index_conan_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"conan\" @@ -84014,10 +82287,8 @@ async def index_conan_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84070,8 +82341,7 @@ async def index_conan_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84120,8 +82390,7 @@ async def index_conan_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84139,7 +82408,7 @@ async def index_conan_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"conan\" @@ -84179,10 +82448,8 @@ async def index_conan_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84235,8 +82502,7 @@ async def index_conan_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84280,8 +82546,7 @@ def _index_conan_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84294,7 +82559,10 @@ def _index_conan_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -84378,13 +82646,9 @@ def _index_conan_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -84467,8 +82731,7 @@ async def index_coreimpact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84486,7 +82749,7 @@ async def index_coreimpact_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination: """Return vulnerability data stored in index \"coreimpact\" @@ -84526,10 +82789,8 @@ async def index_coreimpact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84582,8 +82843,7 @@ async def index_coreimpact_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84632,8 +82892,7 @@ async def index_coreimpact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84651,7 +82910,7 @@ async def index_coreimpact_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination]: """Return vulnerability data stored in index \"coreimpact\" @@ -84691,10 +82950,8 @@ async def index_coreimpact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84747,8 +83004,7 @@ async def index_coreimpact_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84797,8 +83053,7 @@ async def index_coreimpact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84816,7 +83071,7 @@ async def index_coreimpact_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"coreimpact\" @@ -84856,10 +83111,8 @@ async def index_coreimpact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84912,8 +83165,7 @@ async def index_coreimpact_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84957,8 +83209,7 @@ def _index_coreimpact_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84971,7 +83222,10 @@ def _index_coreimpact_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -85055,13 +83309,9 @@ def _index_coreimpact_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -85144,8 +83394,7 @@ async def index_cpe_vulnerable_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85163,7 +83412,7 @@ async def index_cpe_vulnerable_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85203,10 +83452,8 @@ async def index_cpe_vulnerable_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85259,8 +83506,7 @@ async def index_cpe_vulnerable_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85309,8 +83555,7 @@ async def index_cpe_vulnerable_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85328,7 +83573,7 @@ async def index_cpe_vulnerable_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination]: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85368,10 +83613,8 @@ async def index_cpe_vulnerable_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85424,8 +83667,7 @@ async def index_cpe_vulnerable_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85474,8 +83716,7 @@ async def index_cpe_vulnerable_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85493,7 +83734,7 @@ async def index_cpe_vulnerable_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85533,10 +83774,8 @@ async def index_cpe_vulnerable_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85589,8 +83828,7 @@ async def index_cpe_vulnerable_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85634,8 +83872,7 @@ def _index_cpe_vulnerable_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85648,7 +83885,10 @@ def _index_cpe_vulnerable_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -85732,13 +83972,9 @@ def _index_cpe_vulnerable_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -85821,8 +84057,7 @@ async def index_crestron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85840,7 +84075,7 @@ async def index_crestron_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination: """Return vulnerability data stored in index \"crestron\" @@ -85880,10 +84115,8 @@ async def index_crestron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85936,8 +84169,7 @@ async def index_crestron_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85986,8 +84218,7 @@ async def index_crestron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86005,7 +84236,7 @@ async def index_crestron_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination]: """Return vulnerability data stored in index \"crestron\" @@ -86045,10 +84276,8 @@ async def index_crestron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86101,8 +84330,7 @@ async def index_crestron_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86151,8 +84379,7 @@ async def index_crestron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86170,7 +84397,7 @@ async def index_crestron_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"crestron\" @@ -86210,10 +84437,8 @@ async def index_crestron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86266,8 +84491,7 @@ async def index_crestron_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86311,8 +84535,7 @@ def _index_crestron_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -86325,7 +84548,10 @@ def _index_crestron_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -86409,13 +84635,9 @@ def _index_crestron_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -86498,8 +84720,7 @@ async def index_crowdsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86517,7 +84738,7 @@ async def index_crowdsec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination: """Return vulnerability data stored in index \"crowdsec\" @@ -86557,10 +84778,8 @@ async def index_crowdsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86613,8 +84832,7 @@ async def index_crowdsec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86663,8 +84881,7 @@ async def index_crowdsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86682,7 +84899,7 @@ async def index_crowdsec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination]: """Return vulnerability data stored in index \"crowdsec\" @@ -86722,10 +84939,8 @@ async def index_crowdsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86778,8 +84993,7 @@ async def index_crowdsec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86828,8 +85042,7 @@ async def index_crowdsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86847,7 +85060,7 @@ async def index_crowdsec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"crowdsec\" @@ -86887,10 +85100,8 @@ async def index_crowdsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86943,8 +85154,7 @@ async def index_crowdsec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86988,8 +85198,7 @@ def _index_crowdsec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87002,7 +85211,10 @@ def _index_crowdsec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -87086,13 +85298,9 @@ def _index_crowdsec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -87175,8 +85383,7 @@ async def index_curl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87194,7 +85401,7 @@ async def index_curl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination: """Return vulnerability data stored in index \"curl\" @@ -87234,10 +85441,8 @@ async def index_curl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87290,8 +85495,7 @@ async def index_curl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87340,8 +85544,7 @@ async def index_curl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87359,7 +85562,7 @@ async def index_curl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination]: """Return vulnerability data stored in index \"curl\" @@ -87399,10 +85602,8 @@ async def index_curl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87455,8 +85656,7 @@ async def index_curl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87505,8 +85705,7 @@ async def index_curl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87524,7 +85723,7 @@ async def index_curl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"curl\" @@ -87564,10 +85763,8 @@ async def index_curl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87620,8 +85817,7 @@ async def index_curl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87665,8 +85861,7 @@ def _index_curl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87679,7 +85874,10 @@ def _index_curl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -87763,13 +85961,9 @@ def _index_curl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -87852,8 +86046,7 @@ async def index_cwe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87871,7 +86064,7 @@ async def index_cwe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCWEPaginatePagination: """Return vulnerability data stored in index \"cwe\" @@ -87911,10 +86104,8 @@ async def index_cwe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87967,8 +86158,7 @@ async def index_cwe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88017,8 +86207,7 @@ async def index_cwe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88036,7 +86225,7 @@ async def index_cwe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCWEPaginatePagination]: """Return vulnerability data stored in index \"cwe\" @@ -88076,10 +86265,8 @@ async def index_cwe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88132,8 +86319,7 @@ async def index_cwe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88182,8 +86368,7 @@ async def index_cwe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88201,7 +86386,7 @@ async def index_cwe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cwe\" @@ -88241,10 +86426,8 @@ async def index_cwe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88297,8 +86480,7 @@ async def index_cwe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88342,8 +86524,7 @@ def _index_cwe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -88356,7 +86537,10 @@ def _index_cwe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -88440,13 +86624,9 @@ def _index_cwe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -88529,8 +86709,7 @@ async def index_dahua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88548,7 +86727,7 @@ async def index_dahua_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination: """Return vulnerability data stored in index \"dahua\" @@ -88588,10 +86767,8 @@ async def index_dahua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88644,8 +86821,7 @@ async def index_dahua_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88694,8 +86870,7 @@ async def index_dahua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88713,7 +86888,7 @@ async def index_dahua_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination]: """Return vulnerability data stored in index \"dahua\" @@ -88753,10 +86928,8 @@ async def index_dahua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88809,8 +86982,7 @@ async def index_dahua_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88859,8 +87031,7 @@ async def index_dahua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88878,7 +87049,7 @@ async def index_dahua_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dahua\" @@ -88918,10 +87089,8 @@ async def index_dahua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88974,8 +87143,7 @@ async def index_dahua_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89019,8 +87187,7 @@ def _index_dahua_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89033,7 +87200,10 @@ def _index_dahua_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -89117,13 +87287,9 @@ def _index_dahua_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -89206,8 +87372,7 @@ async def index_danfoss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89225,7 +87390,7 @@ async def index_danfoss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination: """Return vulnerability data stored in index \"danfoss\" @@ -89265,10 +87430,8 @@ async def index_danfoss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89321,8 +87484,7 @@ async def index_danfoss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89371,8 +87533,7 @@ async def index_danfoss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89390,7 +87551,7 @@ async def index_danfoss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination]: """Return vulnerability data stored in index \"danfoss\" @@ -89430,10 +87591,8 @@ async def index_danfoss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89486,8 +87645,7 @@ async def index_danfoss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89536,8 +87694,7 @@ async def index_danfoss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89555,7 +87712,7 @@ async def index_danfoss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"danfoss\" @@ -89595,10 +87752,8 @@ async def index_danfoss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89651,8 +87806,7 @@ async def index_danfoss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89696,8 +87850,7 @@ def _index_danfoss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89710,7 +87863,10 @@ def _index_danfoss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -89794,13 +87950,9 @@ def _index_danfoss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -89883,8 +88035,7 @@ async def index_dassault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89902,7 +88053,7 @@ async def index_dassault_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination: """Return vulnerability data stored in index \"dassault\" @@ -89942,10 +88093,8 @@ async def index_dassault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89998,8 +88147,7 @@ async def index_dassault_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90048,8 +88196,7 @@ async def index_dassault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90067,7 +88214,7 @@ async def index_dassault_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination]: """Return vulnerability data stored in index \"dassault\" @@ -90107,10 +88254,8 @@ async def index_dassault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90163,8 +88308,7 @@ async def index_dassault_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90213,8 +88357,7 @@ async def index_dassault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90232,7 +88375,7 @@ async def index_dassault_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dassault\" @@ -90272,10 +88415,8 @@ async def index_dassault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90328,8 +88469,7 @@ async def index_dassault_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90373,8 +88513,7 @@ def _index_dassault_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -90387,7 +88526,10 @@ def _index_dassault_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -90471,13 +88613,9 @@ def _index_dassault_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -90560,8 +88698,7 @@ async def index_debian_dsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90579,7 +88716,7 @@ async def index_debian_dsa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination: """Return vulnerability data stored in index \"debian-dsa\" @@ -90619,10 +88756,8 @@ async def index_debian_dsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90675,8 +88810,7 @@ async def index_debian_dsa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90725,8 +88859,7 @@ async def index_debian_dsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90744,7 +88877,7 @@ async def index_debian_dsa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"debian-dsa\" @@ -90784,10 +88917,8 @@ async def index_debian_dsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90840,8 +88971,7 @@ async def index_debian_dsa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90890,8 +89020,7 @@ async def index_debian_dsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90909,7 +89038,7 @@ async def index_debian_dsa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-dsa\" @@ -90949,10 +89078,8 @@ async def index_debian_dsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91005,8 +89132,7 @@ async def index_debian_dsa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91050,8 +89176,7 @@ def _index_debian_dsa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91064,7 +89189,10 @@ def _index_debian_dsa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -91148,13 +89276,9 @@ def _index_debian_dsa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -91237,8 +89361,7 @@ async def index_debian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91256,7 +89379,7 @@ async def index_debian_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination: """Return vulnerability data stored in index \"debian\" @@ -91296,10 +89419,8 @@ async def index_debian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91352,8 +89473,7 @@ async def index_debian_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91402,8 +89522,7 @@ async def index_debian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91421,7 +89540,7 @@ async def index_debian_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination]: """Return vulnerability data stored in index \"debian\" @@ -91461,10 +89580,8 @@ async def index_debian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91517,8 +89634,7 @@ async def index_debian_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91567,8 +89683,7 @@ async def index_debian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91586,7 +89701,7 @@ async def index_debian_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian\" @@ -91626,10 +89741,8 @@ async def index_debian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91682,8 +89795,7 @@ async def index_debian_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91727,8 +89839,7 @@ def _index_debian_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91741,7 +89852,10 @@ def _index_debian_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -91825,13 +89939,9 @@ def _index_debian_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -91914,8 +90024,7 @@ async def index_debian_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91933,7 +90042,7 @@ async def index_debian_packages_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination: """Return vulnerability data stored in index \"debian-packages\" @@ -91973,10 +90082,8 @@ async def index_debian_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92029,8 +90136,7 @@ async def index_debian_packages_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92079,8 +90185,7 @@ async def index_debian_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92098,7 +90203,7 @@ async def index_debian_packages_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination]: """Return vulnerability data stored in index \"debian-packages\" @@ -92138,10 +90243,8 @@ async def index_debian_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92194,8 +90297,7 @@ async def index_debian_packages_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92244,8 +90346,7 @@ async def index_debian_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92263,7 +90364,7 @@ async def index_debian_packages_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-packages\" @@ -92303,10 +90404,8 @@ async def index_debian_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92359,8 +90458,7 @@ async def index_debian_packages_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92404,8 +90502,7 @@ def _index_debian_packages_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -92418,7 +90515,10 @@ def _index_debian_packages_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -92502,13 +90602,9 @@ def _index_debian_packages_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -92591,8 +90687,7 @@ async def index_debian_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92610,7 +90705,7 @@ async def index_debian_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"debian-purls\" @@ -92650,10 +90745,8 @@ async def index_debian_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92706,8 +90799,7 @@ async def index_debian_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92756,8 +90848,7 @@ async def index_debian_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92775,7 +90866,7 @@ async def index_debian_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"debian-purls\" @@ -92815,10 +90906,8 @@ async def index_debian_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92871,8 +90960,7 @@ async def index_debian_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92921,8 +91009,7 @@ async def index_debian_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92940,7 +91027,7 @@ async def index_debian_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-purls\" @@ -92980,10 +91067,8 @@ async def index_debian_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93036,8 +91121,7 @@ async def index_debian_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93081,8 +91165,7 @@ def _index_debian_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93095,7 +91178,10 @@ def _index_debian_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -93179,13 +91265,9 @@ def _index_debian_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -93268,8 +91350,7 @@ async def index_dell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93287,7 +91368,7 @@ async def index_dell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination: """Return vulnerability data stored in index \"dell\" @@ -93327,10 +91408,8 @@ async def index_dell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93383,8 +91462,7 @@ async def index_dell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93433,8 +91511,7 @@ async def index_dell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93452,7 +91529,7 @@ async def index_dell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination]: """Return vulnerability data stored in index \"dell\" @@ -93492,10 +91569,8 @@ async def index_dell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93548,8 +91623,7 @@ async def index_dell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93598,8 +91672,7 @@ async def index_dell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93617,7 +91690,7 @@ async def index_dell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dell\" @@ -93657,10 +91730,8 @@ async def index_dell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93713,8 +91784,7 @@ async def index_dell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93758,8 +91828,7 @@ def _index_dell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93772,7 +91841,10 @@ def _index_dell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -93856,13 +91928,9 @@ def _index_dell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -93945,8 +92013,7 @@ async def index_delta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93964,7 +92031,7 @@ async def index_delta_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"delta\" @@ -94004,10 +92071,8 @@ async def index_delta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94060,8 +92125,7 @@ async def index_delta_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94110,8 +92174,7 @@ async def index_delta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94129,7 +92192,7 @@ async def index_delta_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"delta\" @@ -94169,10 +92232,8 @@ async def index_delta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94225,8 +92286,7 @@ async def index_delta_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94275,8 +92335,7 @@ async def index_delta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94294,7 +92353,7 @@ async def index_delta_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"delta\" @@ -94334,10 +92393,8 @@ async def index_delta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94390,8 +92447,7 @@ async def index_delta_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94435,8 +92491,7 @@ def _index_delta_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -94449,7 +92504,10 @@ def _index_delta_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -94533,13 +92591,9 @@ def _index_delta_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -94622,8 +92676,7 @@ async def index_dfn_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94641,7 +92694,7 @@ async def index_dfn_cert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination: """Return vulnerability data stored in index \"dfn-cert\" @@ -94681,10 +92734,8 @@ async def index_dfn_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94737,8 +92788,7 @@ async def index_dfn_cert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94787,8 +92837,7 @@ async def index_dfn_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94806,7 +92855,7 @@ async def index_dfn_cert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination]: """Return vulnerability data stored in index \"dfn-cert\" @@ -94846,10 +92895,8 @@ async def index_dfn_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94902,8 +92949,7 @@ async def index_dfn_cert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94952,8 +92998,7 @@ async def index_dfn_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94971,7 +93016,7 @@ async def index_dfn_cert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dfn-cert\" @@ -95011,10 +93056,8 @@ async def index_dfn_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95067,8 +93110,7 @@ async def index_dfn_cert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95112,8 +93154,7 @@ def _index_dfn_cert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95126,7 +93167,10 @@ def _index_dfn_cert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -95210,13 +93254,9 @@ def _index_dfn_cert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -95299,8 +93339,7 @@ async def index_django_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95318,7 +93357,7 @@ async def index_django_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination: """Return vulnerability data stored in index \"django\" @@ -95358,10 +93397,8 @@ async def index_django_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95414,8 +93451,7 @@ async def index_django_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95464,8 +93500,7 @@ async def index_django_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95483,7 +93518,7 @@ async def index_django_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination]: """Return vulnerability data stored in index \"django\" @@ -95523,10 +93558,8 @@ async def index_django_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95579,8 +93612,7 @@ async def index_django_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95629,8 +93661,7 @@ async def index_django_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95648,7 +93679,7 @@ async def index_django_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"django\" @@ -95688,10 +93719,8 @@ async def index_django_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95744,8 +93773,7 @@ async def index_django_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95789,8 +93817,7 @@ def _index_django_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95803,7 +93830,10 @@ def _index_django_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -95887,13 +93917,9 @@ def _index_django_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -95976,8 +94002,7 @@ async def index_dlink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95995,7 +94020,7 @@ async def index_dlink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination: """Return vulnerability data stored in index \"dlink\" @@ -96035,10 +94060,8 @@ async def index_dlink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96091,8 +94114,7 @@ async def index_dlink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96141,8 +94163,7 @@ async def index_dlink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96160,7 +94181,7 @@ async def index_dlink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination]: """Return vulnerability data stored in index \"dlink\" @@ -96200,10 +94221,8 @@ async def index_dlink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96256,8 +94275,7 @@ async def index_dlink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96306,8 +94324,7 @@ async def index_dlink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96325,7 +94342,7 @@ async def index_dlink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dlink\" @@ -96365,10 +94382,8 @@ async def index_dlink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96421,8 +94436,7 @@ async def index_dlink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96466,8 +94480,7 @@ def _index_dlink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -96480,7 +94493,10 @@ def _index_dlink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -96564,13 +94580,9 @@ def _index_dlink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -96653,8 +94665,7 @@ async def index_dnn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96672,7 +94683,7 @@ async def index_dnn_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination: """Return vulnerability data stored in index \"dnn\" @@ -96712,10 +94723,8 @@ async def index_dnn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96768,8 +94777,7 @@ async def index_dnn_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96818,8 +94826,7 @@ async def index_dnn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96837,7 +94844,7 @@ async def index_dnn_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination]: """Return vulnerability data stored in index \"dnn\" @@ -96877,10 +94884,8 @@ async def index_dnn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96933,8 +94938,7 @@ async def index_dnn_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96983,8 +94987,7 @@ async def index_dnn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97002,7 +95005,7 @@ async def index_dnn_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dnn\" @@ -97042,10 +95045,8 @@ async def index_dnn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97098,8 +95099,7 @@ async def index_dnn_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97143,8 +95143,7 @@ def _index_dnn_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97157,7 +95156,10 @@ def _index_dnn_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -97241,13 +95243,9 @@ def _index_dnn_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -97330,8 +95328,7 @@ async def index_dotcms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97349,7 +95346,7 @@ async def index_dotcms_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination: """Return vulnerability data stored in index \"dotcms\" @@ -97389,10 +95386,8 @@ async def index_dotcms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97445,8 +95440,7 @@ async def index_dotcms_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97495,8 +95489,7 @@ async def index_dotcms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97514,7 +95507,7 @@ async def index_dotcms_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination]: """Return vulnerability data stored in index \"dotcms\" @@ -97554,10 +95547,8 @@ async def index_dotcms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97610,8 +95601,7 @@ async def index_dotcms_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97660,8 +95650,7 @@ async def index_dotcms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97679,7 +95668,7 @@ async def index_dotcms_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dotcms\" @@ -97719,10 +95708,8 @@ async def index_dotcms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97775,8 +95762,7 @@ async def index_dotcms_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97820,8 +95806,7 @@ def _index_dotcms_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97834,7 +95819,10 @@ def _index_dotcms_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -97918,13 +95906,9 @@ def _index_dotcms_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -98007,8 +95991,7 @@ async def index_dragos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98026,7 +96009,7 @@ async def index_dragos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination: """Return vulnerability data stored in index \"dragos\" @@ -98066,10 +96049,8 @@ async def index_dragos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98122,8 +96103,7 @@ async def index_dragos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98172,8 +96152,7 @@ async def index_dragos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98191,7 +96170,7 @@ async def index_dragos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"dragos\" @@ -98231,10 +96210,8 @@ async def index_dragos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98287,8 +96264,7 @@ async def index_dragos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98337,8 +96313,7 @@ async def index_dragos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98356,7 +96331,7 @@ async def index_dragos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dragos\" @@ -98396,10 +96371,8 @@ async def index_dragos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98452,8 +96425,7 @@ async def index_dragos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98497,8 +96469,7 @@ def _index_dragos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -98511,7 +96482,10 @@ def _index_dragos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -98595,13 +96569,9 @@ def _index_dragos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -98684,8 +96654,7 @@ async def index_draytek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98703,7 +96672,7 @@ async def index_draytek_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination: """Return vulnerability data stored in index \"draytek\" @@ -98743,10 +96712,8 @@ async def index_draytek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98799,8 +96766,7 @@ async def index_draytek_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98849,8 +96815,7 @@ async def index_draytek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98868,7 +96833,7 @@ async def index_draytek_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination]: """Return vulnerability data stored in index \"draytek\" @@ -98908,10 +96873,8 @@ async def index_draytek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98964,8 +96927,7 @@ async def index_draytek_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99014,8 +96976,7 @@ async def index_draytek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99033,7 +96994,7 @@ async def index_draytek_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"draytek\" @@ -99073,10 +97034,8 @@ async def index_draytek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99129,8 +97088,7 @@ async def index_draytek_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99174,8 +97132,7 @@ def _index_draytek_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99188,7 +97145,10 @@ def _index_draytek_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -99272,13 +97232,9 @@ def _index_draytek_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -99361,8 +97317,7 @@ async def index_drupal_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99380,7 +97335,7 @@ async def index_drupal_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination: """Return vulnerability data stored in index \"drupal\" @@ -99420,10 +97375,8 @@ async def index_drupal_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99476,8 +97429,7 @@ async def index_drupal_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99526,8 +97478,7 @@ async def index_drupal_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99545,7 +97496,7 @@ async def index_drupal_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination]: """Return vulnerability data stored in index \"drupal\" @@ -99585,10 +97536,8 @@ async def index_drupal_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99641,8 +97590,7 @@ async def index_drupal_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99691,8 +97639,7 @@ async def index_drupal_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99710,7 +97657,7 @@ async def index_drupal_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"drupal\" @@ -99750,10 +97697,8 @@ async def index_drupal_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99806,8 +97751,7 @@ async def index_drupal_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99851,8 +97795,7 @@ def _index_drupal_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99865,7 +97808,10 @@ def _index_drupal_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -99949,13 +97895,9 @@ def _index_drupal_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -100038,8 +97980,7 @@ async def index_eaton_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100057,7 +97998,7 @@ async def index_eaton_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"eaton\" @@ -100097,10 +98038,8 @@ async def index_eaton_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100153,8 +98092,7 @@ async def index_eaton_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100203,8 +98141,7 @@ async def index_eaton_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100222,7 +98159,7 @@ async def index_eaton_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"eaton\" @@ -100262,10 +98199,8 @@ async def index_eaton_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100318,8 +98253,7 @@ async def index_eaton_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100368,8 +98302,7 @@ async def index_eaton_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100387,7 +98320,7 @@ async def index_eaton_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eaton\" @@ -100427,10 +98360,8 @@ async def index_eaton_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100483,8 +98414,7 @@ async def index_eaton_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100528,8 +98458,7 @@ def _index_eaton_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -100542,7 +98471,10 @@ def _index_eaton_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -100626,13 +98558,9 @@ def _index_eaton_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -100715,8 +98643,7 @@ async def index_elastic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100734,7 +98661,7 @@ async def index_elastic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination: """Return vulnerability data stored in index \"elastic\" @@ -100774,10 +98701,8 @@ async def index_elastic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100830,8 +98755,7 @@ async def index_elastic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100880,8 +98804,7 @@ async def index_elastic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100899,7 +98822,7 @@ async def index_elastic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination]: """Return vulnerability data stored in index \"elastic\" @@ -100939,10 +98862,8 @@ async def index_elastic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100995,8 +98916,7 @@ async def index_elastic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101045,8 +98965,7 @@ async def index_elastic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101064,7 +98983,7 @@ async def index_elastic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"elastic\" @@ -101104,10 +99023,8 @@ async def index_elastic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101160,8 +99077,7 @@ async def index_elastic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101205,8 +99121,7 @@ def _index_elastic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101219,7 +99134,10 @@ def _index_elastic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -101303,13 +99221,9 @@ def _index_elastic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -101392,8 +99306,7 @@ async def index_elspec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101411,7 +99324,7 @@ async def index_elspec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination: """Return vulnerability data stored in index \"elspec\" @@ -101451,10 +99364,8 @@ async def index_elspec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101507,8 +99418,7 @@ async def index_elspec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101557,8 +99467,7 @@ async def index_elspec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101576,7 +99485,7 @@ async def index_elspec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination]: """Return vulnerability data stored in index \"elspec\" @@ -101616,10 +99525,8 @@ async def index_elspec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101672,8 +99579,7 @@ async def index_elspec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101722,8 +99628,7 @@ async def index_elspec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101741,7 +99646,7 @@ async def index_elspec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"elspec\" @@ -101781,10 +99686,8 @@ async def index_elspec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101837,8 +99740,7 @@ async def index_elspec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101882,8 +99784,7 @@ def _index_elspec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101896,7 +99797,10 @@ def _index_elspec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -101980,13 +99884,9 @@ def _index_elspec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -102069,8 +99969,7 @@ async def index_emerging_threats_snort_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102088,7 +99987,7 @@ async def index_emerging_threats_snort_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102128,10 +100027,8 @@ async def index_emerging_threats_snort_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102184,8 +100081,7 @@ async def index_emerging_threats_snort_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102234,8 +100130,7 @@ async def index_emerging_threats_snort_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102253,7 +100148,7 @@ async def index_emerging_threats_snort_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination]: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102293,10 +100188,8 @@ async def index_emerging_threats_snort_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102349,8 +100242,7 @@ async def index_emerging_threats_snort_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102399,8 +100291,7 @@ async def index_emerging_threats_snort_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102418,7 +100309,7 @@ async def index_emerging_threats_snort_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102458,10 +100349,8 @@ async def index_emerging_threats_snort_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102514,8 +100403,7 @@ async def index_emerging_threats_snort_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102559,8 +100447,7 @@ def _index_emerging_threats_snort_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -102573,7 +100460,10 @@ def _index_emerging_threats_snort_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -102657,13 +100547,9 @@ def _index_emerging_threats_snort_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -102746,8 +100632,7 @@ async def index_emerson_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102765,7 +100650,7 @@ async def index_emerson_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"emerson\" @@ -102805,10 +100690,8 @@ async def index_emerson_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102861,8 +100744,7 @@ async def index_emerson_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102911,8 +100793,7 @@ async def index_emerson_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102930,7 +100811,7 @@ async def index_emerson_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"emerson\" @@ -102970,10 +100851,8 @@ async def index_emerson_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103026,8 +100905,7 @@ async def index_emerson_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103076,8 +100954,7 @@ async def index_emerson_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103095,7 +100972,7 @@ async def index_emerson_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"emerson\" @@ -103135,10 +101012,8 @@ async def index_emerson_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103191,8 +101066,7 @@ async def index_emerson_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103236,8 +101110,7 @@ def _index_emerson_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103250,7 +101123,10 @@ def _index_emerson_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -103334,13 +101210,9 @@ def _index_emerson_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -103423,8 +101295,7 @@ async def index_endoflife_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103442,7 +101313,7 @@ async def index_endoflife_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination: """Return vulnerability data stored in index \"endoflife\" @@ -103482,10 +101353,8 @@ async def index_endoflife_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103538,8 +101407,7 @@ async def index_endoflife_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103588,8 +101456,7 @@ async def index_endoflife_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103607,7 +101474,7 @@ async def index_endoflife_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination]: """Return vulnerability data stored in index \"endoflife\" @@ -103647,10 +101514,8 @@ async def index_endoflife_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103703,8 +101568,7 @@ async def index_endoflife_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103753,8 +101617,7 @@ async def index_endoflife_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103772,7 +101635,7 @@ async def index_endoflife_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"endoflife\" @@ -103812,10 +101675,8 @@ async def index_endoflife_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103868,8 +101729,7 @@ async def index_endoflife_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103913,8 +101773,7 @@ def _index_endoflife_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103927,7 +101786,10 @@ def _index_endoflife_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -104011,13 +101873,9 @@ def _index_endoflife_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -104100,8 +101958,7 @@ async def index_endress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104119,7 +101976,7 @@ async def index_endress_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination: """Return vulnerability data stored in index \"endress\" @@ -104159,10 +102016,8 @@ async def index_endress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104215,8 +102070,7 @@ async def index_endress_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104265,8 +102119,7 @@ async def index_endress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104284,7 +102137,7 @@ async def index_endress_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination]: """Return vulnerability data stored in index \"endress\" @@ -104324,10 +102177,8 @@ async def index_endress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104380,8 +102231,7 @@ async def index_endress_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104430,8 +102280,7 @@ async def index_endress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104449,7 +102298,7 @@ async def index_endress_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"endress\" @@ -104489,10 +102338,8 @@ async def index_endress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104545,8 +102392,7 @@ async def index_endress_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104590,8 +102436,7 @@ def _index_endress_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104604,7 +102449,10 @@ def _index_endress_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -104688,13 +102536,9 @@ def _index_endress_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -104777,8 +102621,7 @@ async def index_eol_alibaba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104796,7 +102639,7 @@ async def index_eol_alibaba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination: """Return vulnerability data stored in index \"eol-alibaba\" @@ -104836,10 +102679,8 @@ async def index_eol_alibaba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104892,8 +102733,7 @@ async def index_eol_alibaba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104942,8 +102782,7 @@ async def index_eol_alibaba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104961,7 +102800,7 @@ async def index_eol_alibaba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination]: """Return vulnerability data stored in index \"eol-alibaba\" @@ -105001,10 +102840,8 @@ async def index_eol_alibaba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105057,8 +102894,7 @@ async def index_eol_alibaba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105107,8 +102943,7 @@ async def index_eol_alibaba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105126,7 +102961,7 @@ async def index_eol_alibaba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol-alibaba\" @@ -105166,10 +103001,8 @@ async def index_eol_alibaba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105222,8 +103055,7 @@ async def index_eol_alibaba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105267,8 +103099,7 @@ def _index_eol_alibaba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105281,7 +103112,10 @@ def _index_eol_alibaba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -105365,13 +103199,9 @@ def _index_eol_alibaba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -105454,8 +103284,7 @@ async def index_eol_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105473,7 +103302,7 @@ async def index_eol_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination: """Return vulnerability data stored in index \"eol\" @@ -105513,10 +103342,8 @@ async def index_eol_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105569,8 +103396,7 @@ async def index_eol_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105619,8 +103445,7 @@ async def index_eol_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105638,7 +103463,7 @@ async def index_eol_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination]: """Return vulnerability data stored in index \"eol\" @@ -105678,10 +103503,8 @@ async def index_eol_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105734,8 +103557,7 @@ async def index_eol_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105784,8 +103606,7 @@ async def index_eol_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105803,7 +103624,7 @@ async def index_eol_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol\" @@ -105843,10 +103664,8 @@ async def index_eol_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105899,8 +103718,7 @@ async def index_eol_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105944,8 +103762,7 @@ def _index_eol_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105958,7 +103775,10 @@ def _index_eol_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -106042,13 +103862,9 @@ def _index_eol_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -106131,8 +103947,7 @@ async def index_eol_microsoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106150,7 +103965,7 @@ async def index_eol_microsoft_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106190,10 +104005,8 @@ async def index_eol_microsoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106246,8 +104059,7 @@ async def index_eol_microsoft_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106296,8 +104108,7 @@ async def index_eol_microsoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106315,7 +104126,7 @@ async def index_eol_microsoft_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination]: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106355,10 +104166,8 @@ async def index_eol_microsoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106411,8 +104220,7 @@ async def index_eol_microsoft_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106461,8 +104269,7 @@ async def index_eol_microsoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106480,7 +104287,7 @@ async def index_eol_microsoft_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106520,10 +104327,8 @@ async def index_eol_microsoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106576,8 +104381,7 @@ async def index_eol_microsoft_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106621,8 +104425,7 @@ def _index_eol_microsoft_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106635,7 +104438,10 @@ def _index_eol_microsoft_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -106719,13 +104525,9 @@ def _index_eol_microsoft_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -106808,8 +104610,7 @@ async def index_epss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106827,7 +104628,7 @@ async def index_epss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination: """Return vulnerability data stored in index \"epss\" @@ -106867,10 +104668,8 @@ async def index_epss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106923,8 +104722,7 @@ async def index_epss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106973,8 +104771,7 @@ async def index_epss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106992,7 +104789,7 @@ async def index_epss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination]: """Return vulnerability data stored in index \"epss\" @@ -107032,10 +104829,8 @@ async def index_epss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107088,8 +104883,7 @@ async def index_epss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107138,8 +104932,7 @@ async def index_epss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107157,7 +104950,7 @@ async def index_epss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"epss\" @@ -107197,10 +104990,8 @@ async def index_epss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107253,8 +105044,7 @@ async def index_epss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107298,8 +105088,7 @@ def _index_epss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107312,7 +105101,10 @@ def _index_epss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -107396,13 +105188,9 @@ def _index_epss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -107485,8 +105273,7 @@ async def index_euvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107504,7 +105291,7 @@ async def index_euvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination: """Return vulnerability data stored in index \"euvd\" @@ -107544,10 +105331,8 @@ async def index_euvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107600,8 +105385,7 @@ async def index_euvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107650,8 +105434,7 @@ async def index_euvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107669,7 +105452,7 @@ async def index_euvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination]: """Return vulnerability data stored in index \"euvd\" @@ -107709,10 +105492,8 @@ async def index_euvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107765,8 +105546,7 @@ async def index_euvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107815,8 +105595,7 @@ async def index_euvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107834,7 +105613,7 @@ async def index_euvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"euvd\" @@ -107874,10 +105653,8 @@ async def index_euvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107930,8 +105707,7 @@ async def index_euvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107975,8 +105751,7 @@ def _index_euvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107989,7 +105764,10 @@ def _index_euvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -108073,13 +105851,9 @@ def _index_euvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -108162,8 +105936,7 @@ async def index_exodus_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108181,7 +105954,7 @@ async def index_exodus_intel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination: """Return vulnerability data stored in index \"exodus-intel\" @@ -108221,10 +105994,8 @@ async def index_exodus_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108277,8 +106048,7 @@ async def index_exodus_intel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108327,8 +106097,7 @@ async def index_exodus_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108346,7 +106115,7 @@ async def index_exodus_intel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination]: """Return vulnerability data stored in index \"exodus-intel\" @@ -108386,10 +106155,8 @@ async def index_exodus_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108442,8 +106209,7 @@ async def index_exodus_intel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108492,8 +106258,7 @@ async def index_exodus_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108511,7 +106276,7 @@ async def index_exodus_intel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exodus-intel\" @@ -108551,10 +106316,8 @@ async def index_exodus_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108607,8 +106370,7 @@ async def index_exodus_intel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108652,8 +106414,7 @@ def _index_exodus_intel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108666,7 +106427,10 @@ def _index_exodus_intel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -108750,13 +106514,9 @@ def _index_exodus_intel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -108839,8 +106599,7 @@ async def index_exploit_chains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108858,7 +106617,7 @@ async def index_exploit_chains_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination: """Return vulnerability data stored in index \"exploit-chains\" @@ -108898,10 +106657,8 @@ async def index_exploit_chains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108954,8 +106711,7 @@ async def index_exploit_chains_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109004,8 +106760,7 @@ async def index_exploit_chains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109023,7 +106778,7 @@ async def index_exploit_chains_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitChainPaginatePagination]: """Return vulnerability data stored in index \"exploit-chains\" @@ -109063,10 +106818,8 @@ async def index_exploit_chains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109119,8 +106872,7 @@ async def index_exploit_chains_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109169,8 +106921,7 @@ async def index_exploit_chains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109188,7 +106939,7 @@ async def index_exploit_chains_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploit-chains\" @@ -109228,10 +106979,8 @@ async def index_exploit_chains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109284,8 +107033,7 @@ async def index_exploit_chains_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109329,8 +107077,7 @@ def _index_exploit_chains_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -109343,7 +107090,10 @@ def _index_exploit_chains_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -109427,13 +107177,9 @@ def _index_exploit_chains_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -109516,8 +107262,7 @@ async def index_exploitdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109535,7 +107280,7 @@ async def index_exploitdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination: """Return vulnerability data stored in index \"exploitdb\" @@ -109575,10 +107320,8 @@ async def index_exploitdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109631,8 +107374,7 @@ async def index_exploitdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109681,8 +107423,7 @@ async def index_exploitdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109700,7 +107441,7 @@ async def index_exploitdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination]: """Return vulnerability data stored in index \"exploitdb\" @@ -109740,10 +107481,8 @@ async def index_exploitdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109796,8 +107535,7 @@ async def index_exploitdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109846,8 +107584,7 @@ async def index_exploitdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109865,7 +107602,7 @@ async def index_exploitdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploitdb\" @@ -109905,10 +107642,8 @@ async def index_exploitdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109961,8 +107696,7 @@ async def index_exploitdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110006,8 +107740,7 @@ def _index_exploitdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110020,7 +107753,10 @@ def _index_exploitdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -110104,13 +107840,9 @@ def _index_exploitdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -110193,8 +107925,7 @@ async def index_exploits_changelog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110212,7 +107943,7 @@ async def index_exploits_changelog_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110252,10 +107983,8 @@ async def index_exploits_changelog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110308,8 +108037,7 @@ async def index_exploits_changelog_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110358,8 +108086,7 @@ async def index_exploits_changelog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110377,7 +108104,7 @@ async def index_exploits_changelog_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination]: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110417,10 +108144,8 @@ async def index_exploits_changelog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110473,8 +108198,7 @@ async def index_exploits_changelog_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110523,8 +108247,7 @@ async def index_exploits_changelog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110542,7 +108265,7 @@ async def index_exploits_changelog_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110582,10 +108305,8 @@ async def index_exploits_changelog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110638,8 +108359,7 @@ async def index_exploits_changelog_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110683,8 +108403,7 @@ def _index_exploits_changelog_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110697,7 +108416,10 @@ def _index_exploits_changelog_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -110781,13 +108503,9 @@ def _index_exploits_changelog_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -110870,8 +108588,7 @@ async def index_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110889,7 +108606,7 @@ async def index_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination: """Return vulnerability data stored in index \"exploits\" @@ -110929,10 +108646,8 @@ async def index_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110985,8 +108700,7 @@ async def index_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111035,8 +108749,7 @@ async def index_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111054,7 +108767,7 @@ async def index_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination]: """Return vulnerability data stored in index \"exploits\" @@ -111094,10 +108807,8 @@ async def index_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111150,8 +108861,7 @@ async def index_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111200,8 +108910,7 @@ async def index_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111219,7 +108928,7 @@ async def index_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploits\" @@ -111259,10 +108968,8 @@ async def index_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111315,8 +109022,7 @@ async def index_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111360,8 +109066,7 @@ def _index_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -111374,7 +109079,10 @@ def _index_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -111458,13 +109166,9 @@ def _index_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -111547,8 +109251,7 @@ async def index_f5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111566,7 +109269,7 @@ async def index_f5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination: """Return vulnerability data stored in index \"f5\" @@ -111606,10 +109309,8 @@ async def index_f5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111662,8 +109363,7 @@ async def index_f5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111712,8 +109412,7 @@ async def index_f5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111731,7 +109430,7 @@ async def index_f5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination]: """Return vulnerability data stored in index \"f5\" @@ -111771,10 +109470,8 @@ async def index_f5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111827,8 +109524,7 @@ async def index_f5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111877,8 +109573,7 @@ async def index_f5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111896,7 +109591,7 @@ async def index_f5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"f5\" @@ -111936,10 +109631,8 @@ async def index_f5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111992,8 +109685,7 @@ async def index_f5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112037,8 +109729,7 @@ def _index_f5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112051,7 +109742,10 @@ def _index_f5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -112135,13 +109829,9 @@ def _index_f5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -112224,8 +109914,7 @@ async def index_f_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112243,7 +109932,7 @@ async def index_f_secure_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination: """Return vulnerability data stored in index \"f-secure\" @@ -112283,10 +109972,8 @@ async def index_f_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112339,8 +110026,7 @@ async def index_f_secure_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112389,8 +110075,7 @@ async def index_f_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112408,7 +110093,7 @@ async def index_f_secure_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination]: """Return vulnerability data stored in index \"f-secure\" @@ -112448,10 +110133,8 @@ async def index_f_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112504,8 +110187,7 @@ async def index_f_secure_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112554,8 +110236,7 @@ async def index_f_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112573,7 +110254,7 @@ async def index_f_secure_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"f-secure\" @@ -112613,10 +110294,8 @@ async def index_f_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112669,8 +110348,7 @@ async def index_f_secure_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112714,8 +110392,7 @@ def _index_f_secure_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112728,7 +110405,10 @@ def _index_f_secure_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -112812,13 +110492,9 @@ def _index_f_secure_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -112901,8 +110577,7 @@ async def index_fanuc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112920,7 +110595,7 @@ async def index_fanuc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination: """Return vulnerability data stored in index \"fanuc\" @@ -112960,10 +110635,8 @@ async def index_fanuc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113016,8 +110689,7 @@ async def index_fanuc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113066,8 +110738,7 @@ async def index_fanuc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113085,7 +110756,7 @@ async def index_fanuc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination]: """Return vulnerability data stored in index \"fanuc\" @@ -113125,10 +110796,8 @@ async def index_fanuc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113181,8 +110850,7 @@ async def index_fanuc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113231,8 +110899,7 @@ async def index_fanuc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113250,7 +110917,7 @@ async def index_fanuc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fanuc\" @@ -113290,10 +110957,8 @@ async def index_fanuc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113346,8 +111011,7 @@ async def index_fanuc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113391,8 +111055,7 @@ def _index_fanuc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -113405,7 +111068,10 @@ def _index_fanuc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -113489,13 +111155,9 @@ def _index_fanuc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -113578,8 +111240,7 @@ async def index_fastly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113597,7 +111258,7 @@ async def index_fastly_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination: """Return vulnerability data stored in index \"fastly\" @@ -113637,10 +111298,8 @@ async def index_fastly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113693,8 +111352,7 @@ async def index_fastly_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113743,8 +111401,7 @@ async def index_fastly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113762,7 +111419,7 @@ async def index_fastly_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination]: """Return vulnerability data stored in index \"fastly\" @@ -113802,10 +111459,8 @@ async def index_fastly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113858,8 +111513,7 @@ async def index_fastly_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113908,8 +111562,7 @@ async def index_fastly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113927,7 +111580,7 @@ async def index_fastly_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fastly\" @@ -113967,10 +111620,8 @@ async def index_fastly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114023,8 +111674,7 @@ async def index_fastly_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114068,8 +111718,7 @@ def _index_fastly_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114082,7 +111731,10 @@ def _index_fastly_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -114166,13 +111818,9 @@ def _index_fastly_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -114255,8 +111903,7 @@ async def index_fedora_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114274,7 +111921,7 @@ async def index_fedora_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination: """Return vulnerability data stored in index \"fedora\" @@ -114314,10 +111961,8 @@ async def index_fedora_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114370,8 +112015,7 @@ async def index_fedora_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114420,8 +112064,7 @@ async def index_fedora_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114439,7 +112082,7 @@ async def index_fedora_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination]: """Return vulnerability data stored in index \"fedora\" @@ -114479,10 +112122,8 @@ async def index_fedora_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114535,8 +112176,7 @@ async def index_fedora_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114585,8 +112225,7 @@ async def index_fedora_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114604,7 +112243,7 @@ async def index_fedora_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fedora\" @@ -114644,10 +112283,8 @@ async def index_fedora_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114700,8 +112337,7 @@ async def index_fedora_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114745,8 +112381,7 @@ def _index_fedora_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114759,7 +112394,10 @@ def _index_fedora_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -114843,13 +112481,9 @@ def _index_fedora_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -114932,8 +112566,7 @@ async def index_festo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114951,7 +112584,7 @@ async def index_festo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination: """Return vulnerability data stored in index \"festo\" @@ -114991,10 +112624,8 @@ async def index_festo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115047,8 +112678,7 @@ async def index_festo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115097,8 +112727,7 @@ async def index_festo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115116,7 +112745,7 @@ async def index_festo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination]: """Return vulnerability data stored in index \"festo\" @@ -115156,10 +112785,8 @@ async def index_festo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115212,8 +112839,7 @@ async def index_festo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115262,8 +112888,7 @@ async def index_festo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115281,7 +112906,7 @@ async def index_festo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"festo\" @@ -115321,10 +112946,8 @@ async def index_festo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115377,8 +113000,7 @@ async def index_festo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115422,8 +113044,7 @@ def _index_festo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -115436,7 +113057,10 @@ def _index_festo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -115520,13 +113144,9 @@ def _index_festo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -115609,8 +113229,7 @@ async def index_filecloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115628,7 +113247,7 @@ async def index_filecloud_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination: """Return vulnerability data stored in index \"filecloud\" @@ -115668,10 +113287,8 @@ async def index_filecloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115724,8 +113341,7 @@ async def index_filecloud_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115774,8 +113390,7 @@ async def index_filecloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115793,7 +113408,7 @@ async def index_filecloud_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination]: """Return vulnerability data stored in index \"filecloud\" @@ -115833,10 +113448,8 @@ async def index_filecloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115889,8 +113502,7 @@ async def index_filecloud_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115939,8 +113551,7 @@ async def index_filecloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115958,7 +113569,7 @@ async def index_filecloud_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"filecloud\" @@ -115998,10 +113609,8 @@ async def index_filecloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116054,8 +113663,7 @@ async def index_filecloud_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116099,8 +113707,7 @@ def _index_filecloud_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116113,7 +113720,10 @@ def _index_filecloud_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -116197,13 +113807,9 @@ def _index_filecloud_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -116286,8 +113892,7 @@ async def index_filezilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116305,7 +113910,7 @@ async def index_filezilla_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination: """Return vulnerability data stored in index \"filezilla\" @@ -116345,10 +113950,8 @@ async def index_filezilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116401,8 +114004,7 @@ async def index_filezilla_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116451,8 +114053,7 @@ async def index_filezilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116470,7 +114071,7 @@ async def index_filezilla_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination]: """Return vulnerability data stored in index \"filezilla\" @@ -116510,10 +114111,8 @@ async def index_filezilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116566,8 +114165,7 @@ async def index_filezilla_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116616,8 +114214,7 @@ async def index_filezilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116635,7 +114232,7 @@ async def index_filezilla_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"filezilla\" @@ -116675,10 +114272,8 @@ async def index_filezilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116731,8 +114326,7 @@ async def index_filezilla_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116776,8 +114370,7 @@ def _index_filezilla_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116790,7 +114383,10 @@ def _index_filezilla_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -116874,13 +114470,9 @@ def _index_filezilla_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -116963,8 +114555,7 @@ async def index_flatt_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116982,7 +114573,7 @@ async def index_flatt_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination: """Return vulnerability data stored in index \"flatt-security\" @@ -117022,10 +114613,8 @@ async def index_flatt_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117078,8 +114667,7 @@ async def index_flatt_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117128,8 +114716,7 @@ async def index_flatt_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117147,7 +114734,7 @@ async def index_flatt_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination]: """Return vulnerability data stored in index \"flatt-security\" @@ -117187,10 +114774,8 @@ async def index_flatt_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117243,8 +114828,7 @@ async def index_flatt_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117293,8 +114877,7 @@ async def index_flatt_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117312,7 +114895,7 @@ async def index_flatt_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"flatt-security\" @@ -117352,10 +114935,8 @@ async def index_flatt_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117408,8 +114989,7 @@ async def index_flatt_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117453,8 +115033,7 @@ def _index_flatt_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -117467,7 +115046,10 @@ def _index_flatt_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -117551,13 +115133,9 @@ def _index_flatt_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -117640,8 +115218,7 @@ async def index_forgerock_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117659,7 +115236,7 @@ async def index_forgerock_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination: """Return vulnerability data stored in index \"forgerock\" @@ -117699,10 +115276,8 @@ async def index_forgerock_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117755,8 +115330,7 @@ async def index_forgerock_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117805,8 +115379,7 @@ async def index_forgerock_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117824,7 +115397,7 @@ async def index_forgerock_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination]: """Return vulnerability data stored in index \"forgerock\" @@ -117864,10 +115437,8 @@ async def index_forgerock_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117920,8 +115491,7 @@ async def index_forgerock_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117970,8 +115540,7 @@ async def index_forgerock_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117989,7 +115558,7 @@ async def index_forgerock_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"forgerock\" @@ -118029,10 +115598,8 @@ async def index_forgerock_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118085,8 +115652,7 @@ async def index_forgerock_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118130,8 +115696,7 @@ def _index_forgerock_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118144,7 +115709,10 @@ def _index_forgerock_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -118228,13 +115796,9 @@ def _index_forgerock_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -118317,8 +115881,7 @@ async def index_fortinet_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118336,7 +115899,7 @@ async def index_fortinet_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination: """Return vulnerability data stored in index \"fortinet\" @@ -118376,10 +115939,8 @@ async def index_fortinet_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118432,8 +115993,7 @@ async def index_fortinet_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118482,8 +116042,7 @@ async def index_fortinet_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118501,7 +116060,7 @@ async def index_fortinet_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"fortinet\" @@ -118541,10 +116100,8 @@ async def index_fortinet_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118597,8 +116154,7 @@ async def index_fortinet_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118647,8 +116203,7 @@ async def index_fortinet_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118666,7 +116221,7 @@ async def index_fortinet_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fortinet\" @@ -118706,10 +116261,8 @@ async def index_fortinet_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118762,8 +116315,7 @@ async def index_fortinet_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118807,8 +116359,7 @@ def _index_fortinet_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118821,7 +116372,10 @@ def _index_fortinet_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -118905,13 +116459,9 @@ def _index_fortinet_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -118994,8 +116544,7 @@ async def index_fortinet_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119013,7 +116562,7 @@ async def index_fortinet_ips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119053,10 +116602,8 @@ async def index_fortinet_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119109,8 +116656,7 @@ async def index_fortinet_ips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119159,8 +116705,7 @@ async def index_fortinet_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119178,7 +116723,7 @@ async def index_fortinet_ips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination]: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119218,10 +116763,8 @@ async def index_fortinet_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119274,8 +116817,7 @@ async def index_fortinet_ips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119324,8 +116866,7 @@ async def index_fortinet_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119343,7 +116884,7 @@ async def index_fortinet_ips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119383,10 +116924,8 @@ async def index_fortinet_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119439,8 +116978,7 @@ async def index_fortinet_ips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119484,8 +117022,7 @@ def _index_fortinet_ips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -119498,7 +117035,10 @@ def _index_fortinet_ips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -119582,13 +117122,9 @@ def _index_fortinet_ips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -119671,8 +117207,7 @@ async def index_foxit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119690,7 +117225,7 @@ async def index_foxit_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination: """Return vulnerability data stored in index \"foxit\" @@ -119730,10 +117265,8 @@ async def index_foxit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119786,8 +117319,7 @@ async def index_foxit_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119836,8 +117368,7 @@ async def index_foxit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119855,7 +117386,7 @@ async def index_foxit_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination]: """Return vulnerability data stored in index \"foxit\" @@ -119895,10 +117426,8 @@ async def index_foxit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119951,8 +117480,7 @@ async def index_foxit_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120001,8 +117529,7 @@ async def index_foxit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120020,7 +117547,7 @@ async def index_foxit_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"foxit\" @@ -120060,10 +117587,8 @@ async def index_foxit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120116,8 +117641,7 @@ async def index_foxit_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120161,8 +117685,7 @@ def _index_foxit_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120175,7 +117698,10 @@ def _index_foxit_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -120259,13 +117785,9 @@ def _index_foxit_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -120348,8 +117870,7 @@ async def index_freebsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120367,7 +117888,7 @@ async def index_freebsd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination: """Return vulnerability data stored in index \"freebsd\" @@ -120407,10 +117928,8 @@ async def index_freebsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120463,8 +117982,7 @@ async def index_freebsd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120513,8 +118031,7 @@ async def index_freebsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120532,7 +118049,7 @@ async def index_freebsd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"freebsd\" @@ -120572,10 +118089,8 @@ async def index_freebsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120628,8 +118143,7 @@ async def index_freebsd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120678,8 +118192,7 @@ async def index_freebsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120697,7 +118210,7 @@ async def index_freebsd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"freebsd\" @@ -120737,10 +118250,8 @@ async def index_freebsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120793,8 +118304,7 @@ async def index_freebsd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120838,8 +118348,7 @@ def _index_freebsd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120852,7 +118361,10 @@ def _index_freebsd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -120936,13 +118448,9 @@ def _index_freebsd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -121025,8 +118533,7 @@ async def index_fresenius_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121044,7 +118551,7 @@ async def index_fresenius_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination: """Return vulnerability data stored in index \"fresenius\" @@ -121084,10 +118591,8 @@ async def index_fresenius_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121140,8 +118645,7 @@ async def index_fresenius_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121190,8 +118694,7 @@ async def index_fresenius_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121209,7 +118712,7 @@ async def index_fresenius_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination]: """Return vulnerability data stored in index \"fresenius\" @@ -121249,10 +118752,8 @@ async def index_fresenius_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121305,8 +118806,7 @@ async def index_fresenius_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121355,8 +118855,7 @@ async def index_fresenius_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121374,7 +118873,7 @@ async def index_fresenius_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fresenius\" @@ -121414,10 +118913,8 @@ async def index_fresenius_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121470,8 +118967,7 @@ async def index_fresenius_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121515,8 +119011,7 @@ def _index_fresenius_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -121529,7 +119024,10 @@ def _index_fresenius_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -121613,13 +119111,9 @@ def _index_fresenius_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -121702,8 +119196,7 @@ async def index_gallagher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121721,7 +119214,7 @@ async def index_gallagher_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination: """Return vulnerability data stored in index \"gallagher\" @@ -121761,10 +119254,8 @@ async def index_gallagher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121817,8 +119308,7 @@ async def index_gallagher_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121867,8 +119357,7 @@ async def index_gallagher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121886,7 +119375,7 @@ async def index_gallagher_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination]: """Return vulnerability data stored in index \"gallagher\" @@ -121926,10 +119415,8 @@ async def index_gallagher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121982,8 +119469,7 @@ async def index_gallagher_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122032,8 +119518,7 @@ async def index_gallagher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122051,7 +119536,7 @@ async def index_gallagher_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gallagher\" @@ -122091,10 +119576,8 @@ async def index_gallagher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122147,8 +119630,7 @@ async def index_gallagher_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122192,8 +119674,7 @@ def _index_gallagher_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122206,7 +119687,10 @@ def _index_gallagher_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -122290,13 +119774,9 @@ def _index_gallagher_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -122379,8 +119859,7 @@ async def index_gcp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122398,7 +119877,7 @@ async def index_gcp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination: """Return vulnerability data stored in index \"gcp\" @@ -122438,10 +119917,8 @@ async def index_gcp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122494,8 +119971,7 @@ async def index_gcp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122544,8 +120020,7 @@ async def index_gcp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122563,7 +120038,7 @@ async def index_gcp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination]: """Return vulnerability data stored in index \"gcp\" @@ -122603,10 +120078,8 @@ async def index_gcp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122659,8 +120132,7 @@ async def index_gcp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122709,8 +120181,7 @@ async def index_gcp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122728,7 +120199,7 @@ async def index_gcp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gcp\" @@ -122768,10 +120239,8 @@ async def index_gcp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122824,8 +120293,7 @@ async def index_gcp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122869,8 +120337,7 @@ def _index_gcp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122883,7 +120350,10 @@ def _index_gcp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -122967,13 +120437,9 @@ def _index_gcp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -123056,8 +120522,7 @@ async def index_ge_gas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123075,7 +120540,7 @@ async def index_ge_gas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination: """Return vulnerability data stored in index \"ge-gas\" @@ -123115,10 +120580,8 @@ async def index_ge_gas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123171,8 +120634,7 @@ async def index_ge_gas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123221,8 +120683,7 @@ async def index_ge_gas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123240,7 +120701,7 @@ async def index_ge_gas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination]: """Return vulnerability data stored in index \"ge-gas\" @@ -123280,10 +120741,8 @@ async def index_ge_gas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123336,8 +120795,7 @@ async def index_ge_gas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123386,8 +120844,7 @@ async def index_ge_gas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123405,7 +120862,7 @@ async def index_ge_gas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ge-gas\" @@ -123445,10 +120902,8 @@ async def index_ge_gas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123501,8 +120956,7 @@ async def index_ge_gas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123546,8 +121000,7 @@ def _index_ge_gas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -123560,7 +121013,10 @@ def _index_ge_gas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -123644,13 +121100,9 @@ def _index_ge_gas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -123733,8 +121185,7 @@ async def index_ge_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123752,7 +121203,7 @@ async def index_ge_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ge-healthcare\" @@ -123792,10 +121243,8 @@ async def index_ge_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123848,8 +121297,7 @@ async def index_ge_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123898,8 +121346,7 @@ async def index_ge_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123917,7 +121364,7 @@ async def index_ge_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ge-healthcare\" @@ -123957,10 +121404,8 @@ async def index_ge_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124013,8 +121458,7 @@ async def index_ge_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124063,8 +121507,7 @@ async def index_ge_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124082,7 +121525,7 @@ async def index_ge_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ge-healthcare\" @@ -124122,10 +121565,8 @@ async def index_ge_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124178,8 +121619,7 @@ async def index_ge_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124223,8 +121663,7 @@ def _index_ge_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124237,7 +121676,10 @@ def _index_ge_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -124321,13 +121763,9 @@ def _index_ge_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -124410,8 +121848,7 @@ async def index_gem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124429,7 +121866,7 @@ async def index_gem_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"gem\" @@ -124469,10 +121906,8 @@ async def index_gem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124525,8 +121960,7 @@ async def index_gem_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124575,8 +122009,7 @@ async def index_gem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124594,7 +122027,7 @@ async def index_gem_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"gem\" @@ -124634,10 +122067,8 @@ async def index_gem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124690,8 +122121,7 @@ async def index_gem_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124740,8 +122170,7 @@ async def index_gem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124759,7 +122188,7 @@ async def index_gem_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gem\" @@ -124799,10 +122228,8 @@ async def index_gem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124855,8 +122282,7 @@ async def index_gem_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124900,8 +122326,7 @@ def _index_gem_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124914,7 +122339,10 @@ def _index_gem_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -124998,13 +122426,9 @@ def _index_gem_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -125087,8 +122511,7 @@ async def index_gen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125106,7 +122529,7 @@ async def index_gen_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination: """Return vulnerability data stored in index \"gen\" @@ -125146,10 +122569,8 @@ async def index_gen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125202,8 +122623,7 @@ async def index_gen_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125252,8 +122672,7 @@ async def index_gen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125271,7 +122690,7 @@ async def index_gen_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination]: """Return vulnerability data stored in index \"gen\" @@ -125311,10 +122730,8 @@ async def index_gen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125367,8 +122784,7 @@ async def index_gen_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125417,8 +122833,7 @@ async def index_gen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125436,7 +122851,7 @@ async def index_gen_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gen\" @@ -125476,10 +122891,8 @@ async def index_gen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125532,8 +122945,7 @@ async def index_gen_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125577,8 +122989,7 @@ def _index_gen_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125591,7 +123002,10 @@ def _index_gen_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -125675,13 +123089,9 @@ def _index_gen_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -125764,8 +123174,7 @@ async def index_genetec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125783,7 +123192,7 @@ async def index_genetec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination: """Return vulnerability data stored in index \"genetec\" @@ -125823,10 +123232,8 @@ async def index_genetec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125879,8 +123286,7 @@ async def index_genetec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125929,8 +123335,7 @@ async def index_genetec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125948,7 +123353,7 @@ async def index_genetec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination]: """Return vulnerability data stored in index \"genetec\" @@ -125988,10 +123393,8 @@ async def index_genetec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126044,8 +123447,7 @@ async def index_genetec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126094,8 +123496,7 @@ async def index_genetec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126113,7 +123514,7 @@ async def index_genetec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"genetec\" @@ -126153,10 +123554,8 @@ async def index_genetec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126209,8 +123608,7 @@ async def index_genetec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126254,8 +123652,7 @@ def _index_genetec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126268,7 +123665,10 @@ def _index_genetec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -126352,13 +123752,9 @@ def _index_genetec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -126441,8 +123837,7 @@ async def index_ghsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126460,7 +123855,7 @@ async def index_ghsa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination: """Return vulnerability data stored in index \"ghsa\" @@ -126500,10 +123895,8 @@ async def index_ghsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126556,8 +123949,7 @@ async def index_ghsa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126606,8 +123998,7 @@ async def index_ghsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126625,7 +124016,7 @@ async def index_ghsa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination]: """Return vulnerability data stored in index \"ghsa\" @@ -126665,10 +124056,8 @@ async def index_ghsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126721,8 +124110,7 @@ async def index_ghsa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126771,8 +124159,7 @@ async def index_ghsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126790,7 +124177,7 @@ async def index_ghsa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ghsa\" @@ -126830,10 +124217,8 @@ async def index_ghsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126886,8 +124271,7 @@ async def index_ghsa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126931,8 +124315,7 @@ def _index_ghsa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126945,7 +124328,10 @@ def _index_ghsa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -127029,13 +124415,9 @@ def _index_ghsa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -127118,8 +124500,7 @@ async def index_gigabyte_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127137,7 +124518,7 @@ async def index_gigabyte_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination: """Return vulnerability data stored in index \"gigabyte\" @@ -127177,10 +124558,8 @@ async def index_gigabyte_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127233,8 +124612,7 @@ async def index_gigabyte_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127283,8 +124661,7 @@ async def index_gigabyte_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127302,7 +124679,7 @@ async def index_gigabyte_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination]: """Return vulnerability data stored in index \"gigabyte\" @@ -127342,10 +124719,8 @@ async def index_gigabyte_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127398,8 +124773,7 @@ async def index_gigabyte_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127448,8 +124822,7 @@ async def index_gigabyte_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127467,7 +124840,7 @@ async def index_gigabyte_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gigabyte\" @@ -127507,10 +124880,8 @@ async def index_gigabyte_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127563,8 +124934,7 @@ async def index_gigabyte_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127608,8 +124978,7 @@ def _index_gigabyte_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127622,7 +124991,10 @@ def _index_gigabyte_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -127706,13 +125078,9 @@ def _index_gigabyte_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -127795,8 +125163,7 @@ async def index_gitee_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127814,7 +125181,7 @@ async def index_gitee_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination: """Return vulnerability data stored in index \"gitee-exploits\" @@ -127854,10 +125221,8 @@ async def index_gitee_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127910,8 +125275,7 @@ async def index_gitee_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127960,8 +125324,7 @@ async def index_gitee_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127979,7 +125342,7 @@ async def index_gitee_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination]: """Return vulnerability data stored in index \"gitee-exploits\" @@ -128019,10 +125382,8 @@ async def index_gitee_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128075,8 +125436,7 @@ async def index_gitee_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128125,8 +125485,7 @@ async def index_gitee_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128144,7 +125503,7 @@ async def index_gitee_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitee-exploits\" @@ -128184,10 +125543,8 @@ async def index_gitee_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128240,8 +125597,7 @@ async def index_gitee_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128285,8 +125641,7 @@ def _index_gitee_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128299,7 +125654,10 @@ def _index_gitee_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -128383,13 +125741,9 @@ def _index_gitee_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -128472,8 +125826,7 @@ async def index_github_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128491,7 +125844,7 @@ async def index_github_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination: """Return vulnerability data stored in index \"github-exploits\" @@ -128531,10 +125884,8 @@ async def index_github_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128587,8 +125938,7 @@ async def index_github_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128637,8 +125987,7 @@ async def index_github_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128656,7 +126005,7 @@ async def index_github_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination]: """Return vulnerability data stored in index \"github-exploits\" @@ -128696,10 +126045,8 @@ async def index_github_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128752,8 +126099,7 @@ async def index_github_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128802,8 +126148,7 @@ async def index_github_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128821,7 +126166,7 @@ async def index_github_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"github-exploits\" @@ -128861,10 +126206,8 @@ async def index_github_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128917,8 +126260,7 @@ async def index_github_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128962,8 +126304,7 @@ def _index_github_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128976,7 +126317,10 @@ def _index_github_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -129060,13 +126404,9 @@ def _index_github_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -129149,8 +126489,7 @@ async def index_github_security_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129168,7 +126507,7 @@ async def index_github_security_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129208,10 +126547,8 @@ async def index_github_security_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129264,8 +126601,7 @@ async def index_github_security_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129314,8 +126650,7 @@ async def index_github_security_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129333,7 +126668,7 @@ async def index_github_security_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination]: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129373,10 +126708,8 @@ async def index_github_security_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129429,8 +126762,7 @@ async def index_github_security_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129479,8 +126811,7 @@ async def index_github_security_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129498,7 +126829,7 @@ async def index_github_security_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129538,10 +126869,8 @@ async def index_github_security_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129594,8 +126923,7 @@ async def index_github_security_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129639,8 +126967,7 @@ def _index_github_security_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129653,7 +126980,10 @@ def _index_github_security_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -129737,13 +127067,9 @@ def _index_github_security_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -129826,8 +127152,7 @@ async def index_gitlab_advisories_community_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129845,7 +127170,7 @@ async def index_gitlab_advisories_community_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -129885,10 +127210,8 @@ async def index_gitlab_advisories_community_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129941,8 +127264,7 @@ async def index_gitlab_advisories_community_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129991,8 +127313,7 @@ async def index_gitlab_advisories_community_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130010,7 +127331,7 @@ async def index_gitlab_advisories_community_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -130050,10 +127371,8 @@ async def index_gitlab_advisories_community_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130106,8 +127425,7 @@ async def index_gitlab_advisories_community_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130156,8 +127474,7 @@ async def index_gitlab_advisories_community_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130175,7 +127492,7 @@ async def index_gitlab_advisories_community_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -130215,10 +127532,8 @@ async def index_gitlab_advisories_community_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130271,8 +127586,7 @@ async def index_gitlab_advisories_community_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130316,8 +127630,7 @@ def _index_gitlab_advisories_community_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -130330,7 +127643,10 @@ def _index_gitlab_advisories_community_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -130414,13 +127730,9 @@ def _index_gitlab_advisories_community_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -130503,8 +127815,7 @@ async def index_gitlab_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130522,7 +127833,7 @@ async def index_gitlab_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130562,10 +127873,8 @@ async def index_gitlab_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130618,8 +127927,7 @@ async def index_gitlab_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130668,8 +127976,7 @@ async def index_gitlab_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130687,7 +127994,7 @@ async def index_gitlab_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination]: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130727,10 +128034,8 @@ async def index_gitlab_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130783,8 +128088,7 @@ async def index_gitlab_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130833,8 +128137,7 @@ async def index_gitlab_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130852,7 +128155,7 @@ async def index_gitlab_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130892,10 +128195,8 @@ async def index_gitlab_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130948,8 +128249,7 @@ async def index_gitlab_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130993,8 +128293,7 @@ def _index_gitlab_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131007,7 +128306,10 @@ def _index_gitlab_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -131091,13 +128393,9 @@ def _index_gitlab_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -131180,8 +128478,7 @@ async def index_glibc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131199,7 +128496,7 @@ async def index_glibc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination: """Return vulnerability data stored in index \"glibc\" @@ -131239,10 +128536,8 @@ async def index_glibc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131295,8 +128590,7 @@ async def index_glibc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131345,8 +128639,7 @@ async def index_glibc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131364,7 +128657,7 @@ async def index_glibc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination]: """Return vulnerability data stored in index \"glibc\" @@ -131404,10 +128697,8 @@ async def index_glibc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131460,8 +128751,7 @@ async def index_glibc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131510,8 +128800,7 @@ async def index_glibc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131529,7 +128818,7 @@ async def index_glibc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"glibc\" @@ -131569,10 +128858,8 @@ async def index_glibc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131625,8 +128912,7 @@ async def index_glibc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131670,8 +128956,7 @@ def _index_glibc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131684,7 +128969,10 @@ def _index_glibc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -131768,13 +129056,9 @@ def _index_glibc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -131857,8 +129141,7 @@ async def index_gmo_cybersecurity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131876,7 +129159,7 @@ async def index_gmo_cybersecurity_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -131916,10 +129199,8 @@ async def index_gmo_cybersecurity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131972,8 +129253,7 @@ async def index_gmo_cybersecurity_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132022,8 +129302,7 @@ async def index_gmo_cybersecurity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132041,7 +129320,7 @@ async def index_gmo_cybersecurity_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination]: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -132081,10 +129360,8 @@ async def index_gmo_cybersecurity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132137,8 +129414,7 @@ async def index_gmo_cybersecurity_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132187,8 +129463,7 @@ async def index_gmo_cybersecurity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132206,7 +129481,7 @@ async def index_gmo_cybersecurity_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -132246,10 +129521,8 @@ async def index_gmo_cybersecurity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132302,8 +129575,7 @@ async def index_gmo_cybersecurity_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132347,8 +129619,7 @@ def _index_gmo_cybersecurity_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -132361,7 +129632,10 @@ def _index_gmo_cybersecurity_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -132445,13 +129719,9 @@ def _index_gmo_cybersecurity_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -132534,8 +129804,7 @@ async def index_gnutls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132553,7 +129822,7 @@ async def index_gnutls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination: """Return vulnerability data stored in index \"gnutls\" @@ -132593,10 +129862,8 @@ async def index_gnutls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132649,8 +129916,7 @@ async def index_gnutls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132699,8 +129965,7 @@ async def index_gnutls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132718,7 +129983,7 @@ async def index_gnutls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination]: """Return vulnerability data stored in index \"gnutls\" @@ -132758,10 +130023,8 @@ async def index_gnutls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132814,8 +130077,7 @@ async def index_gnutls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132864,8 +130126,7 @@ async def index_gnutls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132883,7 +130144,7 @@ async def index_gnutls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gnutls\" @@ -132923,10 +130184,8 @@ async def index_gnutls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132979,8 +130238,7 @@ async def index_gnutls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133024,8 +130282,7 @@ def _index_gnutls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133038,7 +130295,10 @@ def _index_gnutls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -133122,13 +130382,9 @@ def _index_gnutls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -133211,8 +130467,7 @@ async def index_go_vulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133230,7 +130485,7 @@ async def index_go_vulndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination: """Return vulnerability data stored in index \"go-vulndb\" @@ -133270,10 +130525,8 @@ async def index_go_vulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133326,8 +130579,7 @@ async def index_go_vulndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133376,8 +130628,7 @@ async def index_go_vulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133395,7 +130646,7 @@ async def index_go_vulndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination]: """Return vulnerability data stored in index \"go-vulndb\" @@ -133435,10 +130686,8 @@ async def index_go_vulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133491,8 +130740,7 @@ async def index_go_vulndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133541,8 +130789,7 @@ async def index_go_vulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133560,7 +130807,7 @@ async def index_go_vulndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"go-vulndb\" @@ -133600,10 +130847,8 @@ async def index_go_vulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133656,8 +130901,7 @@ async def index_go_vulndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133701,8 +130945,7 @@ def _index_go_vulndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133715,7 +130958,10 @@ def _index_go_vulndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -133799,13 +131045,9 @@ def _index_go_vulndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -133888,8 +131130,7 @@ async def index_golang_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133907,7 +131148,7 @@ async def index_golang_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"golang\" @@ -133947,10 +131188,8 @@ async def index_golang_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134003,8 +131242,7 @@ async def index_golang_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134053,8 +131291,7 @@ async def index_golang_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134072,7 +131309,7 @@ async def index_golang_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"golang\" @@ -134112,10 +131349,8 @@ async def index_golang_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134168,8 +131403,7 @@ async def index_golang_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134218,8 +131452,7 @@ async def index_golang_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134237,7 +131470,7 @@ async def index_golang_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"golang\" @@ -134277,10 +131510,8 @@ async def index_golang_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134333,8 +131564,7 @@ async def index_golang_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134378,8 +131608,7 @@ def _index_golang_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -134392,7 +131621,10 @@ def _index_golang_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -134476,13 +131708,9 @@ def _index_golang_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -134565,8 +131793,7 @@ async def index_google0day_itw_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134584,7 +131811,7 @@ async def index_google0day_itw_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134624,10 +131851,8 @@ async def index_google0day_itw_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134680,8 +131905,7 @@ async def index_google0day_itw_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134730,8 +131954,7 @@ async def index_google0day_itw_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134749,7 +131972,7 @@ async def index_google0day_itw_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination]: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134789,10 +132012,8 @@ async def index_google0day_itw_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134845,8 +132066,7 @@ async def index_google0day_itw_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134895,8 +132115,7 @@ async def index_google0day_itw_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134914,7 +132133,7 @@ async def index_google0day_itw_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134954,10 +132173,8 @@ async def index_google0day_itw_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135010,8 +132227,7 @@ async def index_google0day_itw_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135055,8 +132271,7 @@ def _index_google0day_itw_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135069,7 +132284,10 @@ def _index_google0day_itw_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -135153,13 +132371,9 @@ def _index_google0day_itw_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -135242,8 +132456,7 @@ async def index_google_container_optimized_os_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135261,7 +132474,7 @@ async def index_google_container_optimized_os_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135301,10 +132514,8 @@ async def index_google_container_optimized_os_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135357,8 +132568,7 @@ async def index_google_container_optimized_os_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135407,8 +132617,7 @@ async def index_google_container_optimized_os_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135426,7 +132635,7 @@ async def index_google_container_optimized_os_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination]: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135466,10 +132675,8 @@ async def index_google_container_optimized_os_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135522,8 +132729,7 @@ async def index_google_container_optimized_os_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135572,8 +132778,7 @@ async def index_google_container_optimized_os_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135591,7 +132796,7 @@ async def index_google_container_optimized_os_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135631,10 +132836,8 @@ async def index_google_container_optimized_os_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135687,8 +132890,7 @@ async def index_google_container_optimized_os_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135732,8 +132934,7 @@ def _index_google_container_optimized_os_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135746,7 +132947,10 @@ def _index_google_container_optimized_os_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -135830,13 +133034,9 @@ def _index_google_container_optimized_os_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -135919,8 +133119,7 @@ async def index_grafana_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135938,7 +133137,7 @@ async def index_grafana_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination: """Return vulnerability data stored in index \"grafana\" @@ -135978,10 +133177,8 @@ async def index_grafana_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136034,8 +133231,7 @@ async def index_grafana_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136084,8 +133280,7 @@ async def index_grafana_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136103,7 +133298,7 @@ async def index_grafana_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination]: """Return vulnerability data stored in index \"grafana\" @@ -136143,10 +133338,8 @@ async def index_grafana_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136199,8 +133392,7 @@ async def index_grafana_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136249,8 +133441,7 @@ async def index_grafana_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136268,7 +133459,7 @@ async def index_grafana_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"grafana\" @@ -136308,10 +133499,8 @@ async def index_grafana_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136364,8 +133553,7 @@ async def index_grafana_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136409,8 +133597,7 @@ def _index_grafana_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -136423,7 +133610,10 @@ def _index_grafana_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -136507,13 +133697,9 @@ def _index_grafana_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -136596,8 +133782,7 @@ async def index_greynoise_metadata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136615,7 +133800,7 @@ async def index_greynoise_metadata_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136655,10 +133840,8 @@ async def index_greynoise_metadata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136711,8 +133894,7 @@ async def index_greynoise_metadata_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136761,8 +133943,7 @@ async def index_greynoise_metadata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136780,7 +133961,7 @@ async def index_greynoise_metadata_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination]: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136820,10 +134001,8 @@ async def index_greynoise_metadata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136876,8 +134055,7 @@ async def index_greynoise_metadata_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136926,8 +134104,7 @@ async def index_greynoise_metadata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136945,7 +134122,7 @@ async def index_greynoise_metadata_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136985,10 +134162,8 @@ async def index_greynoise_metadata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137041,8 +134216,7 @@ async def index_greynoise_metadata_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137086,8 +134260,7 @@ def _index_greynoise_metadata_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137100,7 +134273,10 @@ def _index_greynoise_metadata_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -137184,13 +134360,9 @@ def _index_greynoise_metadata_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -137273,8 +134445,7 @@ async def index_hackage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137292,7 +134463,7 @@ async def index_hackage_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"hackage\" @@ -137332,10 +134503,8 @@ async def index_hackage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137388,8 +134557,7 @@ async def index_hackage_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137438,8 +134606,7 @@ async def index_hackage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137457,7 +134624,7 @@ async def index_hackage_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"hackage\" @@ -137497,10 +134664,8 @@ async def index_hackage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137553,8 +134718,7 @@ async def index_hackage_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137603,8 +134767,7 @@ async def index_hackage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137622,7 +134785,7 @@ async def index_hackage_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hackage\" @@ -137662,10 +134825,8 @@ async def index_hackage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137718,8 +134879,7 @@ async def index_hackage_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137763,8 +134923,7 @@ def _index_hackage_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137777,7 +134936,10 @@ def _index_hackage_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -137861,13 +135023,9 @@ def _index_hackage_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -137950,8 +135108,7 @@ async def index_hacktivity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137969,7 +135126,7 @@ async def index_hacktivity_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination: """Return vulnerability data stored in index \"hacktivity\" @@ -138009,10 +135166,8 @@ async def index_hacktivity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138065,8 +135220,7 @@ async def index_hacktivity_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138115,8 +135269,7 @@ async def index_hacktivity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138134,7 +135287,7 @@ async def index_hacktivity_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination]: """Return vulnerability data stored in index \"hacktivity\" @@ -138174,10 +135327,8 @@ async def index_hacktivity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138230,8 +135381,7 @@ async def index_hacktivity_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138280,8 +135430,7 @@ async def index_hacktivity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138299,7 +135448,7 @@ async def index_hacktivity_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hacktivity\" @@ -138339,10 +135488,8 @@ async def index_hacktivity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138395,8 +135542,7 @@ async def index_hacktivity_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138440,8 +135586,7 @@ def _index_hacktivity_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -138454,7 +135599,10 @@ def _index_hacktivity_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -138538,13 +135686,9 @@ def _index_hacktivity_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -138627,8 +135771,7 @@ async def index_harmonyos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138646,7 +135789,7 @@ async def index_harmonyos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination: """Return vulnerability data stored in index \"harmonyos\" @@ -138686,10 +135829,8 @@ async def index_harmonyos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138742,8 +135883,7 @@ async def index_harmonyos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138792,8 +135932,7 @@ async def index_harmonyos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138811,7 +135950,7 @@ async def index_harmonyos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination]: """Return vulnerability data stored in index \"harmonyos\" @@ -138851,10 +135990,8 @@ async def index_harmonyos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138907,8 +136044,7 @@ async def index_harmonyos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138957,8 +136093,7 @@ async def index_harmonyos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138976,7 +136111,7 @@ async def index_harmonyos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"harmonyos\" @@ -139016,10 +136151,8 @@ async def index_harmonyos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139072,8 +136205,7 @@ async def index_harmonyos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139117,8 +136249,7 @@ def _index_harmonyos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139131,7 +136262,10 @@ def _index_harmonyos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -139215,13 +136349,9 @@ def _index_harmonyos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -139304,8 +136434,7 @@ async def index_hashicorp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139323,7 +136452,7 @@ async def index_hashicorp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination: """Return vulnerability data stored in index \"hashicorp\" @@ -139363,10 +136492,8 @@ async def index_hashicorp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139419,8 +136546,7 @@ async def index_hashicorp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139469,8 +136595,7 @@ async def index_hashicorp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139488,7 +136613,7 @@ async def index_hashicorp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination]: """Return vulnerability data stored in index \"hashicorp\" @@ -139528,10 +136653,8 @@ async def index_hashicorp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139584,8 +136707,7 @@ async def index_hashicorp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139634,8 +136756,7 @@ async def index_hashicorp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139653,7 +136774,7 @@ async def index_hashicorp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hashicorp\" @@ -139693,10 +136814,8 @@ async def index_hashicorp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139749,8 +136868,7 @@ async def index_hashicorp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139794,8 +136912,7 @@ def _index_hashicorp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139808,7 +136925,10 @@ def _index_hashicorp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -139892,13 +137012,9 @@ def _index_hashicorp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -139981,8 +137097,7 @@ async def index_haskell_sadb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140000,7 +137115,7 @@ async def index_haskell_sadb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140040,10 +137155,8 @@ async def index_haskell_sadb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140096,8 +137209,7 @@ async def index_haskell_sadb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140146,8 +137258,7 @@ async def index_haskell_sadb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140165,7 +137276,7 @@ async def index_haskell_sadb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140205,10 +137316,8 @@ async def index_haskell_sadb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140261,8 +137370,7 @@ async def index_haskell_sadb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140311,8 +137419,7 @@ async def index_haskell_sadb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140330,7 +137437,7 @@ async def index_haskell_sadb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140370,10 +137477,8 @@ async def index_haskell_sadb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140426,8 +137531,7 @@ async def index_haskell_sadb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140471,8 +137575,7 @@ def _index_haskell_sadb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -140485,7 +137588,10 @@ def _index_haskell_sadb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -140569,13 +137675,9 @@ def _index_haskell_sadb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -140658,8 +137760,7 @@ async def index_hcl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140677,7 +137778,7 @@ async def index_hcl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination: """Return vulnerability data stored in index \"hcl\" @@ -140717,10 +137818,8 @@ async def index_hcl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140773,8 +137872,7 @@ async def index_hcl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140823,8 +137921,7 @@ async def index_hcl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140842,7 +137939,7 @@ async def index_hcl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination]: """Return vulnerability data stored in index \"hcl\" @@ -140882,10 +137979,8 @@ async def index_hcl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140938,8 +138033,7 @@ async def index_hcl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140988,8 +138082,7 @@ async def index_hcl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141007,7 +138100,7 @@ async def index_hcl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hcl\" @@ -141047,10 +138140,8 @@ async def index_hcl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141103,8 +138194,7 @@ async def index_hcl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141148,8 +138238,7 @@ def _index_hcl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141162,7 +138251,10 @@ def _index_hcl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -141246,13 +138338,9 @@ def _index_hcl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -141335,8 +138423,7 @@ async def index_hex_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141354,7 +138441,7 @@ async def index_hex_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"hex\" @@ -141394,10 +138481,8 @@ async def index_hex_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141450,8 +138535,7 @@ async def index_hex_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141500,8 +138584,7 @@ async def index_hex_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141519,7 +138602,7 @@ async def index_hex_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"hex\" @@ -141559,10 +138642,8 @@ async def index_hex_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141615,8 +138696,7 @@ async def index_hex_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141665,8 +138745,7 @@ async def index_hex_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141684,7 +138763,7 @@ async def index_hex_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hex\" @@ -141724,10 +138803,8 @@ async def index_hex_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141780,8 +138857,7 @@ async def index_hex_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141825,8 +138901,7 @@ def _index_hex_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141839,7 +138914,10 @@ def _index_hex_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -141923,13 +139001,9 @@ def _index_hex_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -142012,8 +139086,7 @@ async def index_hikvision_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142031,7 +139104,7 @@ async def index_hikvision_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination: """Return vulnerability data stored in index \"hikvision\" @@ -142071,10 +139144,8 @@ async def index_hikvision_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142127,8 +139198,7 @@ async def index_hikvision_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142177,8 +139247,7 @@ async def index_hikvision_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142196,7 +139265,7 @@ async def index_hikvision_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination]: """Return vulnerability data stored in index \"hikvision\" @@ -142236,10 +139305,8 @@ async def index_hikvision_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142292,8 +139359,7 @@ async def index_hikvision_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142342,8 +139408,7 @@ async def index_hikvision_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142361,7 +139426,7 @@ async def index_hikvision_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hikvision\" @@ -142401,10 +139466,8 @@ async def index_hikvision_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142457,8 +139520,7 @@ async def index_hikvision_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142502,8 +139564,7 @@ def _index_hikvision_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -142516,7 +139577,10 @@ def _index_hikvision_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -142600,13 +139664,9 @@ def _index_hikvision_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -142689,8 +139749,7 @@ async def index_hillrom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142708,7 +139767,7 @@ async def index_hillrom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination: """Return vulnerability data stored in index \"hillrom\" @@ -142748,10 +139807,8 @@ async def index_hillrom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142804,8 +139861,7 @@ async def index_hillrom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142854,8 +139910,7 @@ async def index_hillrom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142873,7 +139928,7 @@ async def index_hillrom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"hillrom\" @@ -142913,10 +139968,8 @@ async def index_hillrom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142969,8 +140022,7 @@ async def index_hillrom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143019,8 +140071,7 @@ async def index_hillrom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143038,7 +140089,7 @@ async def index_hillrom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hillrom\" @@ -143078,10 +140129,8 @@ async def index_hillrom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143134,8 +140183,7 @@ async def index_hillrom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143179,8 +140227,7 @@ def _index_hillrom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143193,7 +140240,10 @@ def _index_hillrom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -143277,13 +140327,9 @@ def _index_hillrom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -143366,8 +140412,7 @@ async def index_hitachi_energy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143385,7 +140430,7 @@ async def index_hitachi_energy_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143425,10 +140470,8 @@ async def index_hitachi_energy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143481,8 +140524,7 @@ async def index_hitachi_energy_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143531,8 +140573,7 @@ async def index_hitachi_energy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143550,7 +140591,7 @@ async def index_hitachi_energy_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination]: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143590,10 +140631,8 @@ async def index_hitachi_energy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143646,8 +140685,7 @@ async def index_hitachi_energy_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143696,8 +140734,7 @@ async def index_hitachi_energy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143715,7 +140752,7 @@ async def index_hitachi_energy_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143755,10 +140792,8 @@ async def index_hitachi_energy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143811,8 +140846,7 @@ async def index_hitachi_energy_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143856,8 +140890,7 @@ def _index_hitachi_energy_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143870,7 +140903,10 @@ def _index_hitachi_energy_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -143954,13 +140990,9 @@ def _index_hitachi_energy_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -144043,8 +141075,7 @@ async def index_hitachi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144062,7 +141093,7 @@ async def index_hitachi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination: """Return vulnerability data stored in index \"hitachi\" @@ -144102,10 +141133,8 @@ async def index_hitachi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144158,8 +141187,7 @@ async def index_hitachi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144208,8 +141236,7 @@ async def index_hitachi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144227,7 +141254,7 @@ async def index_hitachi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination]: """Return vulnerability data stored in index \"hitachi\" @@ -144267,10 +141294,8 @@ async def index_hitachi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144323,8 +141348,7 @@ async def index_hitachi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144373,8 +141397,7 @@ async def index_hitachi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144392,7 +141415,7 @@ async def index_hitachi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hitachi\" @@ -144432,10 +141455,8 @@ async def index_hitachi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144488,8 +141509,7 @@ async def index_hitachi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144533,8 +141553,7 @@ def _index_hitachi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -144547,7 +141566,10 @@ def _index_hitachi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -144631,13 +141653,9 @@ def _index_hitachi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -144720,8 +141738,7 @@ async def index_hkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144739,7 +141756,7 @@ async def index_hkcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination: """Return vulnerability data stored in index \"hkcert\" @@ -144779,10 +141796,8 @@ async def index_hkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144835,8 +141850,7 @@ async def index_hkcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144885,8 +141899,7 @@ async def index_hkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144904,7 +141917,7 @@ async def index_hkcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination]: """Return vulnerability data stored in index \"hkcert\" @@ -144944,10 +141957,8 @@ async def index_hkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145000,8 +142011,7 @@ async def index_hkcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145050,8 +142060,7 @@ async def index_hkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145069,7 +142078,7 @@ async def index_hkcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hkcert\" @@ -145109,10 +142118,8 @@ async def index_hkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145165,8 +142172,7 @@ async def index_hkcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145210,8 +142216,7 @@ def _index_hkcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145224,7 +142229,10 @@ def _index_hkcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -145308,13 +142316,9 @@ def _index_hkcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -145397,8 +142401,7 @@ async def index_hms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145416,7 +142419,7 @@ async def index_hms_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination: """Return vulnerability data stored in index \"hms\" @@ -145456,10 +142459,8 @@ async def index_hms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145512,8 +142513,7 @@ async def index_hms_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145562,8 +142562,7 @@ async def index_hms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145581,7 +142580,7 @@ async def index_hms_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination]: """Return vulnerability data stored in index \"hms\" @@ -145621,10 +142620,8 @@ async def index_hms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145677,8 +142674,7 @@ async def index_hms_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145727,8 +142723,7 @@ async def index_hms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145746,7 +142741,7 @@ async def index_hms_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hms\" @@ -145786,10 +142781,8 @@ async def index_hms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145842,8 +142835,7 @@ async def index_hms_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145887,8 +142879,7 @@ def _index_hms_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145901,7 +142892,10 @@ def _index_hms_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -145985,13 +142979,9 @@ def _index_hms_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -146074,8 +143064,7 @@ async def index_honeywell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146093,7 +143082,7 @@ async def index_honeywell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination: """Return vulnerability data stored in index \"honeywell\" @@ -146133,10 +143122,8 @@ async def index_honeywell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146189,8 +143176,7 @@ async def index_honeywell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146239,8 +143225,7 @@ async def index_honeywell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146258,7 +143243,7 @@ async def index_honeywell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination]: """Return vulnerability data stored in index \"honeywell\" @@ -146298,10 +143283,8 @@ async def index_honeywell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146354,8 +143337,7 @@ async def index_honeywell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146404,8 +143386,7 @@ async def index_honeywell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146423,7 +143404,7 @@ async def index_honeywell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"honeywell\" @@ -146463,10 +143444,8 @@ async def index_honeywell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146519,8 +143498,7 @@ async def index_honeywell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146564,8 +143542,7 @@ def _index_honeywell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -146578,7 +143555,10 @@ def _index_honeywell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -146662,13 +143642,9 @@ def _index_honeywell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -146751,8 +143727,7 @@ async def index_hp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146770,7 +143745,7 @@ async def index_hp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: """Return vulnerability data stored in index \"hp\" @@ -146810,10 +143785,8 @@ async def index_hp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146866,8 +143839,7 @@ async def index_hp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146916,8 +143888,7 @@ async def index_hp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146935,7 +143906,7 @@ async def index_hp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: """Return vulnerability data stored in index \"hp\" @@ -146975,10 +143946,8 @@ async def index_hp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147031,8 +144000,7 @@ async def index_hp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147081,8 +144049,7 @@ async def index_hp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147100,7 +144067,7 @@ async def index_hp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hp\" @@ -147140,10 +144107,8 @@ async def index_hp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147196,8 +144161,7 @@ async def index_hp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147241,8 +144205,7 @@ def _index_hp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147255,7 +144218,10 @@ def _index_hp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -147339,13 +144305,9 @@ def _index_hp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -147428,8 +144390,7 @@ async def index_hpe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147447,7 +144408,7 @@ async def index_hpe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: """Return vulnerability data stored in index \"hpe\" @@ -147487,10 +144448,8 @@ async def index_hpe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147543,8 +144502,7 @@ async def index_hpe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147593,8 +144551,7 @@ async def index_hpe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147612,7 +144569,7 @@ async def index_hpe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: """Return vulnerability data stored in index \"hpe\" @@ -147652,10 +144609,8 @@ async def index_hpe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147708,8 +144663,7 @@ async def index_hpe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147758,8 +144712,7 @@ async def index_hpe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147777,7 +144730,7 @@ async def index_hpe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hpe\" @@ -147817,10 +144770,8 @@ async def index_hpe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147873,8 +144824,7 @@ async def index_hpe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147918,8 +144868,7 @@ def _index_hpe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147932,7 +144881,10 @@ def _index_hpe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -148016,13 +144968,9 @@ def _index_hpe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -148105,8 +145053,7 @@ async def index_huawei_euleros_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148124,7 +145071,7 @@ async def index_huawei_euleros_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148164,10 +145111,8 @@ async def index_huawei_euleros_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148220,8 +145165,7 @@ async def index_huawei_euleros_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148270,8 +145214,7 @@ async def index_huawei_euleros_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148289,7 +145232,7 @@ async def index_huawei_euleros_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148329,10 +145272,8 @@ async def index_huawei_euleros_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148385,8 +145326,7 @@ async def index_huawei_euleros_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148435,8 +145375,7 @@ async def index_huawei_euleros_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148454,7 +145393,7 @@ async def index_huawei_euleros_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148494,10 +145433,8 @@ async def index_huawei_euleros_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148550,8 +145487,7 @@ async def index_huawei_euleros_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148595,8 +145531,7 @@ def _index_huawei_euleros_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148609,7 +145544,10 @@ def _index_huawei_euleros_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -148693,13 +145631,9 @@ def _index_huawei_euleros_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -148782,8 +145716,7 @@ async def index_huawei_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148801,7 +145734,7 @@ async def index_huawei_ips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: """Return vulnerability data stored in index \"huawei-ips\" @@ -148841,10 +145774,8 @@ async def index_huawei_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148897,8 +145828,7 @@ async def index_huawei_ips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148947,8 +145877,7 @@ async def index_huawei_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148966,7 +145895,7 @@ async def index_huawei_ips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: """Return vulnerability data stored in index \"huawei-ips\" @@ -149006,10 +145935,8 @@ async def index_huawei_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149062,8 +145989,7 @@ async def index_huawei_ips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149112,8 +146038,7 @@ async def index_huawei_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149131,7 +146056,7 @@ async def index_huawei_ips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-ips\" @@ -149171,10 +146096,8 @@ async def index_huawei_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149227,8 +146150,7 @@ async def index_huawei_ips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149272,8 +146194,7 @@ def _index_huawei_ips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149286,7 +146207,10 @@ def _index_huawei_ips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -149370,13 +146294,9 @@ def _index_huawei_ips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -149459,8 +146379,7 @@ async def index_huawei_psirt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149478,7 +146397,7 @@ async def index_huawei_psirt_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149518,10 +146437,8 @@ async def index_huawei_psirt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149574,8 +146491,7 @@ async def index_huawei_psirt_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149624,8 +146540,7 @@ async def index_huawei_psirt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149643,7 +146558,7 @@ async def index_huawei_psirt_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149683,10 +146598,8 @@ async def index_huawei_psirt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149739,8 +146652,7 @@ async def index_huawei_psirt_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149789,8 +146701,7 @@ async def index_huawei_psirt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149808,7 +146719,7 @@ async def index_huawei_psirt_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149848,10 +146759,8 @@ async def index_huawei_psirt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149904,8 +146813,7 @@ async def index_huawei_psirt_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149949,8 +146857,7 @@ def _index_huawei_psirt_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149963,7 +146870,10 @@ def _index_huawei_psirt_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -150047,13 +146957,9 @@ def _index_huawei_psirt_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -150136,8 +147042,7 @@ async def index_iava_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150155,7 +147060,7 @@ async def index_iava_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: """Return vulnerability data stored in index \"iava\" @@ -150195,10 +147100,8 @@ async def index_iava_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150251,8 +147154,7 @@ async def index_iava_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150301,8 +147203,7 @@ async def index_iava_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150320,7 +147221,7 @@ async def index_iava_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: """Return vulnerability data stored in index \"iava\" @@ -150360,10 +147261,8 @@ async def index_iava_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150416,8 +147315,7 @@ async def index_iava_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150466,8 +147364,7 @@ async def index_iava_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150485,7 +147382,7 @@ async def index_iava_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"iava\" @@ -150525,10 +147422,8 @@ async def index_iava_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150581,8 +147476,7 @@ async def index_iava_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150626,8 +147520,7 @@ def _index_iava_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150640,7 +147533,10 @@ def _index_iava_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -150724,13 +147620,9 @@ def _index_iava_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -150813,8 +147705,7 @@ async def index_ibm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150832,7 +147723,7 @@ async def index_ibm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: """Return vulnerability data stored in index \"ibm\" @@ -150872,10 +147763,8 @@ async def index_ibm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150928,8 +147817,7 @@ async def index_ibm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150978,8 +147866,7 @@ async def index_ibm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150997,7 +147884,7 @@ async def index_ibm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: """Return vulnerability data stored in index \"ibm\" @@ -151037,10 +147924,8 @@ async def index_ibm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151093,8 +147978,7 @@ async def index_ibm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151143,8 +148027,7 @@ async def index_ibm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151162,7 +148045,7 @@ async def index_ibm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ibm\" @@ -151202,10 +148085,8 @@ async def index_ibm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151258,8 +148139,7 @@ async def index_ibm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151303,8 +148183,7 @@ def _index_ibm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151317,7 +148196,10 @@ def _index_ibm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -151401,13 +148283,9 @@ def _index_ibm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -151490,8 +148368,7 @@ async def index_idemia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151509,7 +148386,7 @@ async def index_idemia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: """Return vulnerability data stored in index \"idemia\" @@ -151549,10 +148426,8 @@ async def index_idemia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151605,8 +148480,7 @@ async def index_idemia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151655,8 +148529,7 @@ async def index_idemia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151674,7 +148547,7 @@ async def index_idemia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: """Return vulnerability data stored in index \"idemia\" @@ -151714,10 +148587,8 @@ async def index_idemia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151770,8 +148641,7 @@ async def index_idemia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151820,8 +148690,7 @@ async def index_idemia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151839,7 +148708,7 @@ async def index_idemia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"idemia\" @@ -151879,10 +148748,8 @@ async def index_idemia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151935,8 +148802,7 @@ async def index_idemia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151980,8 +148846,7 @@ def _index_idemia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151994,7 +148859,10 @@ def _index_idemia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -152078,13 +148946,9 @@ def _index_idemia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -152167,8 +149031,7 @@ async def index_igel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152186,7 +149049,7 @@ async def index_igel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: """Return vulnerability data stored in index \"igel\" @@ -152226,10 +149089,8 @@ async def index_igel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152282,8 +149143,7 @@ async def index_igel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152332,8 +149192,7 @@ async def index_igel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152351,7 +149210,7 @@ async def index_igel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: """Return vulnerability data stored in index \"igel\" @@ -152391,10 +149250,8 @@ async def index_igel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152447,8 +149304,7 @@ async def index_igel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152497,8 +149353,7 @@ async def index_igel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152516,7 +149371,7 @@ async def index_igel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"igel\" @@ -152556,10 +149411,8 @@ async def index_igel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152612,8 +149465,7 @@ async def index_igel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152657,8 +149509,7 @@ def _index_igel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152671,7 +149522,10 @@ def _index_igel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -152755,13 +149609,9 @@ def _index_igel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -152844,8 +149694,7 @@ async def index_il_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152863,7 +149712,7 @@ async def index_il_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: """Return vulnerability data stored in index \"il-alerts\" @@ -152903,10 +149752,8 @@ async def index_il_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152959,8 +149806,7 @@ async def index_il_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153009,8 +149855,7 @@ async def index_il_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153028,7 +149873,7 @@ async def index_il_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: """Return vulnerability data stored in index \"il-alerts\" @@ -153068,10 +149913,8 @@ async def index_il_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153124,8 +149967,7 @@ async def index_il_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153174,8 +150016,7 @@ async def index_il_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153193,7 +150034,7 @@ async def index_il_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"il-alerts\" @@ -153233,10 +150074,8 @@ async def index_il_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153289,8 +150128,7 @@ async def index_il_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153334,8 +150172,7 @@ def _index_il_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -153348,7 +150185,10 @@ def _index_il_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -153432,13 +150272,9 @@ def _index_il_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -153521,8 +150357,7 @@ async def index_il_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153540,7 +150375,7 @@ async def index_il_vulnerabilities_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153580,10 +150415,8 @@ async def index_il_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153636,8 +150469,7 @@ async def index_il_vulnerabilities_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153686,8 +150518,7 @@ async def index_il_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153705,7 +150536,7 @@ async def index_il_vulnerabilities_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153745,10 +150576,8 @@ async def index_il_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153801,8 +150630,7 @@ async def index_il_vulnerabilities_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153851,8 +150679,7 @@ async def index_il_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153870,7 +150697,7 @@ async def index_il_vulnerabilities_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153910,10 +150737,8 @@ async def index_il_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153966,8 +150791,7 @@ async def index_il_vulnerabilities_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154011,8 +150835,7 @@ def _index_il_vulnerabilities_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154025,7 +150848,10 @@ def _index_il_vulnerabilities_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -154109,13 +150935,9 @@ def _index_il_vulnerabilities_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -154198,8 +151020,7 @@ async def index_incibe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154217,7 +151038,7 @@ async def index_incibe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: """Return vulnerability data stored in index \"incibe\" @@ -154257,10 +151078,8 @@ async def index_incibe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154313,8 +151132,7 @@ async def index_incibe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154363,8 +151181,7 @@ async def index_incibe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154382,7 +151199,7 @@ async def index_incibe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"incibe\" @@ -154422,10 +151239,8 @@ async def index_incibe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154478,8 +151293,7 @@ async def index_incibe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154528,8 +151342,7 @@ async def index_incibe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154547,7 +151360,7 @@ async def index_incibe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"incibe\" @@ -154587,10 +151400,8 @@ async def index_incibe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154643,8 +151454,7 @@ async def index_incibe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154688,8 +151498,7 @@ def _index_incibe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154702,7 +151511,10 @@ def _index_incibe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -154786,13 +151598,9 @@ def _index_incibe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -154875,8 +151683,7 @@ async def index_initial_access_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154894,7 +151701,7 @@ async def index_initial_access_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: """Return vulnerability data stored in index \"initial-access\" @@ -154934,10 +151741,8 @@ async def index_initial_access_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154990,8 +151795,7 @@ async def index_initial_access_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155040,8 +151844,7 @@ async def index_initial_access_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155059,7 +151862,7 @@ async def index_initial_access_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: """Return vulnerability data stored in index \"initial-access\" @@ -155099,10 +151902,8 @@ async def index_initial_access_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155155,8 +151956,7 @@ async def index_initial_access_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155205,8 +152005,7 @@ async def index_initial_access_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155224,7 +152023,7 @@ async def index_initial_access_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"initial-access\" @@ -155264,10 +152063,8 @@ async def index_initial_access_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155320,8 +152117,7 @@ async def index_initial_access_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155365,8 +152161,7 @@ def _index_initial_access_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -155379,7 +152174,10 @@ def _index_initial_access_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -155463,13 +152261,9 @@ def _index_initial_access_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -155552,8 +152346,7 @@ async def index_initial_access_git_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155571,7 +152364,7 @@ async def index_initial_access_git_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: """Return vulnerability data stored in index \"initial-access-git\" @@ -155611,10 +152404,8 @@ async def index_initial_access_git_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155667,8 +152458,7 @@ async def index_initial_access_git_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155717,8 +152507,7 @@ async def index_initial_access_git_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155736,7 +152525,7 @@ async def index_initial_access_git_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: """Return vulnerability data stored in index \"initial-access-git\" @@ -155776,10 +152565,8 @@ async def index_initial_access_git_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155832,8 +152619,7 @@ async def index_initial_access_git_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155882,8 +152668,7 @@ async def index_initial_access_git_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155901,7 +152686,7 @@ async def index_initial_access_git_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"initial-access-git\" @@ -155941,10 +152726,8 @@ async def index_initial_access_git_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155997,8 +152780,7 @@ async def index_initial_access_git_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156042,8 +152824,7 @@ def _index_initial_access_git_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156056,7 +152837,10 @@ def _index_initial_access_git_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -156140,13 +152924,9 @@ def _index_initial_access_git_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -156229,8 +153009,7 @@ async def index_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156248,7 +153027,7 @@ async def index_intel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: """Return vulnerability data stored in index \"intel\" @@ -156288,10 +153067,8 @@ async def index_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156344,8 +153121,7 @@ async def index_intel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156394,8 +153170,7 @@ async def index_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156413,7 +153188,7 @@ async def index_intel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: """Return vulnerability data stored in index \"intel\" @@ -156453,10 +153228,8 @@ async def index_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156509,8 +153282,7 @@ async def index_intel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156559,8 +153331,7 @@ async def index_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156578,7 +153349,7 @@ async def index_intel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"intel\" @@ -156618,10 +153389,8 @@ async def index_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156674,8 +153443,7 @@ async def index_intel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156719,8 +153487,7 @@ def _index_intel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156733,7 +153500,10 @@ def _index_intel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -156817,13 +153587,9 @@ def _index_intel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -156911,8 +153677,7 @@ async def index_ipintel10d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156930,7 +153695,7 @@ async def index_ipintel10d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-10d\" @@ -156980,10 +153745,8 @@ async def index_ipintel10d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157041,8 +153804,7 @@ async def index_ipintel10d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157096,8 +153858,7 @@ async def index_ipintel10d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157115,7 +153876,7 @@ async def index_ipintel10d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-10d\" @@ -157165,10 +153926,8 @@ async def index_ipintel10d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157226,8 +153985,7 @@ async def index_ipintel10d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157281,8 +154039,7 @@ async def index_ipintel10d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157300,7 +154057,7 @@ async def index_ipintel10d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-10d\" @@ -157350,10 +154107,8 @@ async def index_ipintel10d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157411,8 +154166,7 @@ async def index_ipintel10d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157461,8 +154215,7 @@ def _index_ipintel10d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -157475,7 +154228,10 @@ def _index_ipintel10d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -157579,13 +154335,9 @@ def _index_ipintel10d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -157673,8 +154425,7 @@ async def index_ipintel30d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157692,7 +154443,7 @@ async def index_ipintel30d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-30d\" @@ -157742,10 +154493,8 @@ async def index_ipintel30d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157803,8 +154552,7 @@ async def index_ipintel30d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157858,8 +154606,7 @@ async def index_ipintel30d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157877,7 +154624,7 @@ async def index_ipintel30d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-30d\" @@ -157927,10 +154674,8 @@ async def index_ipintel30d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157988,8 +154733,7 @@ async def index_ipintel30d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158043,8 +154787,7 @@ async def index_ipintel30d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158062,7 +154805,7 @@ async def index_ipintel30d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-30d\" @@ -158112,10 +154855,8 @@ async def index_ipintel30d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158173,8 +154914,7 @@ async def index_ipintel30d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158223,8 +154963,7 @@ def _index_ipintel30d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158237,7 +154976,10 @@ def _index_ipintel30d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -158341,13 +155083,9 @@ def _index_ipintel30d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -158435,8 +155173,7 @@ async def index_ipintel3d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158454,7 +155191,7 @@ async def index_ipintel3d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158504,10 +155241,8 @@ async def index_ipintel3d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158565,8 +155300,7 @@ async def index_ipintel3d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158620,8 +155354,7 @@ async def index_ipintel3d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158639,7 +155372,7 @@ async def index_ipintel3d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158689,10 +155422,8 @@ async def index_ipintel3d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158750,8 +155481,7 @@ async def index_ipintel3d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158805,8 +155535,7 @@ async def index_ipintel3d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158824,7 +155553,7 @@ async def index_ipintel3d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158874,10 +155603,8 @@ async def index_ipintel3d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158935,8 +155662,7 @@ async def index_ipintel3d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158985,8 +155711,7 @@ def _index_ipintel3d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158999,7 +155724,10 @@ def _index_ipintel3d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -159103,13 +155831,9 @@ def _index_ipintel3d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -159197,8 +155921,7 @@ async def index_ipintel90d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159216,7 +155939,7 @@ async def index_ipintel90d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159266,10 +155989,8 @@ async def index_ipintel90d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159327,8 +156048,7 @@ async def index_ipintel90d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159382,8 +156102,7 @@ async def index_ipintel90d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159401,7 +156120,7 @@ async def index_ipintel90d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159451,10 +156170,8 @@ async def index_ipintel90d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159512,8 +156229,7 @@ async def index_ipintel90d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159567,8 +156283,7 @@ async def index_ipintel90d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159586,7 +156301,7 @@ async def index_ipintel90d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159636,10 +156351,8 @@ async def index_ipintel90d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159697,8 +156410,7 @@ async def index_ipintel90d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159747,8 +156459,7 @@ def _index_ipintel90d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159761,7 +156472,10 @@ def _index_ipintel90d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -159865,13 +156579,9 @@ def _index_ipintel90d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -159954,8 +156664,7 @@ async def index_istio_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159973,7 +156682,7 @@ async def index_istio_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: """Return vulnerability data stored in index \"istio\" @@ -160013,10 +156722,8 @@ async def index_istio_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160069,8 +156776,7 @@ async def index_istio_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160119,8 +156825,7 @@ async def index_istio_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160138,7 +156843,7 @@ async def index_istio_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: """Return vulnerability data stored in index \"istio\" @@ -160178,10 +156883,8 @@ async def index_istio_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160234,8 +156937,7 @@ async def index_istio_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160284,8 +156986,7 @@ async def index_istio_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160303,7 +157004,7 @@ async def index_istio_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"istio\" @@ -160343,10 +157044,8 @@ async def index_istio_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160399,8 +157098,7 @@ async def index_istio_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160444,8 +157142,7 @@ def _index_istio_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -160458,7 +157155,10 @@ def _index_istio_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -160542,13 +157242,9 @@ def _index_istio_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -160631,8 +157327,7 @@ async def index_ivanti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160650,7 +157345,7 @@ async def index_ivanti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: """Return vulnerability data stored in index \"ivanti\" @@ -160690,10 +157385,8 @@ async def index_ivanti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160746,8 +157439,7 @@ async def index_ivanti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160796,8 +157488,7 @@ async def index_ivanti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160815,7 +157506,7 @@ async def index_ivanti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: """Return vulnerability data stored in index \"ivanti\" @@ -160855,10 +157546,8 @@ async def index_ivanti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160911,8 +157600,7 @@ async def index_ivanti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160961,8 +157649,7 @@ async def index_ivanti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160980,7 +157667,7 @@ async def index_ivanti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ivanti\" @@ -161020,10 +157707,8 @@ async def index_ivanti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161076,8 +157761,7 @@ async def index_ivanti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161121,8 +157805,7 @@ def _index_ivanti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161135,7 +157818,10 @@ def _index_ivanti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -161219,13 +157905,9 @@ def _index_ivanti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -161308,8 +157990,7 @@ async def index_ivanti_rss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161327,7 +158008,7 @@ async def index_ivanti_rss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161367,10 +158048,8 @@ async def index_ivanti_rss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161423,8 +158102,7 @@ async def index_ivanti_rss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161473,8 +158151,7 @@ async def index_ivanti_rss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161492,7 +158169,7 @@ async def index_ivanti_rss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161532,10 +158209,8 @@ async def index_ivanti_rss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161588,8 +158263,7 @@ async def index_ivanti_rss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161638,8 +158312,7 @@ async def index_ivanti_rss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161657,7 +158330,7 @@ async def index_ivanti_rss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161697,10 +158370,8 @@ async def index_ivanti_rss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161753,8 +158424,7 @@ async def index_ivanti_rss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161798,8 +158468,7 @@ def _index_ivanti_rss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161812,7 +158481,10 @@ def _index_ivanti_rss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -161896,13 +158568,9 @@ def _index_ivanti_rss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -161985,8 +158653,7 @@ async def index_jenkins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162004,7 +158671,7 @@ async def index_jenkins_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: """Return vulnerability data stored in index \"jenkins\" @@ -162044,10 +158711,8 @@ async def index_jenkins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162100,8 +158765,7 @@ async def index_jenkins_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162150,8 +158814,7 @@ async def index_jenkins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162169,7 +158832,7 @@ async def index_jenkins_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: """Return vulnerability data stored in index \"jenkins\" @@ -162209,10 +158872,8 @@ async def index_jenkins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162265,8 +158926,7 @@ async def index_jenkins_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162315,8 +158975,7 @@ async def index_jenkins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162334,7 +158993,7 @@ async def index_jenkins_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jenkins\" @@ -162374,10 +159033,8 @@ async def index_jenkins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162430,8 +159087,7 @@ async def index_jenkins_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162475,8 +159131,7 @@ def _index_jenkins_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -162489,7 +159144,10 @@ def _index_jenkins_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -162573,13 +159231,9 @@ def _index_jenkins_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -162662,8 +159316,7 @@ async def index_jetbrains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162681,7 +159334,7 @@ async def index_jetbrains_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: """Return vulnerability data stored in index \"jetbrains\" @@ -162721,10 +159374,8 @@ async def index_jetbrains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162777,8 +159428,7 @@ async def index_jetbrains_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162827,8 +159477,7 @@ async def index_jetbrains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162846,7 +159495,7 @@ async def index_jetbrains_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: """Return vulnerability data stored in index \"jetbrains\" @@ -162886,10 +159535,8 @@ async def index_jetbrains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162942,8 +159589,7 @@ async def index_jetbrains_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162992,8 +159638,7 @@ async def index_jetbrains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163011,7 +159656,7 @@ async def index_jetbrains_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jetbrains\" @@ -163051,10 +159696,8 @@ async def index_jetbrains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163107,8 +159750,7 @@ async def index_jetbrains_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163152,8 +159794,7 @@ def _index_jetbrains_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163166,7 +159807,10 @@ def _index_jetbrains_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -163250,13 +159894,9 @@ def _index_jetbrains_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -163339,8 +159979,7 @@ async def index_jfrog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163358,7 +159997,7 @@ async def index_jfrog_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: """Return vulnerability data stored in index \"jfrog\" @@ -163398,10 +160037,8 @@ async def index_jfrog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163454,8 +160091,7 @@ async def index_jfrog_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163504,8 +160140,7 @@ async def index_jfrog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163523,7 +160158,7 @@ async def index_jfrog_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: """Return vulnerability data stored in index \"jfrog\" @@ -163563,10 +160198,8 @@ async def index_jfrog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163619,8 +160252,7 @@ async def index_jfrog_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163669,8 +160301,7 @@ async def index_jfrog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163688,7 +160319,7 @@ async def index_jfrog_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jfrog\" @@ -163728,10 +160359,8 @@ async def index_jfrog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163784,8 +160413,7 @@ async def index_jfrog_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163829,8 +160457,7 @@ def _index_jfrog_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163843,7 +160470,10 @@ def _index_jfrog_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -163927,13 +160557,9 @@ def _index_jfrog_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -164016,8 +160642,7 @@ async def index_jnj_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164035,7 +160660,7 @@ async def index_jnj_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: """Return vulnerability data stored in index \"jnj\" @@ -164075,10 +160700,8 @@ async def index_jnj_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164131,8 +160754,7 @@ async def index_jnj_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164181,8 +160803,7 @@ async def index_jnj_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164200,7 +160821,7 @@ async def index_jnj_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"jnj\" @@ -164240,10 +160861,8 @@ async def index_jnj_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164296,8 +160915,7 @@ async def index_jnj_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164346,8 +160964,7 @@ async def index_jnj_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164365,7 +160982,7 @@ async def index_jnj_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jnj\" @@ -164405,10 +161022,8 @@ async def index_jnj_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164461,8 +161076,7 @@ async def index_jnj_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164506,8 +161120,7 @@ def _index_jnj_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -164520,7 +161133,10 @@ def _index_jnj_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -164604,13 +161220,9 @@ def _index_jnj_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -164693,8 +161305,7 @@ async def index_johnson_controls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164712,7 +161323,7 @@ async def index_johnson_controls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: """Return vulnerability data stored in index \"johnson-controls\" @@ -164752,10 +161363,8 @@ async def index_johnson_controls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164808,8 +161417,7 @@ async def index_johnson_controls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164858,8 +161466,7 @@ async def index_johnson_controls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164877,7 +161484,7 @@ async def index_johnson_controls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: """Return vulnerability data stored in index \"johnson-controls\" @@ -164917,10 +161524,8 @@ async def index_johnson_controls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164973,8 +161578,7 @@ async def index_johnson_controls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165023,8 +161627,7 @@ async def index_johnson_controls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165042,7 +161645,7 @@ async def index_johnson_controls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"johnson-controls\" @@ -165082,10 +161685,8 @@ async def index_johnson_controls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165138,8 +161739,7 @@ async def index_johnson_controls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165183,8 +161783,7 @@ def _index_johnson_controls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165197,7 +161796,10 @@ def _index_johnson_controls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -165281,13 +161883,9 @@ def _index_johnson_controls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -165370,8 +161968,7 @@ async def index_juniper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165389,7 +161986,7 @@ async def index_juniper_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: """Return vulnerability data stored in index \"juniper\" @@ -165429,10 +162026,8 @@ async def index_juniper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165485,8 +162080,7 @@ async def index_juniper_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165535,8 +162129,7 @@ async def index_juniper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165554,7 +162147,7 @@ async def index_juniper_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: """Return vulnerability data stored in index \"juniper\" @@ -165594,10 +162187,8 @@ async def index_juniper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165650,8 +162241,7 @@ async def index_juniper_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165700,8 +162290,7 @@ async def index_juniper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165719,7 +162308,7 @@ async def index_juniper_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"juniper\" @@ -165759,10 +162348,8 @@ async def index_juniper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165815,8 +162402,7 @@ async def index_juniper_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165860,8 +162446,7 @@ def _index_juniper_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165874,7 +162459,10 @@ def _index_juniper_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -165958,13 +162546,9 @@ def _index_juniper_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -166047,8 +162631,7 @@ async def index_jvn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166066,7 +162649,7 @@ async def index_jvn_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: """Return vulnerability data stored in index \"jvn\" @@ -166106,10 +162689,8 @@ async def index_jvn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166162,8 +162743,7 @@ async def index_jvn_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166212,8 +162792,7 @@ async def index_jvn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166231,7 +162810,7 @@ async def index_jvn_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: """Return vulnerability data stored in index \"jvn\" @@ -166271,10 +162850,8 @@ async def index_jvn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166327,8 +162904,7 @@ async def index_jvn_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166377,8 +162953,7 @@ async def index_jvn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166396,7 +162971,7 @@ async def index_jvn_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jvn\" @@ -166436,10 +163011,8 @@ async def index_jvn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166492,8 +163065,7 @@ async def index_jvn_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166537,8 +163109,7 @@ def _index_jvn_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -166551,7 +163122,10 @@ def _index_jvn_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -166635,13 +163209,9 @@ def _index_jvn_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -166724,8 +163294,7 @@ async def index_jvndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166743,7 +163312,7 @@ async def index_jvndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: """Return vulnerability data stored in index \"jvndb\" @@ -166783,10 +163352,8 @@ async def index_jvndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166839,8 +163406,7 @@ async def index_jvndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166889,8 +163455,7 @@ async def index_jvndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166908,7 +163473,7 @@ async def index_jvndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: """Return vulnerability data stored in index \"jvndb\" @@ -166948,10 +163513,8 @@ async def index_jvndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167004,8 +163567,7 @@ async def index_jvndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167054,8 +163616,7 @@ async def index_jvndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167073,7 +163634,7 @@ async def index_jvndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jvndb\" @@ -167113,10 +163674,8 @@ async def index_jvndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167169,8 +163728,7 @@ async def index_jvndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167214,8 +163772,7 @@ def _index_jvndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167228,7 +163785,10 @@ def _index_jvndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -167312,13 +163872,9 @@ def _index_jvndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -167401,8 +163957,7 @@ async def index_kaspersky_ics_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167420,7 +163975,7 @@ async def index_kaspersky_ics_cert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167460,10 +164015,8 @@ async def index_kaspersky_ics_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167516,8 +164069,7 @@ async def index_kaspersky_ics_cert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167566,8 +164118,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167585,7 +164136,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167625,10 +164176,8 @@ async def index_kaspersky_ics_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167681,8 +164230,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167731,8 +164279,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167750,7 +164297,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167790,10 +164337,8 @@ async def index_kaspersky_ics_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167846,8 +164391,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167891,8 +164435,7 @@ def _index_kaspersky_ics_cert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167905,7 +164448,10 @@ def _index_kaspersky_ics_cert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -167989,13 +164535,9 @@ def _index_kaspersky_ics_cert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -168078,8 +164620,7 @@ async def index_korelogic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168097,7 +164638,7 @@ async def index_korelogic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: """Return vulnerability data stored in index \"korelogic\" @@ -168137,10 +164678,8 @@ async def index_korelogic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168193,8 +164732,7 @@ async def index_korelogic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168243,8 +164781,7 @@ async def index_korelogic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168262,7 +164799,7 @@ async def index_korelogic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: """Return vulnerability data stored in index \"korelogic\" @@ -168302,10 +164839,8 @@ async def index_korelogic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168358,8 +164893,7 @@ async def index_korelogic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168408,8 +164942,7 @@ async def index_korelogic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168427,7 +164960,7 @@ async def index_korelogic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"korelogic\" @@ -168467,10 +165000,8 @@ async def index_korelogic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168523,8 +165054,7 @@ async def index_korelogic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168568,8 +165098,7 @@ def _index_korelogic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -168582,7 +165111,10 @@ def _index_korelogic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -168666,13 +165198,9 @@ def _index_korelogic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -168755,8 +165283,7 @@ async def index_krcert_security_notices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168774,7 +165301,7 @@ async def index_krcert_security_notices_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -168814,10 +165341,8 @@ async def index_krcert_security_notices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168870,8 +165395,7 @@ async def index_krcert_security_notices_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168920,8 +165444,7 @@ async def index_krcert_security_notices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168939,7 +165462,7 @@ async def index_krcert_security_notices_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -168979,10 +165502,8 @@ async def index_krcert_security_notices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169035,8 +165556,7 @@ async def index_krcert_security_notices_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169085,8 +165605,7 @@ async def index_krcert_security_notices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169104,7 +165623,7 @@ async def index_krcert_security_notices_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -169144,10 +165663,8 @@ async def index_krcert_security_notices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169200,8 +165717,7 @@ async def index_krcert_security_notices_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169245,8 +165761,7 @@ def _index_krcert_security_notices_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169259,7 +165774,10 @@ def _index_krcert_security_notices_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -169343,13 +165861,9 @@ def _index_krcert_security_notices_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -169432,8 +165946,7 @@ async def index_krcert_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169451,7 +165964,7 @@ async def index_krcert_vulnerabilities_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169491,10 +166004,8 @@ async def index_krcert_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169547,8 +166058,7 @@ async def index_krcert_vulnerabilities_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169597,8 +166107,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169616,7 +166125,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169656,10 +166165,8 @@ async def index_krcert_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169712,8 +166219,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169762,8 +166268,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169781,7 +166286,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169821,10 +166326,8 @@ async def index_krcert_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169877,8 +166380,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169922,8 +166424,7 @@ def _index_krcert_vulnerabilities_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169936,7 +166437,10 @@ def _index_krcert_vulnerabilities_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -170020,13 +166524,9 @@ def _index_krcert_vulnerabilities_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -170109,8 +166609,7 @@ async def index_kubernetes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170128,7 +166627,7 @@ async def index_kubernetes_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: """Return vulnerability data stored in index \"kubernetes\" @@ -170168,10 +166667,8 @@ async def index_kubernetes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170224,8 +166721,7 @@ async def index_kubernetes_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170274,8 +166770,7 @@ async def index_kubernetes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170293,7 +166788,7 @@ async def index_kubernetes_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: """Return vulnerability data stored in index \"kubernetes\" @@ -170333,10 +166828,8 @@ async def index_kubernetes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170389,8 +166882,7 @@ async def index_kubernetes_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170439,8 +166931,7 @@ async def index_kubernetes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170458,7 +166949,7 @@ async def index_kubernetes_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kubernetes\" @@ -170498,10 +166989,8 @@ async def index_kubernetes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170554,8 +167043,7 @@ async def index_kubernetes_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170599,8 +167087,7 @@ def _index_kubernetes_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170613,7 +167100,10 @@ def _index_kubernetes_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -170697,13 +167187,9 @@ def _index_kubernetes_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -170786,8 +167272,7 @@ async def index_kunbus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170805,7 +167290,7 @@ async def index_kunbus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: """Return vulnerability data stored in index \"kunbus\" @@ -170845,10 +167330,8 @@ async def index_kunbus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170901,8 +167384,7 @@ async def index_kunbus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170951,8 +167433,7 @@ async def index_kunbus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170970,7 +167451,7 @@ async def index_kunbus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: """Return vulnerability data stored in index \"kunbus\" @@ -171010,10 +167491,8 @@ async def index_kunbus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171066,8 +167545,7 @@ async def index_kunbus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171116,8 +167594,7 @@ async def index_kunbus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171135,7 +167612,7 @@ async def index_kunbus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kunbus\" @@ -171175,10 +167652,8 @@ async def index_kunbus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171231,8 +167706,7 @@ async def index_kunbus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171276,8 +167750,7 @@ def _index_kunbus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171290,7 +167763,10 @@ def _index_kunbus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -171374,13 +167850,9 @@ def _index_kunbus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -171463,8 +167935,7 @@ async def index_lantronix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171482,7 +167953,7 @@ async def index_lantronix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: """Return vulnerability data stored in index \"lantronix\" @@ -171522,10 +167993,8 @@ async def index_lantronix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171578,8 +168047,7 @@ async def index_lantronix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171628,8 +168096,7 @@ async def index_lantronix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171647,7 +168114,7 @@ async def index_lantronix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: """Return vulnerability data stored in index \"lantronix\" @@ -171687,10 +168154,8 @@ async def index_lantronix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171743,8 +168208,7 @@ async def index_lantronix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171793,8 +168257,7 @@ async def index_lantronix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171812,7 +168275,7 @@ async def index_lantronix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lantronix\" @@ -171852,10 +168315,8 @@ async def index_lantronix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171908,8 +168369,7 @@ async def index_lantronix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171953,8 +168413,7 @@ def _index_lantronix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171967,7 +168426,10 @@ def _index_lantronix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -172051,13 +168513,9 @@ def _index_lantronix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -172140,8 +168598,7 @@ async def index_lenovo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172159,7 +168616,7 @@ async def index_lenovo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: """Return vulnerability data stored in index \"lenovo\" @@ -172199,10 +168656,8 @@ async def index_lenovo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172255,8 +168710,7 @@ async def index_lenovo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172305,8 +168759,7 @@ async def index_lenovo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172324,7 +168777,7 @@ async def index_lenovo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: """Return vulnerability data stored in index \"lenovo\" @@ -172364,10 +168817,8 @@ async def index_lenovo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172420,8 +168871,7 @@ async def index_lenovo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172470,8 +168920,7 @@ async def index_lenovo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172489,7 +168938,7 @@ async def index_lenovo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lenovo\" @@ -172529,10 +168978,8 @@ async def index_lenovo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172585,8 +169032,7 @@ async def index_lenovo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172630,8 +169076,7 @@ def _index_lenovo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172644,7 +169089,10 @@ def _index_lenovo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -172728,13 +169176,9 @@ def _index_lenovo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -172817,8 +169261,7 @@ async def index_lexmark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172836,7 +169279,7 @@ async def index_lexmark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: """Return vulnerability data stored in index \"lexmark\" @@ -172876,10 +169319,8 @@ async def index_lexmark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172932,8 +169373,7 @@ async def index_lexmark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172982,8 +169422,7 @@ async def index_lexmark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173001,7 +169440,7 @@ async def index_lexmark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"lexmark\" @@ -173041,10 +169480,8 @@ async def index_lexmark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173097,8 +169534,7 @@ async def index_lexmark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173147,8 +169583,7 @@ async def index_lexmark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173166,7 +169601,7 @@ async def index_lexmark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lexmark\" @@ -173206,10 +169641,8 @@ async def index_lexmark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173262,8 +169695,7 @@ async def index_lexmark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173307,8 +169739,7 @@ def _index_lexmark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173321,7 +169752,10 @@ def _index_lexmark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -173405,13 +169839,9 @@ def _index_lexmark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -173494,8 +169924,7 @@ async def index_lg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173513,7 +169942,7 @@ async def index_lg_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: """Return vulnerability data stored in index \"lg\" @@ -173553,10 +169982,8 @@ async def index_lg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173609,8 +170036,7 @@ async def index_lg_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173659,8 +170085,7 @@ async def index_lg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173678,7 +170103,7 @@ async def index_lg_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: """Return vulnerability data stored in index \"lg\" @@ -173718,10 +170143,8 @@ async def index_lg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173774,8 +170197,7 @@ async def index_lg_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173824,8 +170246,7 @@ async def index_lg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173843,7 +170264,7 @@ async def index_lg_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lg\" @@ -173883,10 +170304,8 @@ async def index_lg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173939,8 +170358,7 @@ async def index_lg_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173984,8 +170402,7 @@ def _index_lg_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173998,7 +170415,10 @@ def _index_lg_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -174082,13 +170502,9 @@ def _index_lg_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -174171,8 +170587,7 @@ async def index_libre_office_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174190,7 +170605,7 @@ async def index_libre_office_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: """Return vulnerability data stored in index \"libre-office\" @@ -174230,10 +170645,8 @@ async def index_libre_office_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174286,8 +170699,7 @@ async def index_libre_office_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174336,8 +170748,7 @@ async def index_libre_office_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174355,7 +170766,7 @@ async def index_libre_office_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: """Return vulnerability data stored in index \"libre-office\" @@ -174395,10 +170806,8 @@ async def index_libre_office_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174451,8 +170860,7 @@ async def index_libre_office_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174501,8 +170909,7 @@ async def index_libre_office_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174520,7 +170927,7 @@ async def index_libre_office_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"libre-office\" @@ -174560,10 +170967,8 @@ async def index_libre_office_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174616,8 +171021,7 @@ async def index_libre_office_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174661,8 +171065,7 @@ def _index_libre_office_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174675,7 +171078,10 @@ def _index_libre_office_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -174759,13 +171165,9 @@ def _index_libre_office_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -174848,8 +171250,7 @@ async def index_linux_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174867,7 +171268,7 @@ async def index_linux_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: """Return vulnerability data stored in index \"linux\" @@ -174907,10 +171308,8 @@ async def index_linux_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174963,8 +171362,7 @@ async def index_linux_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175013,8 +171411,7 @@ async def index_linux_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175032,7 +171429,7 @@ async def index_linux_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: """Return vulnerability data stored in index \"linux\" @@ -175072,10 +171469,8 @@ async def index_linux_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175128,8 +171523,7 @@ async def index_linux_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175178,8 +171572,7 @@ async def index_linux_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175197,7 +171590,7 @@ async def index_linux_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"linux\" @@ -175237,10 +171630,8 @@ async def index_linux_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175293,8 +171684,7 @@ async def index_linux_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175338,8 +171728,7 @@ def _index_linux_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -175352,7 +171741,10 @@ def _index_linux_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -175436,13 +171828,9 @@ def _index_linux_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -175525,8 +171913,7 @@ async def index_lol_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175544,7 +171931,7 @@ async def index_lol_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: """Return vulnerability data stored in index \"lol-advs\" @@ -175584,10 +171971,8 @@ async def index_lol_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175640,8 +172025,7 @@ async def index_lol_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175690,8 +172074,7 @@ async def index_lol_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175709,7 +172092,7 @@ async def index_lol_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: """Return vulnerability data stored in index \"lol-advs\" @@ -175749,10 +172132,8 @@ async def index_lol_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175805,8 +172186,7 @@ async def index_lol_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175855,8 +172235,7 @@ async def index_lol_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175874,7 +172253,7 @@ async def index_lol_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lol-advs\" @@ -175914,10 +172293,8 @@ async def index_lol_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175970,8 +172347,7 @@ async def index_lol_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176015,8 +172391,7 @@ def _index_lol_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176029,7 +172404,10 @@ def _index_lol_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -176113,13 +172491,9 @@ def _index_lol_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -176202,8 +172576,7 @@ async def index_m_files_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176221,7 +172594,7 @@ async def index_m_files_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: """Return vulnerability data stored in index \"m-files\" @@ -176261,10 +172634,8 @@ async def index_m_files_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176317,8 +172688,7 @@ async def index_m_files_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176367,8 +172737,7 @@ async def index_m_files_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176386,7 +172755,7 @@ async def index_m_files_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: """Return vulnerability data stored in index \"m-files\" @@ -176426,10 +172795,8 @@ async def index_m_files_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176482,8 +172849,7 @@ async def index_m_files_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176532,8 +172898,7 @@ async def index_m_files_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176551,7 +172916,7 @@ async def index_m_files_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"m-files\" @@ -176591,10 +172956,8 @@ async def index_m_files_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176647,8 +173010,7 @@ async def index_m_files_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176692,8 +173054,7 @@ def _index_m_files_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176706,7 +173067,10 @@ def _index_m_files_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -176790,13 +173154,9 @@ def _index_m_files_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -176879,8 +173239,7 @@ async def index_macert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176898,7 +173257,7 @@ async def index_macert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: """Return vulnerability data stored in index \"macert\" @@ -176938,10 +173297,8 @@ async def index_macert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176994,8 +173351,7 @@ async def index_macert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177044,8 +173400,7 @@ async def index_macert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177063,7 +173418,7 @@ async def index_macert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: """Return vulnerability data stored in index \"macert\" @@ -177103,10 +173458,8 @@ async def index_macert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177159,8 +173512,7 @@ async def index_macert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177209,8 +173561,7 @@ async def index_macert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177228,7 +173579,7 @@ async def index_macert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"macert\" @@ -177268,10 +173619,8 @@ async def index_macert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177324,8 +173673,7 @@ async def index_macert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177369,8 +173717,7 @@ def _index_macert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -177383,7 +173730,10 @@ def _index_macert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -177467,13 +173817,9 @@ def _index_macert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -177556,8 +173902,7 @@ async def index_malicious_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177575,7 +173920,7 @@ async def index_malicious_packages_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: """Return vulnerability data stored in index \"malicious-packages\" @@ -177615,10 +173960,8 @@ async def index_malicious_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177671,8 +174014,7 @@ async def index_malicious_packages_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177721,8 +174063,7 @@ async def index_malicious_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177740,7 +174081,7 @@ async def index_malicious_packages_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: """Return vulnerability data stored in index \"malicious-packages\" @@ -177780,10 +174121,8 @@ async def index_malicious_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177836,8 +174175,7 @@ async def index_malicious_packages_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177886,8 +174224,7 @@ async def index_malicious_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177905,7 +174242,7 @@ async def index_malicious_packages_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"malicious-packages\" @@ -177945,10 +174282,8 @@ async def index_malicious_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178001,8 +174336,7 @@ async def index_malicious_packages_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178046,8 +174380,7 @@ def _index_malicious_packages_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178060,7 +174393,10 @@ def _index_malicious_packages_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -178144,13 +174480,9 @@ def _index_malicious_packages_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -178233,8 +174565,7 @@ async def index_manageengine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178252,7 +174583,7 @@ async def index_manageengine_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: """Return vulnerability data stored in index \"manageengine\" @@ -178292,10 +174623,8 @@ async def index_manageengine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178348,8 +174677,7 @@ async def index_manageengine_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178398,8 +174726,7 @@ async def index_manageengine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178417,7 +174744,7 @@ async def index_manageengine_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"manageengine\" @@ -178457,10 +174784,8 @@ async def index_manageengine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178513,8 +174838,7 @@ async def index_manageengine_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178563,8 +174887,7 @@ async def index_manageengine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178582,7 +174905,7 @@ async def index_manageengine_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"manageengine\" @@ -178622,10 +174945,8 @@ async def index_manageengine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178678,8 +174999,7 @@ async def index_manageengine_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178723,8 +175043,7 @@ def _index_manageengine_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178737,7 +175056,10 @@ def _index_manageengine_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -178821,13 +175143,9 @@ def _index_manageengine_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -178910,8 +175228,7 @@ async def index_maven_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178929,7 +175246,7 @@ async def index_maven_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"maven\" @@ -178969,10 +175286,8 @@ async def index_maven_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179025,8 +175340,7 @@ async def index_maven_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179075,8 +175389,7 @@ async def index_maven_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179094,7 +175407,7 @@ async def index_maven_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"maven\" @@ -179134,10 +175447,8 @@ async def index_maven_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179190,8 +175501,7 @@ async def index_maven_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179240,8 +175550,7 @@ async def index_maven_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179259,7 +175568,7 @@ async def index_maven_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"maven\" @@ -179299,10 +175608,8 @@ async def index_maven_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179355,8 +175662,7 @@ async def index_maven_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179400,8 +175706,7 @@ def _index_maven_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -179414,7 +175719,10 @@ def _index_maven_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -179498,13 +175806,9 @@ def _index_maven_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -179587,8 +175891,7 @@ async def index_mbed_tls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179606,7 +175909,7 @@ async def index_mbed_tls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: """Return vulnerability data stored in index \"mbed-tls\" @@ -179646,10 +175949,8 @@ async def index_mbed_tls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179702,8 +176003,7 @@ async def index_mbed_tls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179752,8 +176052,7 @@ async def index_mbed_tls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179771,7 +176070,7 @@ async def index_mbed_tls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: """Return vulnerability data stored in index \"mbed-tls\" @@ -179811,10 +176110,8 @@ async def index_mbed_tls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179867,8 +176164,7 @@ async def index_mbed_tls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179917,8 +176213,7 @@ async def index_mbed_tls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179936,7 +176231,7 @@ async def index_mbed_tls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mbed-tls\" @@ -179976,10 +176271,8 @@ async def index_mbed_tls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180032,8 +176325,7 @@ async def index_mbed_tls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180077,8 +176369,7 @@ def _index_mbed_tls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180091,7 +176382,10 @@ def _index_mbed_tls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -180175,13 +176469,9 @@ def _index_mbed_tls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -180264,8 +176554,7 @@ async def index_mcafee_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180283,7 +176572,7 @@ async def index_mcafee_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: """Return vulnerability data stored in index \"mcafee\" @@ -180323,10 +176612,8 @@ async def index_mcafee_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180379,8 +176666,7 @@ async def index_mcafee_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180429,8 +176715,7 @@ async def index_mcafee_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180448,7 +176733,7 @@ async def index_mcafee_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: """Return vulnerability data stored in index \"mcafee\" @@ -180488,10 +176773,8 @@ async def index_mcafee_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180544,8 +176827,7 @@ async def index_mcafee_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180594,8 +176876,7 @@ async def index_mcafee_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180613,7 +176894,7 @@ async def index_mcafee_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mcafee\" @@ -180653,10 +176934,8 @@ async def index_mcafee_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180709,8 +176988,7 @@ async def index_mcafee_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180754,8 +177032,7 @@ def _index_mcafee_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180768,7 +177045,10 @@ def _index_mcafee_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -180852,13 +177132,9 @@ def _index_mcafee_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -180941,8 +177217,7 @@ async def index_mediatek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180960,7 +177235,7 @@ async def index_mediatek_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: """Return vulnerability data stored in index \"mediatek\" @@ -181000,10 +177275,8 @@ async def index_mediatek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181056,8 +177329,7 @@ async def index_mediatek_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181106,8 +177378,7 @@ async def index_mediatek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181125,7 +177396,7 @@ async def index_mediatek_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: """Return vulnerability data stored in index \"mediatek\" @@ -181165,10 +177436,8 @@ async def index_mediatek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181221,8 +177490,7 @@ async def index_mediatek_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181271,8 +177539,7 @@ async def index_mediatek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181290,7 +177557,7 @@ async def index_mediatek_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mediatek\" @@ -181330,10 +177597,8 @@ async def index_mediatek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181386,8 +177651,7 @@ async def index_mediatek_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181431,8 +177695,7 @@ def _index_mediatek_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -181445,7 +177708,10 @@ def _index_mediatek_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -181529,13 +177795,9 @@ def _index_mediatek_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -181618,8 +177880,7 @@ async def index_medtronic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181637,7 +177898,7 @@ async def index_medtronic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: """Return vulnerability data stored in index \"medtronic\" @@ -181677,10 +177938,8 @@ async def index_medtronic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181733,8 +177992,7 @@ async def index_medtronic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181783,8 +178041,7 @@ async def index_medtronic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181802,7 +178059,7 @@ async def index_medtronic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"medtronic\" @@ -181842,10 +178099,8 @@ async def index_medtronic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181898,8 +178153,7 @@ async def index_medtronic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181948,8 +178202,7 @@ async def index_medtronic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181967,7 +178220,7 @@ async def index_medtronic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"medtronic\" @@ -182007,10 +178260,8 @@ async def index_medtronic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182063,8 +178314,7 @@ async def index_medtronic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182108,8 +178358,7 @@ def _index_medtronic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182122,7 +178371,10 @@ def _index_medtronic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -182206,13 +178458,9 @@ def _index_medtronic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -182295,8 +178543,7 @@ async def index_mendix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182314,7 +178561,7 @@ async def index_mendix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: """Return vulnerability data stored in index \"mendix\" @@ -182354,10 +178601,8 @@ async def index_mendix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182410,8 +178655,7 @@ async def index_mendix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182460,8 +178704,7 @@ async def index_mendix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182479,7 +178722,7 @@ async def index_mendix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: """Return vulnerability data stored in index \"mendix\" @@ -182519,10 +178762,8 @@ async def index_mendix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182575,8 +178816,7 @@ async def index_mendix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182625,8 +178865,7 @@ async def index_mendix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182644,7 +178883,7 @@ async def index_mendix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mendix\" @@ -182684,10 +178923,8 @@ async def index_mendix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182740,8 +178977,7 @@ async def index_mendix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182785,8 +179021,7 @@ def _index_mendix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182799,7 +179034,10 @@ def _index_mendix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -182883,13 +179121,9 @@ def _index_mendix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -182972,8 +179206,7 @@ async def index_meta_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182991,7 +179224,7 @@ async def index_meta_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: """Return vulnerability data stored in index \"meta-advisories\" @@ -183031,10 +179264,8 @@ async def index_meta_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183087,8 +179318,7 @@ async def index_meta_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183137,8 +179367,7 @@ async def index_meta_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183156,7 +179385,7 @@ async def index_meta_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: """Return vulnerability data stored in index \"meta-advisories\" @@ -183196,10 +179425,8 @@ async def index_meta_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183252,8 +179479,7 @@ async def index_meta_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183302,8 +179528,7 @@ async def index_meta_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183321,7 +179546,7 @@ async def index_meta_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"meta-advisories\" @@ -183361,10 +179586,8 @@ async def index_meta_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183417,8 +179640,7 @@ async def index_meta_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183462,8 +179684,7 @@ def _index_meta_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -183476,7 +179697,10 @@ def _index_meta_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -183560,13 +179784,9 @@ def _index_meta_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -183649,8 +179869,7 @@ async def index_metasploit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183668,7 +179887,7 @@ async def index_metasploit_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: """Return vulnerability data stored in index \"metasploit\" @@ -183708,10 +179927,8 @@ async def index_metasploit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183764,8 +179981,7 @@ async def index_metasploit_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183814,8 +180030,7 @@ async def index_metasploit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183833,7 +180048,7 @@ async def index_metasploit_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: """Return vulnerability data stored in index \"metasploit\" @@ -183873,10 +180088,8 @@ async def index_metasploit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183929,8 +180142,7 @@ async def index_metasploit_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183979,8 +180191,7 @@ async def index_metasploit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183998,7 +180209,7 @@ async def index_metasploit_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"metasploit\" @@ -184038,10 +180249,8 @@ async def index_metasploit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184094,8 +180303,7 @@ async def index_metasploit_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184139,8 +180347,7 @@ def _index_metasploit_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184153,7 +180360,10 @@ def _index_metasploit_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -184237,13 +180447,9 @@ def _index_metasploit_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -184326,8 +180532,7 @@ async def index_microsoft_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184345,7 +180550,7 @@ async def index_microsoft_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184385,10 +180590,8 @@ async def index_microsoft_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184441,8 +180644,7 @@ async def index_microsoft_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184491,8 +180693,7 @@ async def index_microsoft_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184510,7 +180711,7 @@ async def index_microsoft_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184550,10 +180751,8 @@ async def index_microsoft_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184606,8 +180805,7 @@ async def index_microsoft_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184656,8 +180854,7 @@ async def index_microsoft_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184675,7 +180872,7 @@ async def index_microsoft_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184715,10 +180912,8 @@ async def index_microsoft_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184771,8 +180966,7 @@ async def index_microsoft_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184816,8 +181010,7 @@ def _index_microsoft_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184830,7 +181023,10 @@ def _index_microsoft_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -184914,13 +181110,9 @@ def _index_microsoft_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -185003,8 +181195,7 @@ async def index_microsoft_cvrf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185022,7 +181213,7 @@ async def index_microsoft_cvrf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185062,10 +181253,8 @@ async def index_microsoft_cvrf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185118,8 +181307,7 @@ async def index_microsoft_cvrf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185168,8 +181356,7 @@ async def index_microsoft_cvrf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185187,7 +181374,7 @@ async def index_microsoft_cvrf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185227,10 +181414,8 @@ async def index_microsoft_cvrf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185283,8 +181468,7 @@ async def index_microsoft_cvrf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185333,8 +181517,7 @@ async def index_microsoft_cvrf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185352,7 +181535,7 @@ async def index_microsoft_cvrf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185392,10 +181575,8 @@ async def index_microsoft_cvrf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185448,8 +181629,7 @@ async def index_microsoft_cvrf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185493,8 +181673,7 @@ def _index_microsoft_cvrf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -185507,7 +181686,10 @@ def _index_microsoft_cvrf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -185591,13 +181773,9 @@ def _index_microsoft_cvrf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -185680,8 +181858,7 @@ async def index_microsoft_driver_block_list_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185699,7 +181876,7 @@ async def index_microsoft_driver_block_list_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -185739,10 +181916,8 @@ async def index_microsoft_driver_block_list_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185795,8 +181970,7 @@ async def index_microsoft_driver_block_list_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185845,8 +182019,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185864,7 +182037,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -185904,10 +182077,8 @@ async def index_microsoft_driver_block_list_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185960,8 +182131,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186010,8 +182180,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186029,7 +182198,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -186069,10 +182238,8 @@ async def index_microsoft_driver_block_list_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186125,8 +182292,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186170,8 +182336,7 @@ def _index_microsoft_driver_block_list_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186184,7 +182349,10 @@ def _index_microsoft_driver_block_list_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -186268,13 +182436,9 @@ def _index_microsoft_driver_block_list_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -186357,8 +182521,7 @@ async def index_microsoft_kb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186376,7 +182539,7 @@ async def index_microsoft_kb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186416,10 +182579,8 @@ async def index_microsoft_kb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186472,8 +182633,7 @@ async def index_microsoft_kb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186522,8 +182682,7 @@ async def index_microsoft_kb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186541,7 +182700,7 @@ async def index_microsoft_kb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186581,10 +182740,8 @@ async def index_microsoft_kb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186637,8 +182794,7 @@ async def index_microsoft_kb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186687,8 +182843,7 @@ async def index_microsoft_kb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186706,7 +182861,7 @@ async def index_microsoft_kb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186746,10 +182901,8 @@ async def index_microsoft_kb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186802,8 +182955,7 @@ async def index_microsoft_kb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186847,8 +182999,7 @@ def _index_microsoft_kb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186861,7 +183012,10 @@ def _index_microsoft_kb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -186945,13 +183099,9 @@ def _index_microsoft_kb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -187034,8 +183184,7 @@ async def index_mikrotik_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187053,7 +183202,7 @@ async def index_mikrotik_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: """Return vulnerability data stored in index \"mikrotik\" @@ -187093,10 +183242,8 @@ async def index_mikrotik_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187149,8 +183296,7 @@ async def index_mikrotik_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187199,8 +183345,7 @@ async def index_mikrotik_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187218,7 +183363,7 @@ async def index_mikrotik_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: """Return vulnerability data stored in index \"mikrotik\" @@ -187258,10 +183403,8 @@ async def index_mikrotik_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187314,8 +183457,7 @@ async def index_mikrotik_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187364,8 +183506,7 @@ async def index_mikrotik_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187383,7 +183524,7 @@ async def index_mikrotik_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mikrotik\" @@ -187423,10 +183564,8 @@ async def index_mikrotik_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187479,8 +183618,7 @@ async def index_mikrotik_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187524,8 +183662,7 @@ def _index_mikrotik_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -187538,7 +183675,10 @@ def _index_mikrotik_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -187622,13 +183762,9 @@ def _index_mikrotik_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -187711,8 +183847,7 @@ async def index_mindray_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187730,7 +183865,7 @@ async def index_mindray_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: """Return vulnerability data stored in index \"mindray\" @@ -187770,10 +183905,8 @@ async def index_mindray_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187826,8 +183959,7 @@ async def index_mindray_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187876,8 +184008,7 @@ async def index_mindray_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187895,7 +184026,7 @@ async def index_mindray_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: """Return vulnerability data stored in index \"mindray\" @@ -187935,10 +184066,8 @@ async def index_mindray_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187991,8 +184120,7 @@ async def index_mindray_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188041,8 +184169,7 @@ async def index_mindray_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188060,7 +184187,7 @@ async def index_mindray_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mindray\" @@ -188100,10 +184227,8 @@ async def index_mindray_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188156,8 +184281,7 @@ async def index_mindray_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188201,8 +184325,7 @@ def _index_mindray_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188215,7 +184338,10 @@ def _index_mindray_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -188299,13 +184425,9 @@ def _index_mindray_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -188388,8 +184510,7 @@ async def index_misp_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188407,7 +184528,7 @@ async def index_misp_threat_actors_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188447,10 +184568,8 @@ async def index_misp_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188503,8 +184622,7 @@ async def index_misp_threat_actors_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188553,8 +184671,7 @@ async def index_misp_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188572,7 +184689,7 @@ async def index_misp_threat_actors_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188612,10 +184729,8 @@ async def index_misp_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188668,8 +184783,7 @@ async def index_misp_threat_actors_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188718,8 +184832,7 @@ async def index_misp_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188737,7 +184850,7 @@ async def index_misp_threat_actors_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188777,10 +184890,8 @@ async def index_misp_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188833,8 +184944,7 @@ async def index_misp_threat_actors_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188878,8 +184988,7 @@ def _index_misp_threat_actors_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188892,7 +185001,10 @@ def _index_misp_threat_actors_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -188976,13 +185088,9 @@ def _index_misp_threat_actors_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -189065,8 +185173,7 @@ async def index_mitel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189084,7 +185191,7 @@ async def index_mitel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: """Return vulnerability data stored in index \"mitel\" @@ -189124,10 +185231,8 @@ async def index_mitel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189180,8 +185285,7 @@ async def index_mitel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189230,8 +185334,7 @@ async def index_mitel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189249,7 +185352,7 @@ async def index_mitel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: """Return vulnerability data stored in index \"mitel\" @@ -189289,10 +185392,8 @@ async def index_mitel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189345,8 +185446,7 @@ async def index_mitel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189395,8 +185495,7 @@ async def index_mitel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189414,7 +185513,7 @@ async def index_mitel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitel\" @@ -189454,10 +185553,8 @@ async def index_mitel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189510,8 +185607,7 @@ async def index_mitel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189555,8 +185651,7 @@ def _index_mitel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -189569,7 +185664,10 @@ def _index_mitel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -189653,13 +185751,9 @@ def _index_mitel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -189742,8 +185836,7 @@ async def index_mitre_attack_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189761,7 +185854,7 @@ async def index_mitre_attack_cve_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -189801,10 +185894,8 @@ async def index_mitre_attack_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189857,8 +185948,7 @@ async def index_mitre_attack_cve_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189907,8 +185997,7 @@ async def index_mitre_attack_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189926,7 +186015,7 @@ async def index_mitre_attack_cve_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -189966,10 +186055,8 @@ async def index_mitre_attack_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190022,8 +186109,7 @@ async def index_mitre_attack_cve_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190072,8 +186158,7 @@ async def index_mitre_attack_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190091,7 +186176,7 @@ async def index_mitre_attack_cve_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -190131,10 +186216,8 @@ async def index_mitre_attack_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190187,8 +186270,7 @@ async def index_mitre_attack_cve_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190232,8 +186314,7 @@ def _index_mitre_attack_cve_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190246,7 +186327,10 @@ def _index_mitre_attack_cve_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -190330,13 +186414,9 @@ def _index_mitre_attack_cve_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -190419,8 +186499,7 @@ async def index_mitre_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190438,7 +186517,7 @@ async def index_mitre_cvelist_v5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190478,10 +186557,8 @@ async def index_mitre_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190534,8 +186611,7 @@ async def index_mitre_cvelist_v5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190584,8 +186660,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190603,7 +186678,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190643,10 +186718,8 @@ async def index_mitre_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190699,8 +186772,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190749,8 +186821,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190768,7 +186839,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190808,10 +186879,8 @@ async def index_mitre_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190864,8 +186933,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190909,8 +186977,7 @@ def _index_mitre_cvelist_v5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190923,7 +186990,10 @@ def _index_mitre_cvelist_v5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -191007,13 +187077,9 @@ def _index_mitre_cvelist_v5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -191096,8 +187162,7 @@ async def index_mitsubishi_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191115,7 +187180,7 @@ async def index_mitsubishi_electric_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191155,10 +187220,8 @@ async def index_mitsubishi_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191211,8 +187274,7 @@ async def index_mitsubishi_electric_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191261,8 +187323,7 @@ async def index_mitsubishi_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191280,7 +187341,7 @@ async def index_mitsubishi_electric_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191320,10 +187381,8 @@ async def index_mitsubishi_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191376,8 +187435,7 @@ async def index_mitsubishi_electric_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191426,8 +187484,7 @@ async def index_mitsubishi_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191445,7 +187502,7 @@ async def index_mitsubishi_electric_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191485,10 +187542,8 @@ async def index_mitsubishi_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191541,8 +187596,7 @@ async def index_mitsubishi_electric_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191586,8 +187640,7 @@ def _index_mitsubishi_electric_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191600,7 +187653,10 @@ def _index_mitsubishi_electric_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -191684,13 +187740,9 @@ def _index_mitsubishi_electric_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -191773,8 +187825,7 @@ async def index_mongodb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191792,7 +187843,7 @@ async def index_mongodb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: """Return vulnerability data stored in index \"mongodb\" @@ -191832,10 +187883,8 @@ async def index_mongodb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191888,8 +187937,7 @@ async def index_mongodb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191938,8 +187986,7 @@ async def index_mongodb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191957,7 +188004,7 @@ async def index_mongodb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: """Return vulnerability data stored in index \"mongodb\" @@ -191997,10 +188044,8 @@ async def index_mongodb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192053,8 +188098,7 @@ async def index_mongodb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192103,8 +188147,7 @@ async def index_mongodb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192122,7 +188165,7 @@ async def index_mongodb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mongodb\" @@ -192162,10 +188205,8 @@ async def index_mongodb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192218,8 +188259,7 @@ async def index_mongodb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192263,8 +188303,7 @@ def _index_mongodb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192277,7 +188316,10 @@ def _index_mongodb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -192361,13 +188403,9 @@ def _index_mongodb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -192450,8 +188488,7 @@ async def index_moxa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192469,7 +188506,7 @@ async def index_moxa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"moxa\" @@ -192509,10 +188546,8 @@ async def index_moxa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192565,8 +188600,7 @@ async def index_moxa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192615,8 +188649,7 @@ async def index_moxa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192634,7 +188667,7 @@ async def index_moxa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"moxa\" @@ -192674,10 +188707,8 @@ async def index_moxa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192730,8 +188761,7 @@ async def index_moxa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192780,8 +188810,7 @@ async def index_moxa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192799,7 +188828,7 @@ async def index_moxa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"moxa\" @@ -192839,10 +188868,8 @@ async def index_moxa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192895,8 +188922,7 @@ async def index_moxa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192940,8 +188966,7 @@ def _index_moxa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192954,7 +188979,10 @@ def _index_moxa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -193038,13 +189066,9 @@ def _index_moxa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -193127,8 +189151,7 @@ async def index_mozilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193146,7 +189169,7 @@ async def index_mozilla_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"mozilla\" @@ -193186,10 +189209,8 @@ async def index_mozilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193242,8 +189263,7 @@ async def index_mozilla_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193292,8 +189312,7 @@ async def index_mozilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193311,7 +189330,7 @@ async def index_mozilla_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"mozilla\" @@ -193351,10 +189370,8 @@ async def index_mozilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193407,8 +189424,7 @@ async def index_mozilla_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193457,8 +189473,7 @@ async def index_mozilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193476,7 +189491,7 @@ async def index_mozilla_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mozilla\" @@ -193516,10 +189531,8 @@ async def index_mozilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193572,8 +189585,7 @@ async def index_mozilla_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193617,8 +189629,7 @@ def _index_mozilla_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193631,7 +189642,10 @@ def _index_mozilla_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -193715,13 +189729,9 @@ def _index_mozilla_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -193804,8 +189814,7 @@ async def index_naver_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193823,7 +189832,7 @@ async def index_naver_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: """Return vulnerability data stored in index \"naver\" @@ -193863,10 +189872,8 @@ async def index_naver_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193919,8 +189926,7 @@ async def index_naver_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193969,8 +189975,7 @@ async def index_naver_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193988,7 +189993,7 @@ async def index_naver_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: """Return vulnerability data stored in index \"naver\" @@ -194028,10 +190033,8 @@ async def index_naver_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194084,8 +190087,7 @@ async def index_naver_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194134,8 +190136,7 @@ async def index_naver_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194153,7 +190154,7 @@ async def index_naver_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"naver\" @@ -194193,10 +190194,8 @@ async def index_naver_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194249,8 +190248,7 @@ async def index_naver_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194294,8 +190292,7 @@ def _index_naver_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194308,7 +190305,10 @@ def _index_naver_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -194392,13 +190392,9 @@ def _index_naver_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -194481,8 +190477,7 @@ async def index_ncsc_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194500,7 +190495,7 @@ async def index_ncsc_cves_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194540,10 +190535,8 @@ async def index_ncsc_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194596,8 +190589,7 @@ async def index_ncsc_cves_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194646,8 +190638,7 @@ async def index_ncsc_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194665,7 +190656,7 @@ async def index_ncsc_cves_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194705,10 +190696,8 @@ async def index_ncsc_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194761,8 +190750,7 @@ async def index_ncsc_cves_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194811,8 +190799,7 @@ async def index_ncsc_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194830,7 +190817,7 @@ async def index_ncsc_cves_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194870,10 +190857,8 @@ async def index_ncsc_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194926,8 +190911,7 @@ async def index_ncsc_cves_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194971,8 +190955,7 @@ def _index_ncsc_cves_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194985,7 +190968,10 @@ def _index_ncsc_cves_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -195069,13 +191055,9 @@ def _index_ncsc_cves_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -195158,8 +191140,7 @@ async def index_ncsc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195177,7 +191158,7 @@ async def index_ncsc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: """Return vulnerability data stored in index \"ncsc\" @@ -195217,10 +191198,8 @@ async def index_ncsc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195273,8 +191252,7 @@ async def index_ncsc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195323,8 +191301,7 @@ async def index_ncsc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195342,7 +191319,7 @@ async def index_ncsc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: """Return vulnerability data stored in index \"ncsc\" @@ -195382,10 +191359,8 @@ async def index_ncsc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195438,8 +191413,7 @@ async def index_ncsc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195488,8 +191462,7 @@ async def index_ncsc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195507,7 +191480,7 @@ async def index_ncsc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ncsc\" @@ -195547,10 +191520,8 @@ async def index_ncsc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195603,8 +191574,7 @@ async def index_ncsc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195648,8 +191618,7 @@ def _index_ncsc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195662,7 +191631,10 @@ def _index_ncsc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -195746,13 +191718,9 @@ def _index_ncsc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -195835,8 +191803,7 @@ async def index_nec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195854,7 +191821,7 @@ async def index_nec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: """Return vulnerability data stored in index \"nec\" @@ -195894,10 +191861,8 @@ async def index_nec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195950,8 +191915,7 @@ async def index_nec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196000,8 +191964,7 @@ async def index_nec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196019,7 +191982,7 @@ async def index_nec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: """Return vulnerability data stored in index \"nec\" @@ -196059,10 +192022,8 @@ async def index_nec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196115,8 +192076,7 @@ async def index_nec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196165,8 +192125,7 @@ async def index_nec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196184,7 +192143,7 @@ async def index_nec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nec\" @@ -196224,10 +192183,8 @@ async def index_nec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196280,8 +192237,7 @@ async def index_nec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196325,8 +192281,7 @@ def _index_nec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -196339,7 +192294,10 @@ def _index_nec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -196423,13 +192381,9 @@ def _index_nec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -196512,8 +192466,7 @@ async def index_nessus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196531,7 +192484,7 @@ async def index_nessus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: """Return vulnerability data stored in index \"nessus\" @@ -196571,10 +192524,8 @@ async def index_nessus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196627,8 +192578,7 @@ async def index_nessus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196677,8 +192627,7 @@ async def index_nessus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196696,7 +192645,7 @@ async def index_nessus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: """Return vulnerability data stored in index \"nessus\" @@ -196736,10 +192685,8 @@ async def index_nessus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196792,8 +192739,7 @@ async def index_nessus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196842,8 +192788,7 @@ async def index_nessus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196861,7 +192806,7 @@ async def index_nessus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nessus\" @@ -196901,10 +192846,8 @@ async def index_nessus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196957,8 +192900,7 @@ async def index_nessus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197002,8 +192944,7 @@ def _index_nessus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197016,7 +192957,10 @@ def _index_nessus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -197100,13 +193044,9 @@ def _index_nessus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -197189,8 +193129,7 @@ async def index_netapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197208,7 +193147,7 @@ async def index_netapp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: """Return vulnerability data stored in index \"netapp\" @@ -197248,10 +193187,8 @@ async def index_netapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197304,8 +193241,7 @@ async def index_netapp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197354,8 +193290,7 @@ async def index_netapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197373,7 +193308,7 @@ async def index_netapp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: """Return vulnerability data stored in index \"netapp\" @@ -197413,10 +193348,8 @@ async def index_netapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197469,8 +193402,7 @@ async def index_netapp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197519,8 +193451,7 @@ async def index_netapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197538,7 +193469,7 @@ async def index_netapp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netapp\" @@ -197578,10 +193509,8 @@ async def index_netapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197634,8 +193563,7 @@ async def index_netapp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197679,8 +193607,7 @@ def _index_netapp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197693,7 +193620,10 @@ def _index_netapp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -197777,13 +193707,9 @@ def _index_netapp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -197866,8 +193792,7 @@ async def index_netatalk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197885,7 +193810,7 @@ async def index_netatalk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: """Return vulnerability data stored in index \"netatalk\" @@ -197925,10 +193850,8 @@ async def index_netatalk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197981,8 +193904,7 @@ async def index_netatalk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198031,8 +193953,7 @@ async def index_netatalk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198050,7 +193971,7 @@ async def index_netatalk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: """Return vulnerability data stored in index \"netatalk\" @@ -198090,10 +194011,8 @@ async def index_netatalk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198146,8 +194065,7 @@ async def index_netatalk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198196,8 +194114,7 @@ async def index_netatalk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198215,7 +194132,7 @@ async def index_netatalk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netatalk\" @@ -198255,10 +194172,8 @@ async def index_netatalk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198311,8 +194226,7 @@ async def index_netatalk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198356,8 +194270,7 @@ def _index_netatalk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -198370,7 +194283,10 @@ def _index_netatalk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -198454,13 +194370,9 @@ def _index_netatalk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -198543,8 +194455,7 @@ async def index_netgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198562,7 +194473,7 @@ async def index_netgate_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: """Return vulnerability data stored in index \"netgate\" @@ -198602,10 +194513,8 @@ async def index_netgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198658,8 +194567,7 @@ async def index_netgate_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198708,8 +194616,7 @@ async def index_netgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198727,7 +194634,7 @@ async def index_netgate_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: """Return vulnerability data stored in index \"netgate\" @@ -198767,10 +194674,8 @@ async def index_netgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198823,8 +194728,7 @@ async def index_netgate_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198873,8 +194777,7 @@ async def index_netgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198892,7 +194795,7 @@ async def index_netgate_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netgate\" @@ -198932,10 +194835,8 @@ async def index_netgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198988,8 +194889,7 @@ async def index_netgate_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199033,8 +194933,7 @@ def _index_netgate_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199047,7 +194946,10 @@ def _index_netgate_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -199131,13 +195033,9 @@ def _index_netgate_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -199220,8 +195118,7 @@ async def index_netgear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199239,7 +195136,7 @@ async def index_netgear_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: """Return vulnerability data stored in index \"netgear\" @@ -199279,10 +195176,8 @@ async def index_netgear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199335,8 +195230,7 @@ async def index_netgear_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199385,8 +195279,7 @@ async def index_netgear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199404,7 +195297,7 @@ async def index_netgear_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: """Return vulnerability data stored in index \"netgear\" @@ -199444,10 +195337,8 @@ async def index_netgear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199500,8 +195391,7 @@ async def index_netgear_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199550,8 +195440,7 @@ async def index_netgear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199569,7 +195458,7 @@ async def index_netgear_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netgear\" @@ -199609,10 +195498,8 @@ async def index_netgear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199665,8 +195552,7 @@ async def index_netgear_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199710,8 +195596,7 @@ def _index_netgear_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199724,7 +195609,10 @@ def _index_netgear_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -199808,13 +195696,9 @@ def _index_netgear_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -199897,8 +195781,7 @@ async def index_netskope_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199916,7 +195799,7 @@ async def index_netskope_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: """Return vulnerability data stored in index \"netskope\" @@ -199956,10 +195839,8 @@ async def index_netskope_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200012,8 +195893,7 @@ async def index_netskope_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200062,8 +195942,7 @@ async def index_netskope_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200081,7 +195960,7 @@ async def index_netskope_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: """Return vulnerability data stored in index \"netskope\" @@ -200121,10 +196000,8 @@ async def index_netskope_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200177,8 +196054,7 @@ async def index_netskope_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200227,8 +196103,7 @@ async def index_netskope_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200246,7 +196121,7 @@ async def index_netskope_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netskope\" @@ -200286,10 +196161,8 @@ async def index_netskope_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200342,8 +196215,7 @@ async def index_netskope_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200387,8 +196259,7 @@ def _index_netskope_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -200401,7 +196272,10 @@ def _index_netskope_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -200485,13 +196359,9 @@ def _index_netskope_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -200574,8 +196444,7 @@ async def index_nexpose_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200593,7 +196462,7 @@ async def index_nexpose_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: """Return vulnerability data stored in index \"nexpose\" @@ -200633,10 +196502,8 @@ async def index_nexpose_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200689,8 +196556,7 @@ async def index_nexpose_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200739,8 +196605,7 @@ async def index_nexpose_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200758,7 +196623,7 @@ async def index_nexpose_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: """Return vulnerability data stored in index \"nexpose\" @@ -200798,10 +196663,8 @@ async def index_nexpose_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200854,8 +196717,7 @@ async def index_nexpose_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200904,8 +196766,7 @@ async def index_nexpose_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200923,7 +196784,7 @@ async def index_nexpose_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nexpose\" @@ -200963,10 +196824,8 @@ async def index_nexpose_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201019,8 +196878,7 @@ async def index_nexpose_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201064,8 +196922,7 @@ def _index_nexpose_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201078,7 +196935,10 @@ def _index_nexpose_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -201162,13 +197022,9 @@ def _index_nexpose_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -201251,8 +197107,7 @@ async def index_nginx_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201270,7 +197125,7 @@ async def index_nginx_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: """Return vulnerability data stored in index \"nginx\" @@ -201310,10 +197165,8 @@ async def index_nginx_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201366,8 +197219,7 @@ async def index_nginx_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201416,8 +197268,7 @@ async def index_nginx_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201435,7 +197286,7 @@ async def index_nginx_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"nginx\" @@ -201475,10 +197326,8 @@ async def index_nginx_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201531,8 +197380,7 @@ async def index_nginx_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201581,8 +197429,7 @@ async def index_nginx_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201600,7 +197447,7 @@ async def index_nginx_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nginx\" @@ -201640,10 +197487,8 @@ async def index_nginx_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201696,8 +197541,7 @@ async def index_nginx_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201741,8 +197585,7 @@ def _index_nginx_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201755,7 +197598,10 @@ def _index_nginx_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -201839,13 +197685,9 @@ def _index_nginx_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -201928,8 +197770,7 @@ async def index_nhs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201947,7 +197788,7 @@ async def index_nhs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: """Return vulnerability data stored in index \"nhs\" @@ -201987,10 +197828,8 @@ async def index_nhs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202043,8 +197882,7 @@ async def index_nhs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202093,8 +197931,7 @@ async def index_nhs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202112,7 +197949,7 @@ async def index_nhs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: """Return vulnerability data stored in index \"nhs\" @@ -202152,10 +197989,8 @@ async def index_nhs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202208,8 +198043,7 @@ async def index_nhs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202258,8 +198092,7 @@ async def index_nhs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202277,7 +198110,7 @@ async def index_nhs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nhs\" @@ -202317,10 +198150,8 @@ async def index_nhs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202373,8 +198204,7 @@ async def index_nhs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202418,8 +198248,7 @@ def _index_nhs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -202432,7 +198261,10 @@ def _index_nhs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -202516,13 +198348,9 @@ def _index_nhs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -202605,8 +198433,7 @@ async def index_ni_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202624,7 +198451,7 @@ async def index_ni_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: """Return vulnerability data stored in index \"ni\" @@ -202664,10 +198491,8 @@ async def index_ni_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202720,8 +198545,7 @@ async def index_ni_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202770,8 +198594,7 @@ async def index_ni_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202789,7 +198612,7 @@ async def index_ni_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: """Return vulnerability data stored in index \"ni\" @@ -202829,10 +198652,8 @@ async def index_ni_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202885,8 +198706,7 @@ async def index_ni_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202935,8 +198755,7 @@ async def index_ni_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202954,7 +198773,7 @@ async def index_ni_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ni\" @@ -202994,10 +198813,8 @@ async def index_ni_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203050,8 +198867,7 @@ async def index_ni_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203095,8 +198911,7 @@ def _index_ni_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203109,7 +198924,10 @@ def _index_ni_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -203193,13 +199011,9 @@ def _index_ni_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -203282,8 +199096,7 @@ async def index_nist_nvd2_cpematch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203301,7 +199114,7 @@ async def index_nist_nvd2_cpematch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203341,10 +199154,8 @@ async def index_nist_nvd2_cpematch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203397,8 +199208,7 @@ async def index_nist_nvd2_cpematch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203447,8 +199257,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203466,7 +199275,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203506,10 +199315,8 @@ async def index_nist_nvd2_cpematch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203562,8 +199369,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203612,8 +199418,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203631,7 +199436,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203671,10 +199476,8 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203727,8 +199530,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203772,8 +199574,7 @@ def _index_nist_nvd2_cpematch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203786,7 +199587,10 @@ def _index_nist_nvd2_cpematch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -203870,13 +199674,9 @@ def _index_nist_nvd2_cpematch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -203959,8 +199759,7 @@ async def index_nist_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203978,7 +199777,7 @@ async def index_nist_nvd2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204018,10 +199817,8 @@ async def index_nist_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204074,8 +199871,7 @@ async def index_nist_nvd2_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204124,8 +199920,7 @@ async def index_nist_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204143,7 +199938,7 @@ async def index_nist_nvd2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204183,10 +199978,8 @@ async def index_nist_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204239,8 +200032,7 @@ async def index_nist_nvd2_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204289,8 +200081,7 @@ async def index_nist_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204308,7 +200099,7 @@ async def index_nist_nvd2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204348,10 +200139,8 @@ async def index_nist_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204404,8 +200193,7 @@ async def index_nist_nvd2_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204449,8 +200237,7 @@ def _index_nist_nvd2_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -204463,7 +200250,10 @@ def _index_nist_nvd2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -204547,13 +200337,9 @@ def _index_nist_nvd2_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -204636,8 +200422,7 @@ async def index_nist_nvd2_sources_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204655,7 +200440,7 @@ async def index_nist_nvd2_sources_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -204695,10 +200480,8 @@ async def index_nist_nvd2_sources_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204751,8 +200534,7 @@ async def index_nist_nvd2_sources_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204801,8 +200583,7 @@ async def index_nist_nvd2_sources_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204820,7 +200601,7 @@ async def index_nist_nvd2_sources_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -204860,10 +200641,8 @@ async def index_nist_nvd2_sources_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204916,8 +200695,7 @@ async def index_nist_nvd2_sources_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204966,8 +200744,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204985,7 +200762,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -205025,10 +200802,8 @@ async def index_nist_nvd2_sources_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205081,8 +200856,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205126,8 +200900,7 @@ def _index_nist_nvd2_sources_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205140,7 +200913,10 @@ def _index_nist_nvd2_sources_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -205224,13 +201000,9 @@ def _index_nist_nvd2_sources_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -205313,8 +201085,7 @@ async def index_nist_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205332,7 +201103,7 @@ async def index_nist_nvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: """Return vulnerability data stored in index \"nist-nvd\" @@ -205372,10 +201143,8 @@ async def index_nist_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205428,8 +201197,7 @@ async def index_nist_nvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205478,8 +201246,7 @@ async def index_nist_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205497,7 +201264,7 @@ async def index_nist_nvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd\" @@ -205537,10 +201304,8 @@ async def index_nist_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205593,8 +201358,7 @@ async def index_nist_nvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205643,8 +201407,7 @@ async def index_nist_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205662,7 +201425,7 @@ async def index_nist_nvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd\" @@ -205702,10 +201465,8 @@ async def index_nist_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205758,8 +201519,7 @@ async def index_nist_nvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205803,8 +201563,7 @@ def _index_nist_nvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205817,7 +201576,10 @@ def _index_nist_nvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -205901,13 +201663,9 @@ def _index_nist_nvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -205990,8 +201748,7 @@ async def index_node_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206009,7 +201766,7 @@ async def index_node_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: """Return vulnerability data stored in index \"node-security\" @@ -206049,10 +201806,8 @@ async def index_node_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206105,8 +201860,7 @@ async def index_node_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206155,8 +201909,7 @@ async def index_node_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206174,7 +201927,7 @@ async def index_node_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: """Return vulnerability data stored in index \"node-security\" @@ -206214,10 +201967,8 @@ async def index_node_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206270,8 +202021,7 @@ async def index_node_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206320,8 +202070,7 @@ async def index_node_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206339,7 +202088,7 @@ async def index_node_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"node-security\" @@ -206379,10 +202128,8 @@ async def index_node_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206435,8 +202182,7 @@ async def index_node_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206480,8 +202226,7 @@ def _index_node_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -206494,7 +202239,10 @@ def _index_node_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -206578,13 +202326,9 @@ def _index_node_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -206667,8 +202411,7 @@ async def index_nodejs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206686,7 +202429,7 @@ async def index_nodejs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: """Return vulnerability data stored in index \"nodejs\" @@ -206726,10 +202469,8 @@ async def index_nodejs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206782,8 +202523,7 @@ async def index_nodejs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206832,8 +202572,7 @@ async def index_nodejs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206851,7 +202590,7 @@ async def index_nodejs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: """Return vulnerability data stored in index \"nodejs\" @@ -206891,10 +202630,8 @@ async def index_nodejs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206947,8 +202684,7 @@ async def index_nodejs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206997,8 +202733,7 @@ async def index_nodejs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207016,7 +202751,7 @@ async def index_nodejs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nodejs\" @@ -207056,10 +202791,8 @@ async def index_nodejs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207112,8 +202845,7 @@ async def index_nodejs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207157,8 +202889,7 @@ def _index_nodejs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207171,7 +202902,10 @@ def _index_nodejs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -207255,13 +202989,9 @@ def _index_nodejs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -207344,8 +203074,7 @@ async def index_nokia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207363,7 +203092,7 @@ async def index_nokia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: """Return vulnerability data stored in index \"nokia\" @@ -207403,10 +203132,8 @@ async def index_nokia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207459,8 +203186,7 @@ async def index_nokia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207509,8 +203235,7 @@ async def index_nokia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207528,7 +203253,7 @@ async def index_nokia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: """Return vulnerability data stored in index \"nokia\" @@ -207568,10 +203293,8 @@ async def index_nokia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207624,8 +203347,7 @@ async def index_nokia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207674,8 +203396,7 @@ async def index_nokia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207693,7 +203414,7 @@ async def index_nokia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nokia\" @@ -207733,10 +203454,8 @@ async def index_nokia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207789,8 +203508,7 @@ async def index_nokia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207834,8 +203552,7 @@ def _index_nokia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207848,7 +203565,10 @@ def _index_nokia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -207932,13 +203652,9 @@ def _index_nokia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -208021,8 +203737,7 @@ async def index_notepadplusplus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208040,7 +203755,7 @@ async def index_notepadplusplus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208080,10 +203795,8 @@ async def index_notepadplusplus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208136,8 +203849,7 @@ async def index_notepadplusplus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208186,8 +203898,7 @@ async def index_notepadplusplus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208205,7 +203916,7 @@ async def index_notepadplusplus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208245,10 +203956,8 @@ async def index_notepadplusplus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208301,8 +204010,7 @@ async def index_notepadplusplus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208351,8 +204059,7 @@ async def index_notepadplusplus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208370,7 +204077,7 @@ async def index_notepadplusplus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208410,10 +204117,8 @@ async def index_notepadplusplus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208466,8 +204171,7 @@ async def index_notepadplusplus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208511,8 +204215,7 @@ def _index_notepadplusplus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -208525,7 +204228,10 @@ def _index_notepadplusplus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -208609,13 +204315,9 @@ def _index_notepadplusplus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -208698,8 +204400,7 @@ async def index_nozomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208717,7 +204418,7 @@ async def index_nozomi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: """Return vulnerability data stored in index \"nozomi\" @@ -208757,10 +204458,8 @@ async def index_nozomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208813,8 +204512,7 @@ async def index_nozomi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208863,8 +204561,7 @@ async def index_nozomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208882,7 +204579,7 @@ async def index_nozomi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: """Return vulnerability data stored in index \"nozomi\" @@ -208922,10 +204619,8 @@ async def index_nozomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208978,8 +204673,7 @@ async def index_nozomi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209028,8 +204722,7 @@ async def index_nozomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209047,7 +204740,7 @@ async def index_nozomi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nozomi\" @@ -209087,10 +204780,8 @@ async def index_nozomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209143,8 +204834,7 @@ async def index_nozomi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209188,8 +204878,7 @@ def _index_nozomi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209202,7 +204891,10 @@ def _index_nozomi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -209286,13 +204978,9 @@ def _index_nozomi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -209375,8 +205063,7 @@ async def index_npm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209394,7 +205081,7 @@ async def index_npm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"npm\" @@ -209434,10 +205121,8 @@ async def index_npm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209490,8 +205175,7 @@ async def index_npm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209540,8 +205224,7 @@ async def index_npm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209559,7 +205242,7 @@ async def index_npm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"npm\" @@ -209599,10 +205282,8 @@ async def index_npm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209655,8 +205336,7 @@ async def index_npm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209705,8 +205385,7 @@ async def index_npm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209724,7 +205403,7 @@ async def index_npm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"npm\" @@ -209764,10 +205443,8 @@ async def index_npm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209820,8 +205497,7 @@ async def index_npm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209865,8 +205541,7 @@ def _index_npm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209879,7 +205554,10 @@ def _index_npm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -209963,13 +205641,9 @@ def _index_npm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -210052,8 +205726,7 @@ async def index_ntp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210071,7 +205744,7 @@ async def index_ntp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: """Return vulnerability data stored in index \"ntp\" @@ -210111,10 +205784,8 @@ async def index_ntp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210167,8 +205838,7 @@ async def index_ntp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210217,8 +205887,7 @@ async def index_ntp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210236,7 +205905,7 @@ async def index_ntp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: """Return vulnerability data stored in index \"ntp\" @@ -210276,10 +205945,8 @@ async def index_ntp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210332,8 +205999,7 @@ async def index_ntp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210382,8 +206048,7 @@ async def index_ntp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210401,7 +206066,7 @@ async def index_ntp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ntp\" @@ -210441,10 +206106,8 @@ async def index_ntp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210497,8 +206160,7 @@ async def index_ntp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210542,8 +206204,7 @@ def _index_ntp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -210556,7 +206217,10 @@ def _index_ntp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -210640,13 +206304,9 @@ def _index_ntp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -210729,8 +206389,7 @@ async def index_nuclei_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210748,7 +206407,7 @@ async def index_nuclei_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: """Return vulnerability data stored in index \"nuclei\" @@ -210788,10 +206447,8 @@ async def index_nuclei_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210844,8 +206501,7 @@ async def index_nuclei_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210894,8 +206550,7 @@ async def index_nuclei_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210913,7 +206568,7 @@ async def index_nuclei_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: """Return vulnerability data stored in index \"nuclei\" @@ -210953,10 +206608,8 @@ async def index_nuclei_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211009,8 +206662,7 @@ async def index_nuclei_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211059,8 +206711,7 @@ async def index_nuclei_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211078,7 +206729,7 @@ async def index_nuclei_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nuclei\" @@ -211118,10 +206769,8 @@ async def index_nuclei_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211174,8 +206823,7 @@ async def index_nuclei_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211219,8 +206867,7 @@ def _index_nuclei_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211233,7 +206880,10 @@ def _index_nuclei_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -211317,13 +206967,9 @@ def _index_nuclei_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -211406,8 +207052,7 @@ async def index_nuget_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211425,7 +207070,7 @@ async def index_nuget_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"nuget\" @@ -211465,10 +207110,8 @@ async def index_nuget_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211521,8 +207164,7 @@ async def index_nuget_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211571,8 +207213,7 @@ async def index_nuget_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211590,7 +207231,7 @@ async def index_nuget_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"nuget\" @@ -211630,10 +207271,8 @@ async def index_nuget_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211686,8 +207325,7 @@ async def index_nuget_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211736,8 +207374,7 @@ async def index_nuget_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211755,7 +207392,7 @@ async def index_nuget_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nuget\" @@ -211795,10 +207432,8 @@ async def index_nuget_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211851,8 +207486,7 @@ async def index_nuget_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211896,8 +207530,7 @@ def _index_nuget_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211910,7 +207543,10 @@ def _index_nuget_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -211994,13 +207630,9 @@ def _index_nuget_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -212083,8 +207715,7 @@ async def index_nvd_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212102,7 +207733,7 @@ async def index_nvd_cpe_dictionary_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212142,10 +207773,8 @@ async def index_nvd_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212198,8 +207827,7 @@ async def index_nvd_cpe_dictionary_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212248,8 +207876,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212267,7 +207894,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212307,10 +207934,8 @@ async def index_nvd_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212363,8 +207988,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212413,8 +208037,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212432,7 +208055,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212472,10 +208095,8 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212528,8 +208149,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212573,8 +208193,7 @@ def _index_nvd_cpe_dictionary_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -212587,7 +208206,10 @@ def _index_nvd_cpe_dictionary_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -212671,13 +208293,9 @@ def _index_nvd_cpe_dictionary_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -212760,8 +208378,7 @@ async def index_nvidia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212779,7 +208396,7 @@ async def index_nvidia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: """Return vulnerability data stored in index \"nvidia\" @@ -212819,10 +208436,8 @@ async def index_nvidia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212875,8 +208490,7 @@ async def index_nvidia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212925,8 +208539,7 @@ async def index_nvidia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212944,7 +208557,7 @@ async def index_nvidia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: """Return vulnerability data stored in index \"nvidia\" @@ -212984,10 +208597,8 @@ async def index_nvidia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213040,8 +208651,7 @@ async def index_nvidia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213090,8 +208700,7 @@ async def index_nvidia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213109,7 +208718,7 @@ async def index_nvidia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nvidia\" @@ -213149,10 +208758,8 @@ async def index_nvidia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213205,8 +208812,7 @@ async def index_nvidia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213250,8 +208856,7 @@ def _index_nvidia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213264,7 +208869,10 @@ def _index_nvidia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -213348,13 +208956,9 @@ def _index_nvidia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -213437,8 +209041,7 @@ async def index_nz_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213456,7 +209059,7 @@ async def index_nz_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: """Return vulnerability data stored in index \"nz-advisories\" @@ -213496,10 +209099,8 @@ async def index_nz_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213552,8 +209153,7 @@ async def index_nz_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213602,8 +209202,7 @@ async def index_nz_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213621,7 +209220,7 @@ async def index_nz_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"nz-advisories\" @@ -213661,10 +209260,8 @@ async def index_nz_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213717,8 +209314,7 @@ async def index_nz_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213767,8 +209363,7 @@ async def index_nz_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213786,7 +209381,7 @@ async def index_nz_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nz-advisories\" @@ -213826,10 +209421,8 @@ async def index_nz_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213882,8 +209475,7 @@ async def index_nz_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213927,8 +209519,7 @@ def _index_nz_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213941,7 +209532,10 @@ def _index_nz_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -214025,13 +209619,9 @@ def _index_nz_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -214114,8 +209704,7 @@ async def index_octopus_deploy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214133,7 +209722,7 @@ async def index_octopus_deploy_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214173,10 +209762,8 @@ async def index_octopus_deploy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214229,8 +209816,7 @@ async def index_octopus_deploy_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214279,8 +209865,7 @@ async def index_octopus_deploy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214298,7 +209883,7 @@ async def index_octopus_deploy_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214338,10 +209923,8 @@ async def index_octopus_deploy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214394,8 +209977,7 @@ async def index_octopus_deploy_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214444,8 +210026,7 @@ async def index_octopus_deploy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214463,7 +210044,7 @@ async def index_octopus_deploy_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214503,10 +210084,8 @@ async def index_octopus_deploy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214559,8 +210138,7 @@ async def index_octopus_deploy_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214604,8 +210182,7 @@ def _index_octopus_deploy_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214618,7 +210195,10 @@ def _index_octopus_deploy_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -214702,13 +210282,9 @@ def _index_octopus_deploy_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -214791,8 +210367,7 @@ async def index_okta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214810,7 +210385,7 @@ async def index_okta_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: """Return vulnerability data stored in index \"okta\" @@ -214850,10 +210425,8 @@ async def index_okta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214906,8 +210479,7 @@ async def index_okta_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214956,8 +210528,7 @@ async def index_okta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214975,7 +210546,7 @@ async def index_okta_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: """Return vulnerability data stored in index \"okta\" @@ -215015,10 +210586,8 @@ async def index_okta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215071,8 +210640,7 @@ async def index_okta_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215121,8 +210689,7 @@ async def index_okta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215140,7 +210707,7 @@ async def index_okta_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"okta\" @@ -215180,10 +210747,8 @@ async def index_okta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215236,8 +210801,7 @@ async def index_okta_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215281,8 +210845,7 @@ def _index_okta_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215295,7 +210858,10 @@ def _index_okta_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -215379,13 +210945,9 @@ def _index_okta_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -215468,8 +211030,7 @@ async def index_omron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215487,7 +211048,7 @@ async def index_omron_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: """Return vulnerability data stored in index \"omron\" @@ -215527,10 +211088,8 @@ async def index_omron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215583,8 +211142,7 @@ async def index_omron_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215633,8 +211191,7 @@ async def index_omron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215652,7 +211209,7 @@ async def index_omron_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: """Return vulnerability data stored in index \"omron\" @@ -215692,10 +211249,8 @@ async def index_omron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215748,8 +211303,7 @@ async def index_omron_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215798,8 +211352,7 @@ async def index_omron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215817,7 +211370,7 @@ async def index_omron_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"omron\" @@ -215857,10 +211410,8 @@ async def index_omron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215913,8 +211464,7 @@ async def index_omron_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215958,8 +211508,7 @@ def _index_omron_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215972,7 +211521,10 @@ def _index_omron_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -216056,13 +211608,9 @@ def _index_omron_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -216145,8 +211693,7 @@ async def index_one_e_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216164,7 +211711,7 @@ async def index_one_e_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: """Return vulnerability data stored in index \"one-e\" @@ -216204,10 +211751,8 @@ async def index_one_e_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216260,8 +211805,7 @@ async def index_one_e_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216310,8 +211854,7 @@ async def index_one_e_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216329,7 +211872,7 @@ async def index_one_e_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: """Return vulnerability data stored in index \"one-e\" @@ -216369,10 +211912,8 @@ async def index_one_e_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216425,8 +211966,7 @@ async def index_one_e_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216475,8 +212015,7 @@ async def index_one_e_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216494,7 +212033,7 @@ async def index_one_e_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"one-e\" @@ -216534,10 +212073,8 @@ async def index_one_e_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216590,8 +212127,7 @@ async def index_one_e_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216635,8 +212171,7 @@ def _index_one_e_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216649,7 +212184,10 @@ def _index_one_e_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -216733,13 +212271,9 @@ def _index_one_e_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -216822,8 +212356,7 @@ async def index_opam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216841,7 +212374,7 @@ async def index_opam_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"opam\" @@ -216881,10 +212414,8 @@ async def index_opam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216937,8 +212468,7 @@ async def index_opam_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216987,8 +212517,7 @@ async def index_opam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217006,7 +212535,7 @@ async def index_opam_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"opam\" @@ -217046,10 +212575,8 @@ async def index_opam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217102,8 +212629,7 @@ async def index_opam_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217152,8 +212678,7 @@ async def index_opam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217171,7 +212696,7 @@ async def index_opam_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"opam\" @@ -217211,10 +212736,8 @@ async def index_opam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217267,8 +212790,7 @@ async def index_opam_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217312,8 +212834,7 @@ def _index_opam_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -217326,7 +212847,10 @@ def _index_opam_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -217410,13 +212934,9 @@ def _index_opam_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -217499,8 +213019,7 @@ async def index_open_cvdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217518,7 +213037,7 @@ async def index_open_cvdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: """Return vulnerability data stored in index \"open-cvdb\" @@ -217558,10 +213077,8 @@ async def index_open_cvdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217614,8 +213131,7 @@ async def index_open_cvdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217664,8 +213180,7 @@ async def index_open_cvdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217683,7 +213198,7 @@ async def index_open_cvdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: """Return vulnerability data stored in index \"open-cvdb\" @@ -217723,10 +213238,8 @@ async def index_open_cvdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217779,8 +213292,7 @@ async def index_open_cvdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217829,8 +213341,7 @@ async def index_open_cvdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217848,7 +213359,7 @@ async def index_open_cvdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"open-cvdb\" @@ -217888,10 +213399,8 @@ async def index_open_cvdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217944,8 +213453,7 @@ async def index_open_cvdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217989,8 +213497,7 @@ def _index_open_cvdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218003,7 +213510,10 @@ def _index_open_cvdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -218087,13 +213597,9 @@ def _index_open_cvdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -218176,8 +213682,7 @@ async def index_openbsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218195,7 +213700,7 @@ async def index_openbsd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: """Return vulnerability data stored in index \"openbsd\" @@ -218235,10 +213740,8 @@ async def index_openbsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218291,8 +213794,7 @@ async def index_openbsd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218341,8 +213843,7 @@ async def index_openbsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218360,7 +213861,7 @@ async def index_openbsd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: """Return vulnerability data stored in index \"openbsd\" @@ -218400,10 +213901,8 @@ async def index_openbsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218456,8 +213955,7 @@ async def index_openbsd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218506,8 +214004,7 @@ async def index_openbsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218525,7 +214022,7 @@ async def index_openbsd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openbsd\" @@ -218565,10 +214062,8 @@ async def index_openbsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218621,8 +214116,7 @@ async def index_openbsd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218666,8 +214160,7 @@ def _index_openbsd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218680,7 +214173,10 @@ def _index_openbsd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -218764,13 +214260,9 @@ def _index_openbsd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -218853,8 +214345,7 @@ async def index_opengear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218872,7 +214363,7 @@ async def index_opengear_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: """Return vulnerability data stored in index \"opengear\" @@ -218912,10 +214403,8 @@ async def index_opengear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218968,8 +214457,7 @@ async def index_opengear_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219018,8 +214506,7 @@ async def index_opengear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219037,7 +214524,7 @@ async def index_opengear_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: """Return vulnerability data stored in index \"opengear\" @@ -219077,10 +214564,8 @@ async def index_opengear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219133,8 +214618,7 @@ async def index_opengear_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219183,8 +214667,7 @@ async def index_opengear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219202,7 +214685,7 @@ async def index_opengear_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"opengear\" @@ -219242,10 +214725,8 @@ async def index_opengear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219298,8 +214779,7 @@ async def index_opengear_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219343,8 +214823,7 @@ def _index_opengear_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -219357,7 +214836,10 @@ def _index_opengear_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -219441,13 +214923,9 @@ def _index_opengear_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -219530,8 +215008,7 @@ async def index_openjdk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219549,7 +215026,7 @@ async def index_openjdk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: """Return vulnerability data stored in index \"openjdk\" @@ -219589,10 +215066,8 @@ async def index_openjdk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219645,8 +215120,7 @@ async def index_openjdk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219695,8 +215169,7 @@ async def index_openjdk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219714,7 +215187,7 @@ async def index_openjdk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: """Return vulnerability data stored in index \"openjdk\" @@ -219754,10 +215227,8 @@ async def index_openjdk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219810,8 +215281,7 @@ async def index_openjdk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219860,8 +215330,7 @@ async def index_openjdk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219879,7 +215348,7 @@ async def index_openjdk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openjdk\" @@ -219919,10 +215388,8 @@ async def index_openjdk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219975,8 +215442,7 @@ async def index_openjdk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220020,8 +215486,7 @@ def _index_openjdk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220034,7 +215499,10 @@ def _index_openjdk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -220118,13 +215586,9 @@ def _index_openjdk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -220207,8 +215671,7 @@ async def index_openssh_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220226,7 +215689,7 @@ async def index_openssh_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: """Return vulnerability data stored in index \"openssh\" @@ -220266,10 +215729,8 @@ async def index_openssh_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220322,8 +215783,7 @@ async def index_openssh_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220372,8 +215832,7 @@ async def index_openssh_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220391,7 +215850,7 @@ async def index_openssh_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: """Return vulnerability data stored in index \"openssh\" @@ -220431,10 +215890,8 @@ async def index_openssh_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220487,8 +215944,7 @@ async def index_openssh_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220537,8 +215993,7 @@ async def index_openssh_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220556,7 +216011,7 @@ async def index_openssh_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openssh\" @@ -220596,10 +216051,8 @@ async def index_openssh_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220652,8 +216105,7 @@ async def index_openssh_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220697,8 +216149,7 @@ def _index_openssh_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220711,7 +216162,10 @@ def _index_openssh_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -220795,13 +216249,9 @@ def _index_openssh_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -220884,8 +216334,7 @@ async def index_openssl_secadv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220903,7 +216352,7 @@ async def index_openssl_secadv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: """Return vulnerability data stored in index \"openssl-secadv\" @@ -220943,10 +216392,8 @@ async def index_openssl_secadv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220999,8 +216446,7 @@ async def index_openssl_secadv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221049,8 +216495,7 @@ async def index_openssl_secadv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221068,7 +216513,7 @@ async def index_openssl_secadv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: """Return vulnerability data stored in index \"openssl-secadv\" @@ -221108,10 +216553,8 @@ async def index_openssl_secadv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221164,8 +216607,7 @@ async def index_openssl_secadv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221214,8 +216656,7 @@ async def index_openssl_secadv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221233,7 +216674,7 @@ async def index_openssl_secadv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openssl-secadv\" @@ -221273,10 +216714,8 @@ async def index_openssl_secadv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221329,8 +216768,7 @@ async def index_openssl_secadv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221374,8 +216812,7 @@ def _index_openssl_secadv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -221388,7 +216825,10 @@ def _index_openssl_secadv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -221472,13 +216912,9 @@ def _index_openssl_secadv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -221561,8 +216997,7 @@ async def index_openstack_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221580,7 +217015,7 @@ async def index_openstack_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: """Return vulnerability data stored in index \"openstack\" @@ -221620,10 +217055,8 @@ async def index_openstack_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221676,8 +217109,7 @@ async def index_openstack_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221726,8 +217158,7 @@ async def index_openstack_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221745,7 +217176,7 @@ async def index_openstack_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: """Return vulnerability data stored in index \"openstack\" @@ -221785,10 +217216,8 @@ async def index_openstack_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221841,8 +217270,7 @@ async def index_openstack_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221891,8 +217319,7 @@ async def index_openstack_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221910,7 +217337,7 @@ async def index_openstack_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openstack\" @@ -221950,10 +217377,8 @@ async def index_openstack_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222006,8 +217431,7 @@ async def index_openstack_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222051,8 +217475,7 @@ def _index_openstack_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222065,7 +217488,10 @@ def _index_openstack_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -222149,13 +217575,9 @@ def _index_openstack_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -222238,8 +217660,7 @@ async def index_openwrt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222257,7 +217678,7 @@ async def index_openwrt_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: """Return vulnerability data stored in index \"openwrt\" @@ -222297,10 +217718,8 @@ async def index_openwrt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222353,8 +217772,7 @@ async def index_openwrt_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222403,8 +217821,7 @@ async def index_openwrt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222422,7 +217839,7 @@ async def index_openwrt_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: """Return vulnerability data stored in index \"openwrt\" @@ -222462,10 +217879,8 @@ async def index_openwrt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222518,8 +217933,7 @@ async def index_openwrt_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222568,8 +217982,7 @@ async def index_openwrt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222587,7 +218000,7 @@ async def index_openwrt_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openwrt\" @@ -222627,10 +218040,8 @@ async def index_openwrt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222683,8 +218094,7 @@ async def index_openwrt_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222728,8 +218138,7 @@ def _index_openwrt_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222742,7 +218151,10 @@ def _index_openwrt_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -222826,13 +218238,9 @@ def _index_openwrt_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -222915,8 +218323,7 @@ async def index_oracle_cpu_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222934,7 +218341,7 @@ async def index_oracle_cpu_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -222974,10 +218381,8 @@ async def index_oracle_cpu_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223030,8 +218435,7 @@ async def index_oracle_cpu_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223080,8 +218484,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223099,7 +218502,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -223139,10 +218542,8 @@ async def index_oracle_cpu_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223195,8 +218596,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223245,8 +218645,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223264,7 +218663,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -223304,10 +218703,8 @@ async def index_oracle_cpu_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223360,8 +218757,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223405,8 +218801,7 @@ def _index_oracle_cpu_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -223419,7 +218814,10 @@ def _index_oracle_cpu_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -223503,13 +218901,9 @@ def _index_oracle_cpu_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -223592,8 +218986,7 @@ async def index_oracle_cpu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223611,7 +219004,7 @@ async def index_oracle_cpu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223651,10 +219044,8 @@ async def index_oracle_cpu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223707,8 +219098,7 @@ async def index_oracle_cpu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223757,8 +219147,7 @@ async def index_oracle_cpu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223776,7 +219165,7 @@ async def index_oracle_cpu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223816,10 +219205,8 @@ async def index_oracle_cpu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223872,8 +219259,7 @@ async def index_oracle_cpu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223922,8 +219308,7 @@ async def index_oracle_cpu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223941,7 +219326,7 @@ async def index_oracle_cpu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223981,10 +219366,8 @@ async def index_oracle_cpu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224037,8 +219420,7 @@ async def index_oracle_cpu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224082,8 +219464,7 @@ def _index_oracle_cpu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224096,7 +219477,10 @@ def _index_oracle_cpu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -224180,13 +219564,9 @@ def _index_oracle_cpu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -224269,8 +219649,7 @@ async def index_oracle_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224288,7 +219667,7 @@ async def index_oracle_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: """Return vulnerability data stored in index \"oracle\" @@ -224328,10 +219707,8 @@ async def index_oracle_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224384,8 +219761,7 @@ async def index_oracle_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224434,8 +219810,7 @@ async def index_oracle_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224453,7 +219828,7 @@ async def index_oracle_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: """Return vulnerability data stored in index \"oracle\" @@ -224493,10 +219868,8 @@ async def index_oracle_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224549,8 +219922,7 @@ async def index_oracle_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224599,8 +219971,7 @@ async def index_oracle_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224618,7 +219989,7 @@ async def index_oracle_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle\" @@ -224658,10 +220029,8 @@ async def index_oracle_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224714,8 +220083,7 @@ async def index_oracle_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224759,8 +220127,7 @@ def _index_oracle_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224773,7 +220140,10 @@ def _index_oracle_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -224857,13 +220227,9 @@ def _index_oracle_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -224946,8 +220312,7 @@ async def index_osv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224965,7 +220330,7 @@ async def index_osv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: """Return vulnerability data stored in index \"osv\" @@ -225005,10 +220370,8 @@ async def index_osv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225061,8 +220424,7 @@ async def index_osv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225111,8 +220473,7 @@ async def index_osv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225130,7 +220491,7 @@ async def index_osv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: """Return vulnerability data stored in index \"osv\" @@ -225170,10 +220531,8 @@ async def index_osv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225226,8 +220585,7 @@ async def index_osv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225276,8 +220634,7 @@ async def index_osv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225295,7 +220652,7 @@ async def index_osv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"osv\" @@ -225335,10 +220692,8 @@ async def index_osv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225391,8 +220746,7 @@ async def index_osv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225436,8 +220790,7 @@ def _index_osv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -225450,7 +220803,10 @@ def _index_osv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -225534,13 +220890,9 @@ def _index_osv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -225623,8 +220975,7 @@ async def index_otrs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225642,7 +220993,7 @@ async def index_otrs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: """Return vulnerability data stored in index \"otrs\" @@ -225682,10 +221033,8 @@ async def index_otrs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225738,8 +221087,7 @@ async def index_otrs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225788,8 +221136,7 @@ async def index_otrs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225807,7 +221154,7 @@ async def index_otrs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: """Return vulnerability data stored in index \"otrs\" @@ -225847,10 +221194,8 @@ async def index_otrs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225903,8 +221248,7 @@ async def index_otrs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225953,8 +221297,7 @@ async def index_otrs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225972,7 +221315,7 @@ async def index_otrs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"otrs\" @@ -226012,10 +221355,8 @@ async def index_otrs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226068,8 +221409,7 @@ async def index_otrs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226113,8 +221453,7 @@ def _index_otrs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226127,7 +221466,10 @@ def _index_otrs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -226211,13 +221553,9 @@ def _index_otrs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -226300,8 +221638,7 @@ async def index_owncloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226319,7 +221656,7 @@ async def index_owncloud_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: """Return vulnerability data stored in index \"owncloud\" @@ -226359,10 +221696,8 @@ async def index_owncloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226415,8 +221750,7 @@ async def index_owncloud_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226465,8 +221799,7 @@ async def index_owncloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226484,7 +221817,7 @@ async def index_owncloud_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: """Return vulnerability data stored in index \"owncloud\" @@ -226524,10 +221857,8 @@ async def index_owncloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226580,8 +221911,7 @@ async def index_owncloud_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226630,8 +221960,7 @@ async def index_owncloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226649,7 +221978,7 @@ async def index_owncloud_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"owncloud\" @@ -226689,10 +222018,8 @@ async def index_owncloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226745,8 +222072,7 @@ async def index_owncloud_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226790,8 +222116,7 @@ def _index_owncloud_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226804,7 +222129,10 @@ def _index_owncloud_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -226888,13 +222216,9 @@ def _index_owncloud_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -226977,8 +222301,7 @@ async def index_packetstorm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226996,7 +222319,7 @@ async def index_packetstorm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: """Return vulnerability data stored in index \"packetstorm\" @@ -227036,10 +222359,8 @@ async def index_packetstorm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227092,8 +222413,7 @@ async def index_packetstorm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227142,8 +222462,7 @@ async def index_packetstorm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227161,7 +222480,7 @@ async def index_packetstorm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: """Return vulnerability data stored in index \"packetstorm\" @@ -227201,10 +222520,8 @@ async def index_packetstorm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227257,8 +222574,7 @@ async def index_packetstorm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227307,8 +222623,7 @@ async def index_packetstorm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227326,7 +222641,7 @@ async def index_packetstorm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"packetstorm\" @@ -227366,10 +222681,8 @@ async def index_packetstorm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227422,8 +222735,7 @@ async def index_packetstorm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227467,8 +222779,7 @@ def _index_packetstorm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -227481,7 +222792,10 @@ def _index_packetstorm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -227565,13 +222879,9 @@ def _index_packetstorm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -227654,8 +222964,7 @@ async def index_palantir_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227673,7 +222982,7 @@ async def index_palantir_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: """Return vulnerability data stored in index \"palantir\" @@ -227713,10 +223022,8 @@ async def index_palantir_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227769,8 +223076,7 @@ async def index_palantir_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227819,8 +223125,7 @@ async def index_palantir_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227838,7 +223143,7 @@ async def index_palantir_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: """Return vulnerability data stored in index \"palantir\" @@ -227878,10 +223183,8 @@ async def index_palantir_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227934,8 +223237,7 @@ async def index_palantir_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227984,8 +223286,7 @@ async def index_palantir_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228003,7 +223304,7 @@ async def index_palantir_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"palantir\" @@ -228043,10 +223344,8 @@ async def index_palantir_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228099,8 +223398,7 @@ async def index_palantir_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228144,8 +223442,7 @@ def _index_palantir_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228158,7 +223455,10 @@ def _index_palantir_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -228242,13 +223542,9 @@ def _index_palantir_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -228331,8 +223627,7 @@ async def index_palo_alto_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228350,7 +223645,7 @@ async def index_palo_alto_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: """Return vulnerability data stored in index \"palo-alto\" @@ -228390,10 +223685,8 @@ async def index_palo_alto_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228446,8 +223739,7 @@ async def index_palo_alto_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228496,8 +223788,7 @@ async def index_palo_alto_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228515,7 +223806,7 @@ async def index_palo_alto_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"palo-alto\" @@ -228555,10 +223846,8 @@ async def index_palo_alto_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228611,8 +223900,7 @@ async def index_palo_alto_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228661,8 +223949,7 @@ async def index_palo_alto_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228680,7 +223967,7 @@ async def index_palo_alto_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"palo-alto\" @@ -228720,10 +224007,8 @@ async def index_palo_alto_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228776,8 +224061,7 @@ async def index_palo_alto_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228821,8 +224105,7 @@ def _index_palo_alto_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228835,7 +224118,10 @@ def _index_palo_alto_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -228919,13 +224205,9 @@ def _index_palo_alto_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -229008,8 +224290,7 @@ async def index_panasonic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229027,7 +224308,7 @@ async def index_panasonic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: """Return vulnerability data stored in index \"panasonic\" @@ -229067,10 +224348,8 @@ async def index_panasonic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229123,8 +224402,7 @@ async def index_panasonic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229173,8 +224451,7 @@ async def index_panasonic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229192,7 +224469,7 @@ async def index_panasonic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: """Return vulnerability data stored in index \"panasonic\" @@ -229232,10 +224509,8 @@ async def index_panasonic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229288,8 +224563,7 @@ async def index_panasonic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229338,8 +224612,7 @@ async def index_panasonic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229357,7 +224630,7 @@ async def index_panasonic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"panasonic\" @@ -229397,10 +224670,8 @@ async def index_panasonic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229453,8 +224724,7 @@ async def index_panasonic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229498,8 +224768,7 @@ def _index_panasonic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -229512,7 +224781,10 @@ def _index_panasonic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -229596,13 +224868,9 @@ def _index_panasonic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -229685,8 +224953,7 @@ async def index_papercut_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229704,7 +224971,7 @@ async def index_papercut_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: """Return vulnerability data stored in index \"papercut\" @@ -229744,10 +225011,8 @@ async def index_papercut_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229800,8 +225065,7 @@ async def index_papercut_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229850,8 +225114,7 @@ async def index_papercut_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229869,7 +225132,7 @@ async def index_papercut_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: """Return vulnerability data stored in index \"papercut\" @@ -229909,10 +225172,8 @@ async def index_papercut_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229965,8 +225226,7 @@ async def index_papercut_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230015,8 +225275,7 @@ async def index_papercut_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230034,7 +225293,7 @@ async def index_papercut_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"papercut\" @@ -230074,10 +225333,8 @@ async def index_papercut_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230130,8 +225387,7 @@ async def index_papercut_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230175,8 +225431,7 @@ def _index_papercut_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230189,7 +225444,10 @@ def _index_papercut_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -230273,13 +225531,9 @@ def _index_papercut_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -230362,8 +225616,7 @@ async def index_pega_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230381,7 +225634,7 @@ async def index_pega_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: """Return vulnerability data stored in index \"pega\" @@ -230421,10 +225674,8 @@ async def index_pega_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230477,8 +225728,7 @@ async def index_pega_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230527,8 +225777,7 @@ async def index_pega_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230546,7 +225795,7 @@ async def index_pega_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: """Return vulnerability data stored in index \"pega\" @@ -230586,10 +225835,8 @@ async def index_pega_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230642,8 +225889,7 @@ async def index_pega_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230692,8 +225938,7 @@ async def index_pega_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230711,7 +225956,7 @@ async def index_pega_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pega\" @@ -230751,10 +225996,8 @@ async def index_pega_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230807,8 +226050,7 @@ async def index_pega_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230852,8 +226094,7 @@ def _index_pega_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230866,7 +226107,10 @@ def _index_pega_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -230950,13 +226194,9 @@ def _index_pega_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -231039,8 +226279,7 @@ async def index_philips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231058,7 +226297,7 @@ async def index_philips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"philips\" @@ -231098,10 +226337,8 @@ async def index_philips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231154,8 +226391,7 @@ async def index_philips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231204,8 +226440,7 @@ async def index_philips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231223,7 +226458,7 @@ async def index_philips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"philips\" @@ -231263,10 +226498,8 @@ async def index_philips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231319,8 +226552,7 @@ async def index_philips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231369,8 +226601,7 @@ async def index_philips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231388,7 +226619,7 @@ async def index_philips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"philips\" @@ -231428,10 +226659,8 @@ async def index_philips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231484,8 +226713,7 @@ async def index_philips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231529,8 +226757,7 @@ def _index_philips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -231543,7 +226770,10 @@ def _index_philips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -231627,13 +226857,9 @@ def _index_philips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -231716,8 +226942,7 @@ async def index_phoenix_contact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231735,7 +226960,7 @@ async def index_phoenix_contact_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: """Return vulnerability data stored in index \"phoenix-contact\" @@ -231775,10 +227000,8 @@ async def index_phoenix_contact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231831,8 +227054,7 @@ async def index_phoenix_contact_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231881,8 +227103,7 @@ async def index_phoenix_contact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231900,7 +227121,7 @@ async def index_phoenix_contact_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"phoenix-contact\" @@ -231940,10 +227161,8 @@ async def index_phoenix_contact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231996,8 +227215,7 @@ async def index_phoenix_contact_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232046,8 +227264,7 @@ async def index_phoenix_contact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232065,7 +227282,7 @@ async def index_phoenix_contact_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"phoenix-contact\" @@ -232105,10 +227322,8 @@ async def index_phoenix_contact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232161,8 +227376,7 @@ async def index_phoenix_contact_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232206,8 +227420,7 @@ def _index_phoenix_contact_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232220,7 +227433,10 @@ def _index_phoenix_contact_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -232304,13 +227520,9 @@ def _index_phoenix_contact_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -232393,8 +227605,7 @@ async def index_php_my_admin_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232412,7 +227623,7 @@ async def index_php_my_admin_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: """Return vulnerability data stored in index \"php-my-admin\" @@ -232452,10 +227663,8 @@ async def index_php_my_admin_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232508,8 +227717,7 @@ async def index_php_my_admin_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232558,8 +227766,7 @@ async def index_php_my_admin_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232577,7 +227784,7 @@ async def index_php_my_admin_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: """Return vulnerability data stored in index \"php-my-admin\" @@ -232617,10 +227824,8 @@ async def index_php_my_admin_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232673,8 +227878,7 @@ async def index_php_my_admin_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232723,8 +227927,7 @@ async def index_php_my_admin_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232742,7 +227945,7 @@ async def index_php_my_admin_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"php-my-admin\" @@ -232782,10 +227985,8 @@ async def index_php_my_admin_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232838,8 +228039,7 @@ async def index_php_my_admin_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232883,8 +228083,7 @@ def _index_php_my_admin_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232897,7 +228096,10 @@ def _index_php_my_admin_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -232981,13 +228183,9 @@ def _index_php_my_admin_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -233070,8 +228268,7 @@ async def index_pkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233089,7 +228286,7 @@ async def index_pkcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: """Return vulnerability data stored in index \"pkcert\" @@ -233129,10 +228326,8 @@ async def index_pkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233185,8 +228380,7 @@ async def index_pkcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233235,8 +228429,7 @@ async def index_pkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233254,7 +228447,7 @@ async def index_pkcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: """Return vulnerability data stored in index \"pkcert\" @@ -233294,10 +228487,8 @@ async def index_pkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233350,8 +228541,7 @@ async def index_pkcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233400,8 +228590,7 @@ async def index_pkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233419,7 +228608,7 @@ async def index_pkcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pkcert\" @@ -233459,10 +228648,8 @@ async def index_pkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233515,8 +228702,7 @@ async def index_pkcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233560,8 +228746,7 @@ def _index_pkcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -233574,7 +228759,10 @@ def _index_pkcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -233658,13 +228846,9 @@ def _index_pkcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -233747,8 +228931,7 @@ async def index_postgressql_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233766,7 +228949,7 @@ async def index_postgressql_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: """Return vulnerability data stored in index \"postgressql\" @@ -233806,10 +228989,8 @@ async def index_postgressql_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233862,8 +229043,7 @@ async def index_postgressql_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233912,8 +229092,7 @@ async def index_postgressql_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233931,7 +229110,7 @@ async def index_postgressql_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: """Return vulnerability data stored in index \"postgressql\" @@ -233971,10 +229150,8 @@ async def index_postgressql_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234027,8 +229204,7 @@ async def index_postgressql_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234077,8 +229253,7 @@ async def index_postgressql_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234096,7 +229271,7 @@ async def index_postgressql_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"postgressql\" @@ -234136,10 +229311,8 @@ async def index_postgressql_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234192,8 +229365,7 @@ async def index_postgressql_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234237,8 +229409,7 @@ def _index_postgressql_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234251,7 +229422,10 @@ def _index_postgressql_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -234335,13 +229509,9 @@ def _index_postgressql_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -234424,8 +229594,7 @@ async def index_powerdns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234443,7 +229612,7 @@ async def index_powerdns_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: """Return vulnerability data stored in index \"powerdns\" @@ -234483,10 +229652,8 @@ async def index_powerdns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234539,8 +229706,7 @@ async def index_powerdns_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234589,8 +229755,7 @@ async def index_powerdns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234608,7 +229773,7 @@ async def index_powerdns_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: """Return vulnerability data stored in index \"powerdns\" @@ -234648,10 +229813,8 @@ async def index_powerdns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234704,8 +229867,7 @@ async def index_powerdns_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234754,8 +229916,7 @@ async def index_powerdns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234773,7 +229934,7 @@ async def index_powerdns_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"powerdns\" @@ -234813,10 +229974,8 @@ async def index_powerdns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234869,8 +230028,7 @@ async def index_powerdns_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234914,8 +230072,7 @@ def _index_powerdns_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234928,7 +230085,10 @@ def _index_powerdns_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -235012,13 +230172,9 @@ def _index_powerdns_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -235101,8 +230257,7 @@ async def index_progress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235120,7 +230275,7 @@ async def index_progress_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: """Return vulnerability data stored in index \"progress\" @@ -235160,10 +230315,8 @@ async def index_progress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235216,8 +230369,7 @@ async def index_progress_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235266,8 +230418,7 @@ async def index_progress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235285,7 +230436,7 @@ async def index_progress_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: """Return vulnerability data stored in index \"progress\" @@ -235325,10 +230476,8 @@ async def index_progress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235381,8 +230530,7 @@ async def index_progress_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235431,8 +230579,7 @@ async def index_progress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235450,7 +230597,7 @@ async def index_progress_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"progress\" @@ -235490,10 +230637,8 @@ async def index_progress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235546,8 +230691,7 @@ async def index_progress_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235591,8 +230735,7 @@ def _index_progress_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235605,7 +230748,10 @@ def _index_progress_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -235689,13 +230835,9 @@ def _index_progress_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -235778,8 +230920,7 @@ async def index_proofpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235797,7 +230938,7 @@ async def index_proofpoint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: """Return vulnerability data stored in index \"proofpoint\" @@ -235837,10 +230978,8 @@ async def index_proofpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235893,8 +231032,7 @@ async def index_proofpoint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235943,8 +231081,7 @@ async def index_proofpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235962,7 +231099,7 @@ async def index_proofpoint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: """Return vulnerability data stored in index \"proofpoint\" @@ -236002,10 +231139,8 @@ async def index_proofpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236058,8 +231193,7 @@ async def index_proofpoint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236108,8 +231242,7 @@ async def index_proofpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236127,7 +231260,7 @@ async def index_proofpoint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"proofpoint\" @@ -236167,10 +231300,8 @@ async def index_proofpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236223,8 +231354,7 @@ async def index_proofpoint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236268,8 +231398,7 @@ def _index_proofpoint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236282,7 +231411,10 @@ def _index_proofpoint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -236366,13 +231498,9 @@ def _index_proofpoint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -236455,8 +231583,7 @@ async def index_ptc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236474,7 +231601,7 @@ async def index_ptc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: """Return vulnerability data stored in index \"ptc\" @@ -236514,10 +231641,8 @@ async def index_ptc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236570,8 +231695,7 @@ async def index_ptc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236620,8 +231744,7 @@ async def index_ptc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236639,7 +231762,7 @@ async def index_ptc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: """Return vulnerability data stored in index \"ptc\" @@ -236679,10 +231802,8 @@ async def index_ptc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236735,8 +231856,7 @@ async def index_ptc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236785,8 +231905,7 @@ async def index_ptc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236804,7 +231923,7 @@ async def index_ptc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ptc\" @@ -236844,10 +231963,8 @@ async def index_ptc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236900,8 +232017,7 @@ async def index_ptc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236945,8 +232061,7 @@ def _index_ptc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236959,7 +232074,10 @@ def _index_ptc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -237043,13 +232161,9 @@ def _index_ptc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -237132,8 +232246,7 @@ async def index_pub_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237151,7 +232264,7 @@ async def index_pub_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"pub\" @@ -237191,10 +232304,8 @@ async def index_pub_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237247,8 +232358,7 @@ async def index_pub_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237297,8 +232407,7 @@ async def index_pub_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237316,7 +232425,7 @@ async def index_pub_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"pub\" @@ -237356,10 +232465,8 @@ async def index_pub_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237412,8 +232519,7 @@ async def index_pub_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237462,8 +232568,7 @@ async def index_pub_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237481,7 +232586,7 @@ async def index_pub_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pub\" @@ -237521,10 +232626,8 @@ async def index_pub_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237577,8 +232680,7 @@ async def index_pub_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237622,8 +232724,7 @@ def _index_pub_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237636,7 +232737,10 @@ def _index_pub_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -237720,13 +232824,9 @@ def _index_pub_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -237809,8 +232909,7 @@ async def index_pure_storage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237828,7 +232927,7 @@ async def index_pure_storage_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: """Return vulnerability data stored in index \"pure-storage\" @@ -237868,10 +232967,8 @@ async def index_pure_storage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237924,8 +233021,7 @@ async def index_pure_storage_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237974,8 +233070,7 @@ async def index_pure_storage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237993,7 +233088,7 @@ async def index_pure_storage_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: """Return vulnerability data stored in index \"pure-storage\" @@ -238033,10 +233128,8 @@ async def index_pure_storage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238089,8 +233182,7 @@ async def index_pure_storage_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238139,8 +233231,7 @@ async def index_pure_storage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238158,7 +233249,7 @@ async def index_pure_storage_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pure-storage\" @@ -238198,10 +233289,8 @@ async def index_pure_storage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238254,8 +233343,7 @@ async def index_pure_storage_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238299,8 +233387,7 @@ def _index_pure_storage_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238313,7 +233400,10 @@ def _index_pure_storage_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -238397,13 +233487,9 @@ def _index_pure_storage_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -238486,8 +233572,7 @@ async def index_pypa_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238505,7 +233590,7 @@ async def index_pypa_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238545,10 +233630,8 @@ async def index_pypa_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238601,8 +233684,7 @@ async def index_pypa_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238651,8 +233733,7 @@ async def index_pypa_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238670,7 +233751,7 @@ async def index_pypa_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238710,10 +233791,8 @@ async def index_pypa_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238766,8 +233845,7 @@ async def index_pypa_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238816,8 +233894,7 @@ async def index_pypa_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238835,7 +233912,7 @@ async def index_pypa_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238875,10 +233952,8 @@ async def index_pypa_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238931,8 +234006,7 @@ async def index_pypa_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238976,8 +234050,7 @@ def _index_pypa_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238990,7 +234063,10 @@ def _index_pypa_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -239074,13 +234150,9 @@ def _index_pypa_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -239163,8 +234235,7 @@ async def index_pypi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239182,7 +234253,7 @@ async def index_pypi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"pypi\" @@ -239222,10 +234293,8 @@ async def index_pypi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239278,8 +234347,7 @@ async def index_pypi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239328,8 +234396,7 @@ async def index_pypi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239347,7 +234414,7 @@ async def index_pypi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"pypi\" @@ -239387,10 +234454,8 @@ async def index_pypi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239443,8 +234508,7 @@ async def index_pypi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239493,8 +234557,7 @@ async def index_pypi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239512,7 +234575,7 @@ async def index_pypi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pypi\" @@ -239552,10 +234615,8 @@ async def index_pypi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239608,8 +234669,7 @@ async def index_pypi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239653,8 +234713,7 @@ def _index_pypi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239667,7 +234726,10 @@ def _index_pypi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -239751,13 +234813,9 @@ def _index_pypi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -239840,8 +234898,7 @@ async def index_qnap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239859,7 +234916,7 @@ async def index_qnap_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: """Return vulnerability data stored in index \"qnap\" @@ -239899,10 +234956,8 @@ async def index_qnap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239955,8 +235010,7 @@ async def index_qnap_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240005,8 +235059,7 @@ async def index_qnap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240024,7 +235077,7 @@ async def index_qnap_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"qnap\" @@ -240064,10 +235117,8 @@ async def index_qnap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240120,8 +235171,7 @@ async def index_qnap_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240170,8 +235220,7 @@ async def index_qnap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240189,7 +235238,7 @@ async def index_qnap_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qnap\" @@ -240229,10 +235278,8 @@ async def index_qnap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240285,8 +235332,7 @@ async def index_qnap_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240330,8 +235376,7 @@ def _index_qnap_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -240344,7 +235389,10 @@ def _index_qnap_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -240428,13 +235476,9 @@ def _index_qnap_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -240517,8 +235561,7 @@ async def index_qqids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240536,7 +235579,7 @@ async def index_qqids_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: """Return vulnerability data stored in index \"qqids\" @@ -240576,10 +235619,8 @@ async def index_qqids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240632,8 +235673,7 @@ async def index_qqids_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240682,8 +235722,7 @@ async def index_qqids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240701,7 +235740,7 @@ async def index_qqids_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: """Return vulnerability data stored in index \"qqids\" @@ -240741,10 +235780,8 @@ async def index_qqids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240797,8 +235834,7 @@ async def index_qqids_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240847,8 +235883,7 @@ async def index_qqids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240866,7 +235901,7 @@ async def index_qqids_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qqids\" @@ -240906,10 +235941,8 @@ async def index_qqids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240962,8 +235995,7 @@ async def index_qqids_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241007,8 +236039,7 @@ def _index_qqids_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241021,7 +236052,10 @@ def _index_qqids_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -241105,13 +236139,9 @@ def _index_qqids_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -241194,8 +236224,7 @@ async def index_qualcomm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241213,7 +236242,7 @@ async def index_qualcomm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: """Return vulnerability data stored in index \"qualcomm\" @@ -241253,10 +236282,8 @@ async def index_qualcomm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241309,8 +236336,7 @@ async def index_qualcomm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241359,8 +236385,7 @@ async def index_qualcomm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241378,7 +236403,7 @@ async def index_qualcomm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: """Return vulnerability data stored in index \"qualcomm\" @@ -241418,10 +236443,8 @@ async def index_qualcomm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241474,8 +236497,7 @@ async def index_qualcomm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241524,8 +236546,7 @@ async def index_qualcomm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241543,7 +236564,7 @@ async def index_qualcomm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualcomm\" @@ -241583,10 +236604,8 @@ async def index_qualcomm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241639,8 +236658,7 @@ async def index_qualcomm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241684,8 +236702,7 @@ def _index_qualcomm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241698,7 +236715,10 @@ def _index_qualcomm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -241782,13 +236802,9 @@ def _index_qualcomm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -241871,8 +236887,7 @@ async def index_qualys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241890,7 +236905,7 @@ async def index_qualys_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: """Return vulnerability data stored in index \"qualys\" @@ -241930,10 +236945,8 @@ async def index_qualys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241986,8 +236999,7 @@ async def index_qualys_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242036,8 +237048,7 @@ async def index_qualys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242055,7 +237066,7 @@ async def index_qualys_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: """Return vulnerability data stored in index \"qualys\" @@ -242095,10 +237106,8 @@ async def index_qualys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242151,8 +237160,7 @@ async def index_qualys_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242201,8 +237209,7 @@ async def index_qualys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242220,7 +237227,7 @@ async def index_qualys_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualys\" @@ -242260,10 +237267,8 @@ async def index_qualys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242316,8 +237321,7 @@ async def index_qualys_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242361,8 +237365,7 @@ def _index_qualys_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -242375,7 +237378,10 @@ def _index_qualys_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -242459,13 +237465,9 @@ def _index_qualys_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -242548,8 +237550,7 @@ async def index_qualys_qids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242567,7 +237568,7 @@ async def index_qualys_qids_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: """Return vulnerability data stored in index \"qualys-qids\" @@ -242607,10 +237608,8 @@ async def index_qualys_qids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242663,8 +237662,7 @@ async def index_qualys_qids_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242713,8 +237711,7 @@ async def index_qualys_qids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242732,7 +237729,7 @@ async def index_qualys_qids_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: """Return vulnerability data stored in index \"qualys-qids\" @@ -242772,10 +237769,8 @@ async def index_qualys_qids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242828,8 +237823,7 @@ async def index_qualys_qids_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242878,8 +237872,7 @@ async def index_qualys_qids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242897,7 +237890,7 @@ async def index_qualys_qids_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualys-qids\" @@ -242937,10 +237930,8 @@ async def index_qualys_qids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242993,8 +237984,7 @@ async def index_qualys_qids_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243038,8 +238028,7 @@ def _index_qualys_qids_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243052,7 +238041,10 @@ def _index_qualys_qids_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -243136,13 +238128,9 @@ def _index_qualys_qids_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -243225,8 +238213,7 @@ async def index_qubes_qsb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243244,7 +238231,7 @@ async def index_qubes_qsb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243284,10 +238271,8 @@ async def index_qubes_qsb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243340,8 +238325,7 @@ async def index_qubes_qsb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243390,8 +238374,7 @@ async def index_qubes_qsb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243409,7 +238392,7 @@ async def index_qubes_qsb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243449,10 +238432,8 @@ async def index_qubes_qsb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243505,8 +238486,7 @@ async def index_qubes_qsb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243555,8 +238535,7 @@ async def index_qubes_qsb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243574,7 +238553,7 @@ async def index_qubes_qsb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243614,10 +238593,8 @@ async def index_qubes_qsb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243670,8 +238647,7 @@ async def index_qubes_qsb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243715,8 +238691,7 @@ def _index_qubes_qsb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243729,7 +238704,10 @@ def _index_qubes_qsb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -243813,13 +238791,9 @@ def _index_qubes_qsb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -243902,8 +238876,7 @@ async def index_ransomware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243921,7 +238894,7 @@ async def index_ransomware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: """Return vulnerability data stored in index \"ransomware\" @@ -243961,10 +238934,8 @@ async def index_ransomware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244017,8 +238988,7 @@ async def index_ransomware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244067,8 +239037,7 @@ async def index_ransomware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244086,7 +239055,7 @@ async def index_ransomware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: """Return vulnerability data stored in index \"ransomware\" @@ -244126,10 +239095,8 @@ async def index_ransomware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244182,8 +239149,7 @@ async def index_ransomware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244232,8 +239198,7 @@ async def index_ransomware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244251,7 +239216,7 @@ async def index_ransomware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ransomware\" @@ -244291,10 +239256,8 @@ async def index_ransomware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244347,8 +239310,7 @@ async def index_ransomware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244392,8 +239354,7 @@ def _index_ransomware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -244406,7 +239367,10 @@ def _index_ransomware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -244490,13 +239454,9 @@ def _index_ransomware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -244579,8 +239539,7 @@ async def index_red_lion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244598,7 +239557,7 @@ async def index_red_lion_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: """Return vulnerability data stored in index \"red-lion\" @@ -244638,10 +239597,8 @@ async def index_red_lion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244694,8 +239651,7 @@ async def index_red_lion_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244744,8 +239700,7 @@ async def index_red_lion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244763,7 +239718,7 @@ async def index_red_lion_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: """Return vulnerability data stored in index \"red-lion\" @@ -244803,10 +239758,8 @@ async def index_red_lion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244859,8 +239812,7 @@ async def index_red_lion_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244909,8 +239861,7 @@ async def index_red_lion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244928,7 +239879,7 @@ async def index_red_lion_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"red-lion\" @@ -244968,10 +239919,8 @@ async def index_red_lion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245024,8 +239973,7 @@ async def index_red_lion_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245069,8 +240017,7 @@ def _index_red_lion_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245083,7 +240030,10 @@ def _index_red_lion_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -245167,13 +240117,9 @@ def _index_red_lion_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -245256,8 +240202,7 @@ async def index_redhat_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245275,7 +240220,7 @@ async def index_redhat_cves_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: """Return vulnerability data stored in index \"redhat-cves\" @@ -245315,10 +240260,8 @@ async def index_redhat_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245371,8 +240314,7 @@ async def index_redhat_cves_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245421,8 +240363,7 @@ async def index_redhat_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245440,7 +240381,7 @@ async def index_redhat_cves_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: """Return vulnerability data stored in index \"redhat-cves\" @@ -245480,10 +240421,8 @@ async def index_redhat_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245536,8 +240475,7 @@ async def index_redhat_cves_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245586,8 +240524,7 @@ async def index_redhat_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245605,7 +240542,7 @@ async def index_redhat_cves_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"redhat-cves\" @@ -245645,10 +240582,8 @@ async def index_redhat_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245701,8 +240636,7 @@ async def index_redhat_cves_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245746,8 +240680,7 @@ def _index_redhat_cves_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245760,7 +240693,10 @@ def _index_redhat_cves_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -245844,13 +240780,9 @@ def _index_redhat_cves_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -245933,8 +240865,7 @@ async def index_redhat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245952,7 +240883,7 @@ async def index_redhat_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: """Return vulnerability data stored in index \"redhat\" @@ -245992,10 +240923,8 @@ async def index_redhat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246048,8 +240977,7 @@ async def index_redhat_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246098,8 +241026,7 @@ async def index_redhat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246117,7 +241044,7 @@ async def index_redhat_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: """Return vulnerability data stored in index \"redhat\" @@ -246157,10 +241084,8 @@ async def index_redhat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246213,8 +241138,7 @@ async def index_redhat_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246263,8 +241187,7 @@ async def index_redhat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246282,7 +241205,7 @@ async def index_redhat_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"redhat\" @@ -246322,10 +241245,8 @@ async def index_redhat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246378,8 +241299,7 @@ async def index_redhat_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246423,8 +241343,7 @@ def _index_redhat_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -246437,7 +241356,10 @@ def _index_redhat_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -246521,13 +241443,9 @@ def _index_redhat_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -246610,8 +241528,7 @@ async def index_renesas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246629,7 +241546,7 @@ async def index_renesas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: """Return vulnerability data stored in index \"renesas\" @@ -246669,10 +241586,8 @@ async def index_renesas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246725,8 +241640,7 @@ async def index_renesas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246775,8 +241689,7 @@ async def index_renesas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246794,7 +241707,7 @@ async def index_renesas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: """Return vulnerability data stored in index \"renesas\" @@ -246834,10 +241747,8 @@ async def index_renesas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246890,8 +241801,7 @@ async def index_renesas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246940,8 +241850,7 @@ async def index_renesas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246959,7 +241868,7 @@ async def index_renesas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"renesas\" @@ -246999,10 +241908,8 @@ async def index_renesas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247055,8 +241962,7 @@ async def index_renesas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247100,8 +242006,7 @@ def _index_renesas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247114,7 +242019,10 @@ def _index_renesas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -247198,13 +242106,9 @@ def _index_renesas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -247287,8 +242191,7 @@ async def index_revive_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247306,7 +242209,7 @@ async def index_revive_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: """Return vulnerability data stored in index \"revive\" @@ -247346,10 +242249,8 @@ async def index_revive_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247402,8 +242303,7 @@ async def index_revive_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247452,8 +242352,7 @@ async def index_revive_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247471,7 +242370,7 @@ async def index_revive_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: """Return vulnerability data stored in index \"revive\" @@ -247511,10 +242410,8 @@ async def index_revive_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247567,8 +242464,7 @@ async def index_revive_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247617,8 +242513,7 @@ async def index_revive_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247636,7 +242531,7 @@ async def index_revive_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"revive\" @@ -247676,10 +242571,8 @@ async def index_revive_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247732,8 +242625,7 @@ async def index_revive_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247777,8 +242669,7 @@ def _index_revive_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247791,7 +242682,10 @@ def _index_revive_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -247875,13 +242769,9 @@ def _index_revive_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -247964,8 +242854,7 @@ async def index_roche_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247983,7 +242872,7 @@ async def index_roche_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: """Return vulnerability data stored in index \"roche\" @@ -248023,10 +242912,8 @@ async def index_roche_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248079,8 +242966,7 @@ async def index_roche_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248129,8 +243015,7 @@ async def index_roche_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248148,7 +243033,7 @@ async def index_roche_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: """Return vulnerability data stored in index \"roche\" @@ -248188,10 +243073,8 @@ async def index_roche_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248244,8 +243127,7 @@ async def index_roche_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248294,8 +243176,7 @@ async def index_roche_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248313,7 +243194,7 @@ async def index_roche_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"roche\" @@ -248353,10 +243234,8 @@ async def index_roche_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248409,8 +243288,7 @@ async def index_roche_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248454,8 +243332,7 @@ def _index_roche_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -248468,7 +243345,10 @@ def _index_roche_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -248552,13 +243432,9 @@ def _index_roche_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -248641,8 +243517,7 @@ async def index_rockwell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248660,7 +243535,7 @@ async def index_rockwell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: """Return vulnerability data stored in index \"rockwell\" @@ -248700,10 +243575,8 @@ async def index_rockwell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248756,8 +243629,7 @@ async def index_rockwell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248806,8 +243678,7 @@ async def index_rockwell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248825,7 +243696,7 @@ async def index_rockwell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: """Return vulnerability data stored in index \"rockwell\" @@ -248865,10 +243736,8 @@ async def index_rockwell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248921,8 +243790,7 @@ async def index_rockwell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248971,8 +243839,7 @@ async def index_rockwell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248990,7 +243857,7 @@ async def index_rockwell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rockwell\" @@ -249030,10 +243897,8 @@ async def index_rockwell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249086,8 +243951,7 @@ async def index_rockwell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249131,8 +243995,7 @@ def _index_rockwell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249145,7 +244008,10 @@ def _index_rockwell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -249229,13 +244095,9 @@ def _index_rockwell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -249318,8 +244180,7 @@ async def index_rocky_errata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249337,7 +244198,7 @@ async def index_rocky_errata_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: """Return vulnerability data stored in index \"rocky-errata\" @@ -249377,10 +244238,8 @@ async def index_rocky_errata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249433,8 +244292,7 @@ async def index_rocky_errata_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249483,8 +244341,7 @@ async def index_rocky_errata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249502,7 +244359,7 @@ async def index_rocky_errata_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: """Return vulnerability data stored in index \"rocky-errata\" @@ -249542,10 +244399,8 @@ async def index_rocky_errata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249598,8 +244453,7 @@ async def index_rocky_errata_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249648,8 +244502,7 @@ async def index_rocky_errata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249667,7 +244520,7 @@ async def index_rocky_errata_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky-errata\" @@ -249707,10 +244560,8 @@ async def index_rocky_errata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249763,8 +244614,7 @@ async def index_rocky_errata_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249808,8 +244658,7 @@ def _index_rocky_errata_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249822,7 +244671,10 @@ def _index_rocky_errata_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -249906,13 +244758,9 @@ def _index_rocky_errata_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -249995,8 +244843,7 @@ async def index_rocky_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250014,7 +244861,7 @@ async def index_rocky_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: """Return vulnerability data stored in index \"rocky\" @@ -250054,10 +244901,8 @@ async def index_rocky_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250110,8 +244955,7 @@ async def index_rocky_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250160,8 +245004,7 @@ async def index_rocky_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250179,7 +245022,7 @@ async def index_rocky_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: """Return vulnerability data stored in index \"rocky\" @@ -250219,10 +245062,8 @@ async def index_rocky_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250275,8 +245116,7 @@ async def index_rocky_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250325,8 +245165,7 @@ async def index_rocky_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250344,7 +245183,7 @@ async def index_rocky_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky\" @@ -250384,10 +245223,8 @@ async def index_rocky_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250440,8 +245277,7 @@ async def index_rocky_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250485,8 +245321,7 @@ def _index_rocky_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -250499,7 +245334,10 @@ def _index_rocky_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -250583,13 +245421,9 @@ def _index_rocky_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -250672,8 +245506,7 @@ async def index_rocky_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250691,7 +245524,7 @@ async def index_rocky_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"rocky-purls\" @@ -250731,10 +245564,8 @@ async def index_rocky_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250787,8 +245618,7 @@ async def index_rocky_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250837,8 +245667,7 @@ async def index_rocky_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250856,7 +245685,7 @@ async def index_rocky_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"rocky-purls\" @@ -250896,10 +245725,8 @@ async def index_rocky_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250952,8 +245779,7 @@ async def index_rocky_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251002,8 +245828,7 @@ async def index_rocky_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251021,7 +245846,7 @@ async def index_rocky_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky-purls\" @@ -251061,10 +245886,8 @@ async def index_rocky_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251117,8 +245940,7 @@ async def index_rocky_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251162,8 +245984,7 @@ def _index_rocky_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251176,7 +245997,10 @@ def _index_rocky_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -251260,13 +246084,9 @@ def _index_rocky_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -251349,8 +246169,7 @@ async def index_rsync_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251368,7 +246187,7 @@ async def index_rsync_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: """Return vulnerability data stored in index \"rsync\" @@ -251408,10 +246227,8 @@ async def index_rsync_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251464,8 +246281,7 @@ async def index_rsync_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251514,8 +246330,7 @@ async def index_rsync_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251533,7 +246348,7 @@ async def index_rsync_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: """Return vulnerability data stored in index \"rsync\" @@ -251573,10 +246388,8 @@ async def index_rsync_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251629,8 +246442,7 @@ async def index_rsync_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251679,8 +246491,7 @@ async def index_rsync_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251698,7 +246509,7 @@ async def index_rsync_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rsync\" @@ -251738,10 +246549,8 @@ async def index_rsync_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251794,8 +246603,7 @@ async def index_rsync_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251839,8 +246647,7 @@ def _index_rsync_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251853,7 +246660,10 @@ def _index_rsync_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -251937,13 +246747,9 @@ def _index_rsync_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -252026,8 +246832,7 @@ async def index_ruckus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252045,7 +246850,7 @@ async def index_ruckus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: """Return vulnerability data stored in index \"ruckus\" @@ -252085,10 +246890,8 @@ async def index_ruckus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252141,8 +246944,7 @@ async def index_ruckus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252191,8 +246993,7 @@ async def index_ruckus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252210,7 +247011,7 @@ async def index_ruckus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: """Return vulnerability data stored in index \"ruckus\" @@ -252250,10 +247051,8 @@ async def index_ruckus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252306,8 +247105,7 @@ async def index_ruckus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252356,8 +247154,7 @@ async def index_ruckus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252375,7 +247172,7 @@ async def index_ruckus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ruckus\" @@ -252415,10 +247212,8 @@ async def index_ruckus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252471,8 +247266,7 @@ async def index_ruckus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252516,8 +247310,7 @@ def _index_ruckus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -252530,7 +247323,10 @@ def _index_ruckus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -252614,13 +247410,9 @@ def _index_ruckus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -252703,8 +247495,7 @@ async def index_rustsec_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252722,7 +247513,7 @@ async def index_rustsec_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -252762,10 +247553,8 @@ async def index_rustsec_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252818,8 +247607,7 @@ async def index_rustsec_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252868,8 +247656,7 @@ async def index_rustsec_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252887,7 +247674,7 @@ async def index_rustsec_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -252927,10 +247714,8 @@ async def index_rustsec_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252983,8 +247768,7 @@ async def index_rustsec_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253033,8 +247817,7 @@ async def index_rustsec_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253052,7 +247835,7 @@ async def index_rustsec_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -253092,10 +247875,8 @@ async def index_rustsec_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253148,8 +247929,7 @@ async def index_rustsec_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253193,8 +247973,7 @@ def _index_rustsec_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253207,7 +247986,10 @@ def _index_rustsec_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -253291,13 +248073,9 @@ def _index_rustsec_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -253380,8 +248158,7 @@ async def index_sacert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253399,7 +248176,7 @@ async def index_sacert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"sacert\" @@ -253439,10 +248216,8 @@ async def index_sacert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253495,8 +248270,7 @@ async def index_sacert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253545,8 +248319,7 @@ async def index_sacert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253564,7 +248337,7 @@ async def index_sacert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"sacert\" @@ -253604,10 +248377,8 @@ async def index_sacert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253660,8 +248431,7 @@ async def index_sacert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253710,8 +248480,7 @@ async def index_sacert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253729,7 +248498,7 @@ async def index_sacert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sacert\" @@ -253769,10 +248538,8 @@ async def index_sacert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253825,8 +248592,7 @@ async def index_sacert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253870,8 +248636,7 @@ def _index_sacert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253884,7 +248649,10 @@ def _index_sacert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -253968,13 +248736,9 @@ def _index_sacert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -254057,8 +248821,7 @@ async def index_safran_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254076,7 +248839,7 @@ async def index_safran_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: """Return vulnerability data stored in index \"safran\" @@ -254116,10 +248879,8 @@ async def index_safran_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254172,8 +248933,7 @@ async def index_safran_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254222,8 +248982,7 @@ async def index_safran_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254241,7 +249000,7 @@ async def index_safran_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: """Return vulnerability data stored in index \"safran\" @@ -254281,10 +249040,8 @@ async def index_safran_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254337,8 +249094,7 @@ async def index_safran_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254387,8 +249143,7 @@ async def index_safran_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254406,7 +249161,7 @@ async def index_safran_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"safran\" @@ -254446,10 +249201,8 @@ async def index_safran_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254502,8 +249255,7 @@ async def index_safran_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254547,8 +249299,7 @@ def _index_safran_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -254561,7 +249312,10 @@ def _index_safran_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -254645,13 +249399,9 @@ def _index_safran_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -254734,8 +249484,7 @@ async def index_saint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254753,7 +249502,7 @@ async def index_saint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: """Return vulnerability data stored in index \"saint\" @@ -254793,10 +249542,8 @@ async def index_saint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254849,8 +249596,7 @@ async def index_saint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254899,8 +249645,7 @@ async def index_saint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254918,7 +249663,7 @@ async def index_saint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: """Return vulnerability data stored in index \"saint\" @@ -254958,10 +249703,8 @@ async def index_saint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255014,8 +249757,7 @@ async def index_saint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255064,8 +249806,7 @@ async def index_saint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255083,7 +249824,7 @@ async def index_saint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"saint\" @@ -255123,10 +249864,8 @@ async def index_saint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255179,8 +249918,7 @@ async def index_saint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255224,8 +249962,7 @@ def _index_saint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255238,7 +249975,10 @@ def _index_saint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -255322,13 +250062,9 @@ def _index_saint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -255411,8 +250147,7 @@ async def index_salesforce_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255430,7 +250165,7 @@ async def index_salesforce_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: """Return vulnerability data stored in index \"salesforce\" @@ -255470,10 +250205,8 @@ async def index_salesforce_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255526,8 +250259,7 @@ async def index_salesforce_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255576,8 +250308,7 @@ async def index_salesforce_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255595,7 +250326,7 @@ async def index_salesforce_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: """Return vulnerability data stored in index \"salesforce\" @@ -255635,10 +250366,8 @@ async def index_salesforce_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255691,8 +250420,7 @@ async def index_salesforce_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255741,8 +250469,7 @@ async def index_salesforce_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255760,7 +250487,7 @@ async def index_salesforce_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"salesforce\" @@ -255800,10 +250527,8 @@ async def index_salesforce_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255856,8 +250581,7 @@ async def index_salesforce_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255901,8 +250625,7 @@ def _index_salesforce_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255915,7 +250638,10 @@ def _index_salesforce_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -255999,13 +250725,9 @@ def _index_salesforce_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -256088,8 +250810,7 @@ async def index_samba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256107,7 +250828,7 @@ async def index_samba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: """Return vulnerability data stored in index \"samba\" @@ -256147,10 +250868,8 @@ async def index_samba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256203,8 +250922,7 @@ async def index_samba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256253,8 +250971,7 @@ async def index_samba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256272,7 +250989,7 @@ async def index_samba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: """Return vulnerability data stored in index \"samba\" @@ -256312,10 +251029,8 @@ async def index_samba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256368,8 +251083,7 @@ async def index_samba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256418,8 +251132,7 @@ async def index_samba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256437,7 +251150,7 @@ async def index_samba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"samba\" @@ -256477,10 +251190,8 @@ async def index_samba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256533,8 +251244,7 @@ async def index_samba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256578,8 +251288,7 @@ def _index_samba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256592,7 +251301,10 @@ def _index_samba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -256676,13 +251388,9 @@ def _index_samba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -256765,8 +251473,7 @@ async def index_sandisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256784,7 +251491,7 @@ async def index_sandisk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: """Return vulnerability data stored in index \"sandisk\" @@ -256824,10 +251531,8 @@ async def index_sandisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256880,8 +251585,7 @@ async def index_sandisk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256930,8 +251634,7 @@ async def index_sandisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256949,7 +251652,7 @@ async def index_sandisk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: """Return vulnerability data stored in index \"sandisk\" @@ -256989,10 +251692,8 @@ async def index_sandisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257045,8 +251746,7 @@ async def index_sandisk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257095,8 +251795,7 @@ async def index_sandisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257114,7 +251813,7 @@ async def index_sandisk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sandisk\" @@ -257154,10 +251853,8 @@ async def index_sandisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257210,8 +251907,7 @@ async def index_sandisk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257255,8 +251951,7 @@ def _index_sandisk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257269,7 +251964,10 @@ def _index_sandisk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -257353,13 +252051,9 @@ def _index_sandisk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -257442,8 +252136,7 @@ async def index_sans_dshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257461,7 +252154,7 @@ async def index_sans_dshield_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: """Return vulnerability data stored in index \"sans-dshield\" @@ -257501,10 +252194,8 @@ async def index_sans_dshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257557,8 +252248,7 @@ async def index_sans_dshield_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257607,8 +252297,7 @@ async def index_sans_dshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257626,7 +252315,7 @@ async def index_sans_dshield_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: """Return vulnerability data stored in index \"sans-dshield\" @@ -257666,10 +252355,8 @@ async def index_sans_dshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257722,8 +252409,7 @@ async def index_sans_dshield_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257772,8 +252458,7 @@ async def index_sans_dshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257791,7 +252476,7 @@ async def index_sans_dshield_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sans-dshield\" @@ -257831,10 +252516,8 @@ async def index_sans_dshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257887,8 +252570,7 @@ async def index_sans_dshield_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257932,8 +252614,7 @@ def _index_sans_dshield_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257946,7 +252627,10 @@ def _index_sans_dshield_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -258030,13 +252714,9 @@ def _index_sans_dshield_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -258119,8 +252799,7 @@ async def index_sap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258138,7 +252817,7 @@ async def index_sap_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: """Return vulnerability data stored in index \"sap\" @@ -258178,10 +252857,8 @@ async def index_sap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258234,8 +252911,7 @@ async def index_sap_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258284,8 +252960,7 @@ async def index_sap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258303,7 +252978,7 @@ async def index_sap_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: """Return vulnerability data stored in index \"sap\" @@ -258343,10 +253018,8 @@ async def index_sap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258399,8 +253072,7 @@ async def index_sap_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258449,8 +253121,7 @@ async def index_sap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258468,7 +253139,7 @@ async def index_sap_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sap\" @@ -258508,10 +253179,8 @@ async def index_sap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258564,8 +253233,7 @@ async def index_sap_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258609,8 +253277,7 @@ def _index_sap_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258623,7 +253290,10 @@ def _index_sap_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -258707,13 +253377,9 @@ def _index_sap_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -258796,8 +253462,7 @@ async def index_schneider_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258815,7 +253480,7 @@ async def index_schneider_electric_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: """Return vulnerability data stored in index \"schneider-electric\" @@ -258855,10 +253520,8 @@ async def index_schneider_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258911,8 +253574,7 @@ async def index_schneider_electric_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258961,8 +253623,7 @@ async def index_schneider_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258980,7 +253641,7 @@ async def index_schneider_electric_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"schneider-electric\" @@ -259020,10 +253681,8 @@ async def index_schneider_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259076,8 +253735,7 @@ async def index_schneider_electric_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259126,8 +253784,7 @@ async def index_schneider_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259145,7 +253802,7 @@ async def index_schneider_electric_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"schneider-electric\" @@ -259185,10 +253842,8 @@ async def index_schneider_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259241,8 +253896,7 @@ async def index_schneider_electric_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259286,8 +253940,7 @@ def _index_schneider_electric_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259300,7 +253953,10 @@ def _index_schneider_electric_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -259384,13 +254040,9 @@ def _index_schneider_electric_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -259473,8 +254125,7 @@ async def index_schutzwerk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259492,7 +254143,7 @@ async def index_schutzwerk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: """Return vulnerability data stored in index \"schutzwerk\" @@ -259532,10 +254183,8 @@ async def index_schutzwerk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259588,8 +254237,7 @@ async def index_schutzwerk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259638,8 +254286,7 @@ async def index_schutzwerk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259657,7 +254304,7 @@ async def index_schutzwerk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: """Return vulnerability data stored in index \"schutzwerk\" @@ -259697,10 +254344,8 @@ async def index_schutzwerk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259753,8 +254398,7 @@ async def index_schutzwerk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259803,8 +254447,7 @@ async def index_schutzwerk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259822,7 +254465,7 @@ async def index_schutzwerk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"schutzwerk\" @@ -259862,10 +254505,8 @@ async def index_schutzwerk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259918,8 +254559,7 @@ async def index_schutzwerk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259963,8 +254603,7 @@ def _index_schutzwerk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259977,7 +254616,10 @@ def _index_schutzwerk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -260061,13 +254703,9 @@ def _index_schutzwerk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -260150,8 +254788,7 @@ async def index_sec_consult_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260169,7 +254806,7 @@ async def index_sec_consult_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: """Return vulnerability data stored in index \"sec-consult\" @@ -260209,10 +254846,8 @@ async def index_sec_consult_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260265,8 +254900,7 @@ async def index_sec_consult_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260315,8 +254949,7 @@ async def index_sec_consult_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260334,7 +254967,7 @@ async def index_sec_consult_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: """Return vulnerability data stored in index \"sec-consult\" @@ -260374,10 +255007,8 @@ async def index_sec_consult_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260430,8 +255061,7 @@ async def index_sec_consult_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260480,8 +255110,7 @@ async def index_sec_consult_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260499,7 +255128,7 @@ async def index_sec_consult_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sec-consult\" @@ -260539,10 +255168,8 @@ async def index_sec_consult_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260595,8 +255222,7 @@ async def index_sec_consult_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260640,8 +255266,7 @@ def _index_sec_consult_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260654,7 +255279,10 @@ def _index_sec_consult_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -260738,13 +255366,9 @@ def _index_sec_consult_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -260827,8 +255451,7 @@ async def index_securitylab_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260846,7 +255469,7 @@ async def index_securitylab_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: """Return vulnerability data stored in index \"securitylab\" @@ -260886,10 +255509,8 @@ async def index_securitylab_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260942,8 +255563,7 @@ async def index_securitylab_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260992,8 +255612,7 @@ async def index_securitylab_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261011,7 +255630,7 @@ async def index_securitylab_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: """Return vulnerability data stored in index \"securitylab\" @@ -261051,10 +255670,8 @@ async def index_securitylab_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261107,8 +255724,7 @@ async def index_securitylab_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261157,8 +255773,7 @@ async def index_securitylab_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261176,7 +255791,7 @@ async def index_securitylab_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"securitylab\" @@ -261216,10 +255831,8 @@ async def index_securitylab_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261272,8 +255885,7 @@ async def index_securitylab_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261317,8 +255929,7 @@ def _index_securitylab_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -261331,7 +255942,10 @@ def _index_securitylab_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -261415,13 +256029,9 @@ def _index_securitylab_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -261504,8 +256114,7 @@ async def index_seebug_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261523,7 +256132,7 @@ async def index_seebug_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: """Return vulnerability data stored in index \"seebug\" @@ -261563,10 +256172,8 @@ async def index_seebug_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261619,8 +256226,7 @@ async def index_seebug_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261669,8 +256275,7 @@ async def index_seebug_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261688,7 +256293,7 @@ async def index_seebug_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: """Return vulnerability data stored in index \"seebug\" @@ -261728,10 +256333,8 @@ async def index_seebug_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261784,8 +256387,7 @@ async def index_seebug_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261834,8 +256436,7 @@ async def index_seebug_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261853,7 +256454,7 @@ async def index_seebug_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"seebug\" @@ -261893,10 +256494,8 @@ async def index_seebug_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261949,8 +256548,7 @@ async def index_seebug_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261994,8 +256592,7 @@ def _index_seebug_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262008,7 +256605,10 @@ def _index_seebug_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -262092,13 +256692,9 @@ def _index_seebug_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -262181,8 +256777,7 @@ async def index_sel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262200,7 +256795,7 @@ async def index_sel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: """Return vulnerability data stored in index \"sel\" @@ -262240,10 +256835,8 @@ async def index_sel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262296,8 +256889,7 @@ async def index_sel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262346,8 +256938,7 @@ async def index_sel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262365,7 +256956,7 @@ async def index_sel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: """Return vulnerability data stored in index \"sel\" @@ -262405,10 +256996,8 @@ async def index_sel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262461,8 +257050,7 @@ async def index_sel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262511,8 +257099,7 @@ async def index_sel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262530,7 +257117,7 @@ async def index_sel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sel\" @@ -262570,10 +257157,8 @@ async def index_sel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262626,8 +257211,7 @@ async def index_sel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262671,8 +257255,7 @@ def _index_sel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262685,7 +257268,10 @@ def _index_sel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -262769,13 +257355,9 @@ def _index_sel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -262858,8 +257440,7 @@ async def index_sentinelone_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262877,7 +257458,7 @@ async def index_sentinelone_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: """Return vulnerability data stored in index \"sentinelone\" @@ -262917,10 +257498,8 @@ async def index_sentinelone_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262973,8 +257552,7 @@ async def index_sentinelone_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263023,8 +257601,7 @@ async def index_sentinelone_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263042,7 +257619,7 @@ async def index_sentinelone_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: """Return vulnerability data stored in index \"sentinelone\" @@ -263082,10 +257659,8 @@ async def index_sentinelone_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263138,8 +257713,7 @@ async def index_sentinelone_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263188,8 +257762,7 @@ async def index_sentinelone_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263207,7 +257780,7 @@ async def index_sentinelone_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sentinelone\" @@ -263247,10 +257820,8 @@ async def index_sentinelone_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263303,8 +257874,7 @@ async def index_sentinelone_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263348,8 +257918,7 @@ def _index_sentinelone_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -263362,7 +257931,10 @@ def _index_sentinelone_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -263446,13 +258018,9 @@ def _index_sentinelone_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -263535,8 +258103,7 @@ async def index_servicenow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263554,7 +258121,7 @@ async def index_servicenow_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: """Return vulnerability data stored in index \"servicenow\" @@ -263594,10 +258161,8 @@ async def index_servicenow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263650,8 +258215,7 @@ async def index_servicenow_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263700,8 +258264,7 @@ async def index_servicenow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263719,7 +258282,7 @@ async def index_servicenow_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: """Return vulnerability data stored in index \"servicenow\" @@ -263759,10 +258322,8 @@ async def index_servicenow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263815,8 +258376,7 @@ async def index_servicenow_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263865,8 +258425,7 @@ async def index_servicenow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263884,7 +258443,7 @@ async def index_servicenow_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"servicenow\" @@ -263924,10 +258483,8 @@ async def index_servicenow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263980,8 +258537,7 @@ async def index_servicenow_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264025,8 +258581,7 @@ def _index_servicenow_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264039,7 +258594,10 @@ def _index_servicenow_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -264123,13 +258681,9 @@ def _index_servicenow_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -264212,8 +258766,7 @@ async def index_shadowserver_exploited_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264231,7 +258784,7 @@ async def index_shadowserver_exploited_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264271,10 +258824,8 @@ async def index_shadowserver_exploited_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264327,8 +258878,7 @@ async def index_shadowserver_exploited_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264377,8 +258927,7 @@ async def index_shadowserver_exploited_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264396,7 +258945,7 @@ async def index_shadowserver_exploited_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264436,10 +258985,8 @@ async def index_shadowserver_exploited_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264492,8 +259039,7 @@ async def index_shadowserver_exploited_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264542,8 +259088,7 @@ async def index_shadowserver_exploited_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264561,7 +259106,7 @@ async def index_shadowserver_exploited_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264601,10 +259146,8 @@ async def index_shadowserver_exploited_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264657,8 +259200,7 @@ async def index_shadowserver_exploited_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264702,8 +259244,7 @@ def _index_shadowserver_exploited_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264716,7 +259257,10 @@ def _index_shadowserver_exploited_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -264800,13 +259344,9 @@ def _index_shadowserver_exploited_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -264889,8 +259429,7 @@ async def index_shielder_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264908,7 +259447,7 @@ async def index_shielder_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: """Return vulnerability data stored in index \"shielder\" @@ -264948,10 +259487,8 @@ async def index_shielder_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265004,8 +259541,7 @@ async def index_shielder_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265054,8 +259590,7 @@ async def index_shielder_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265073,7 +259608,7 @@ async def index_shielder_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: """Return vulnerability data stored in index \"shielder\" @@ -265113,10 +259648,8 @@ async def index_shielder_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265169,8 +259702,7 @@ async def index_shielder_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265219,8 +259751,7 @@ async def index_shielder_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265238,7 +259769,7 @@ async def index_shielder_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"shielder\" @@ -265278,10 +259809,8 @@ async def index_shielder_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265334,8 +259863,7 @@ async def index_shielder_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265379,8 +259907,7 @@ def _index_shielder_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -265393,7 +259920,10 @@ def _index_shielder_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -265477,13 +260007,9 @@ def _index_shielder_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -265566,8 +260092,7 @@ async def index_sick_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265585,7 +260110,7 @@ async def index_sick_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: """Return vulnerability data stored in index \"sick\" @@ -265625,10 +260150,8 @@ async def index_sick_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265681,8 +260204,7 @@ async def index_sick_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265731,8 +260253,7 @@ async def index_sick_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265750,7 +260271,7 @@ async def index_sick_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: """Return vulnerability data stored in index \"sick\" @@ -265790,10 +260311,8 @@ async def index_sick_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265846,8 +260365,7 @@ async def index_sick_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265896,8 +260414,7 @@ async def index_sick_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265915,7 +260432,7 @@ async def index_sick_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sick\" @@ -265955,10 +260472,8 @@ async def index_sick_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266011,8 +260526,7 @@ async def index_sick_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266056,8 +260570,7 @@ def _index_sick_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266070,7 +260583,10 @@ def _index_sick_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -266154,13 +260670,9 @@ def _index_sick_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -266243,8 +260755,7 @@ async def index_siemens_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266262,7 +260773,7 @@ async def index_siemens_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: """Return vulnerability data stored in index \"siemens\" @@ -266302,10 +260813,8 @@ async def index_siemens_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266358,8 +260867,7 @@ async def index_siemens_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266408,8 +260916,7 @@ async def index_siemens_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266427,7 +260934,7 @@ async def index_siemens_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"siemens\" @@ -266467,10 +260974,8 @@ async def index_siemens_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266523,8 +261028,7 @@ async def index_siemens_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266573,8 +261077,7 @@ async def index_siemens_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266592,7 +261095,7 @@ async def index_siemens_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"siemens\" @@ -266632,10 +261135,8 @@ async def index_siemens_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266688,8 +261189,7 @@ async def index_siemens_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266733,8 +261233,7 @@ def _index_siemens_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266747,7 +261246,10 @@ def _index_siemens_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -266831,13 +261333,9 @@ def _index_siemens_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -266920,8 +261418,7 @@ async def index_sierra_wireless_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266939,7 +261436,7 @@ async def index_sierra_wireless_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: """Return vulnerability data stored in index \"sierra-wireless\" @@ -266979,10 +261476,8 @@ async def index_sierra_wireless_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267035,8 +261530,7 @@ async def index_sierra_wireless_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267085,8 +261579,7 @@ async def index_sierra_wireless_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267104,7 +261597,7 @@ async def index_sierra_wireless_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: """Return vulnerability data stored in index \"sierra-wireless\" @@ -267144,10 +261637,8 @@ async def index_sierra_wireless_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267200,8 +261691,7 @@ async def index_sierra_wireless_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267250,8 +261740,7 @@ async def index_sierra_wireless_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267269,7 +261758,7 @@ async def index_sierra_wireless_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sierra-wireless\" @@ -267309,10 +261798,8 @@ async def index_sierra_wireless_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267365,8 +261852,7 @@ async def index_sierra_wireless_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267410,8 +261896,7 @@ def _index_sierra_wireless_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -267424,7 +261909,10 @@ def _index_sierra_wireless_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -267508,13 +261996,9 @@ def _index_sierra_wireless_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -267597,8 +262081,7 @@ async def index_sigmahq_sigma_rules_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267616,7 +262099,7 @@ async def index_sigmahq_sigma_rules_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267656,10 +262139,8 @@ async def index_sigmahq_sigma_rules_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267712,8 +262193,7 @@ async def index_sigmahq_sigma_rules_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267762,8 +262242,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267781,7 +262260,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267821,10 +262300,8 @@ async def index_sigmahq_sigma_rules_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267877,8 +262354,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267927,8 +262403,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267946,7 +262421,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267986,10 +262461,8 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268042,8 +262515,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268087,8 +262559,7 @@ def _index_sigmahq_sigma_rules_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268101,7 +262572,10 @@ def _index_sigmahq_sigma_rules_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -268185,13 +262659,9 @@ def _index_sigmahq_sigma_rules_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -268274,8 +262744,7 @@ async def index_singcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268293,7 +262762,7 @@ async def index_singcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: """Return vulnerability data stored in index \"singcert\" @@ -268333,10 +262802,8 @@ async def index_singcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268389,8 +262856,7 @@ async def index_singcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268439,8 +262905,7 @@ async def index_singcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268458,7 +262923,7 @@ async def index_singcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: """Return vulnerability data stored in index \"singcert\" @@ -268498,10 +262963,8 @@ async def index_singcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268554,8 +263017,7 @@ async def index_singcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268604,8 +263066,7 @@ async def index_singcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268623,7 +263084,7 @@ async def index_singcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"singcert\" @@ -268663,10 +263124,8 @@ async def index_singcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268719,8 +263178,7 @@ async def index_singcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268764,8 +263222,7 @@ def _index_singcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268778,7 +263235,10 @@ def _index_singcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -268862,13 +263322,9 @@ def _index_singcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -268951,8 +263407,7 @@ async def index_sitecore_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268970,7 +263425,7 @@ async def index_sitecore_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: """Return vulnerability data stored in index \"sitecore\" @@ -269010,10 +263465,8 @@ async def index_sitecore_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269066,8 +263519,7 @@ async def index_sitecore_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269116,8 +263568,7 @@ async def index_sitecore_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269135,7 +263586,7 @@ async def index_sitecore_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: """Return vulnerability data stored in index \"sitecore\" @@ -269175,10 +263626,8 @@ async def index_sitecore_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269231,8 +263680,7 @@ async def index_sitecore_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269281,8 +263729,7 @@ async def index_sitecore_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269300,7 +263747,7 @@ async def index_sitecore_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sitecore\" @@ -269340,10 +263787,8 @@ async def index_sitecore_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269396,8 +263841,7 @@ async def index_sitecore_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269441,8 +263885,7 @@ def _index_sitecore_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -269455,7 +263898,10 @@ def _index_sitecore_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -269539,13 +263985,9 @@ def _index_sitecore_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -269628,8 +264070,7 @@ async def index_slackware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269647,7 +264088,7 @@ async def index_slackware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: """Return vulnerability data stored in index \"slackware\" @@ -269687,10 +264128,8 @@ async def index_slackware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269743,8 +264182,7 @@ async def index_slackware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269793,8 +264231,7 @@ async def index_slackware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269812,7 +264249,7 @@ async def index_slackware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: """Return vulnerability data stored in index \"slackware\" @@ -269852,10 +264289,8 @@ async def index_slackware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269908,8 +264343,7 @@ async def index_slackware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269958,8 +264392,7 @@ async def index_slackware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269977,7 +264410,7 @@ async def index_slackware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"slackware\" @@ -270017,10 +264450,8 @@ async def index_slackware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270073,8 +264504,7 @@ async def index_slackware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270118,8 +264548,7 @@ def _index_slackware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270132,7 +264561,10 @@ def _index_slackware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -270216,13 +264648,9 @@ def _index_slackware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -270305,8 +264733,7 @@ async def index_solarwinds_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270324,7 +264751,7 @@ async def index_solarwinds_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"solarwinds\" @@ -270364,10 +264791,8 @@ async def index_solarwinds_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270420,8 +264845,7 @@ async def index_solarwinds_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270470,8 +264894,7 @@ async def index_solarwinds_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270489,7 +264912,7 @@ async def index_solarwinds_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"solarwinds\" @@ -270529,10 +264952,8 @@ async def index_solarwinds_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270585,8 +265006,7 @@ async def index_solarwinds_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270635,8 +265055,7 @@ async def index_solarwinds_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270654,7 +265073,7 @@ async def index_solarwinds_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"solarwinds\" @@ -270694,10 +265113,8 @@ async def index_solarwinds_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270750,8 +265167,7 @@ async def index_solarwinds_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270795,8 +265211,7 @@ def _index_solarwinds_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270809,7 +265224,10 @@ def _index_solarwinds_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -270893,13 +265311,9 @@ def _index_solarwinds_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -270982,8 +265396,7 @@ async def index_solr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271001,7 +265414,7 @@ async def index_solr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: """Return vulnerability data stored in index \"solr\" @@ -271041,10 +265454,8 @@ async def index_solr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271097,8 +265508,7 @@ async def index_solr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271147,8 +265557,7 @@ async def index_solr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271166,7 +265575,7 @@ async def index_solr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: """Return vulnerability data stored in index \"solr\" @@ -271206,10 +265615,8 @@ async def index_solr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271262,8 +265669,7 @@ async def index_solr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271312,8 +265718,7 @@ async def index_solr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271331,7 +265736,7 @@ async def index_solr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"solr\" @@ -271371,10 +265776,8 @@ async def index_solr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271427,8 +265830,7 @@ async def index_solr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271472,8 +265874,7 @@ def _index_solr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -271486,7 +265887,10 @@ def _index_solr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -271570,13 +265974,9 @@ def _index_solr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -271659,8 +266059,7 @@ async def index_sonatype_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271678,7 +266077,7 @@ async def index_sonatype_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: """Return vulnerability data stored in index \"sonatype\" @@ -271718,10 +266117,8 @@ async def index_sonatype_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271774,8 +266171,7 @@ async def index_sonatype_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271824,8 +266220,7 @@ async def index_sonatype_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271843,7 +266238,7 @@ async def index_sonatype_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: """Return vulnerability data stored in index \"sonatype\" @@ -271883,10 +266278,8 @@ async def index_sonatype_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271939,8 +266332,7 @@ async def index_sonatype_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271989,8 +266381,7 @@ async def index_sonatype_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272008,7 +266399,7 @@ async def index_sonatype_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sonatype\" @@ -272048,10 +266439,8 @@ async def index_sonatype_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272104,8 +266493,7 @@ async def index_sonatype_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272149,8 +266537,7 @@ def _index_sonatype_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272163,7 +266550,10 @@ def _index_sonatype_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -272247,13 +266637,9 @@ def _index_sonatype_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -272336,8 +266722,7 @@ async def index_sonicwall_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272355,7 +266740,7 @@ async def index_sonicwall_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: """Return vulnerability data stored in index \"sonicwall\" @@ -272395,10 +266780,8 @@ async def index_sonicwall_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272451,8 +266834,7 @@ async def index_sonicwall_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272501,8 +266883,7 @@ async def index_sonicwall_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272520,7 +266901,7 @@ async def index_sonicwall_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"sonicwall\" @@ -272560,10 +266941,8 @@ async def index_sonicwall_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272616,8 +266995,7 @@ async def index_sonicwall_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272666,8 +267044,7 @@ async def index_sonicwall_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272685,7 +267062,7 @@ async def index_sonicwall_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sonicwall\" @@ -272725,10 +267102,8 @@ async def index_sonicwall_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272781,8 +267156,7 @@ async def index_sonicwall_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272826,8 +267200,7 @@ def _index_sonicwall_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272840,7 +267213,10 @@ def _index_sonicwall_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -272924,13 +267300,9 @@ def _index_sonicwall_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -273013,8 +267385,7 @@ async def index_spacelabs_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273032,7 +267403,7 @@ async def index_spacelabs_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273072,10 +267443,8 @@ async def index_spacelabs_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273128,8 +267497,7 @@ async def index_spacelabs_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273178,8 +267546,7 @@ async def index_spacelabs_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273197,7 +267564,7 @@ async def index_spacelabs_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273237,10 +267604,8 @@ async def index_spacelabs_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273293,8 +267658,7 @@ async def index_spacelabs_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273343,8 +267707,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273362,7 +267725,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273402,10 +267765,8 @@ async def index_spacelabs_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273458,8 +267819,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273503,8 +267863,7 @@ def _index_spacelabs_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -273517,7 +267876,10 @@ def _index_spacelabs_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -273601,13 +267963,9 @@ def _index_spacelabs_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -273690,8 +268048,7 @@ async def index_splunk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273709,7 +268066,7 @@ async def index_splunk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: """Return vulnerability data stored in index \"splunk\" @@ -273749,10 +268106,8 @@ async def index_splunk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273805,8 +268160,7 @@ async def index_splunk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273855,8 +268209,7 @@ async def index_splunk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273874,7 +268227,7 @@ async def index_splunk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: """Return vulnerability data stored in index \"splunk\" @@ -273914,10 +268267,8 @@ async def index_splunk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273970,8 +268321,7 @@ async def index_splunk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274020,8 +268370,7 @@ async def index_splunk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274039,7 +268388,7 @@ async def index_splunk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"splunk\" @@ -274079,10 +268428,8 @@ async def index_splunk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274135,8 +268482,7 @@ async def index_splunk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274180,8 +268526,7 @@ def _index_splunk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274194,7 +268539,10 @@ def _index_splunk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -274278,13 +268626,9 @@ def _index_splunk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -274367,8 +268711,7 @@ async def index_spring_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274386,7 +268729,7 @@ async def index_spring_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: """Return vulnerability data stored in index \"spring\" @@ -274426,10 +268769,8 @@ async def index_spring_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274482,8 +268823,7 @@ async def index_spring_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274532,8 +268872,7 @@ async def index_spring_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274551,7 +268890,7 @@ async def index_spring_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: """Return vulnerability data stored in index \"spring\" @@ -274591,10 +268930,8 @@ async def index_spring_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274647,8 +268984,7 @@ async def index_spring_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274697,8 +269033,7 @@ async def index_spring_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274716,7 +269051,7 @@ async def index_spring_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"spring\" @@ -274756,10 +269091,8 @@ async def index_spring_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274812,8 +269145,7 @@ async def index_spring_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274857,8 +269189,7 @@ def _index_spring_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274871,7 +269202,10 @@ def _index_spring_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -274955,13 +269289,9 @@ def _index_spring_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -275044,8 +269374,7 @@ async def index_ssd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275063,7 +269392,7 @@ async def index_ssd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ssd\" @@ -275103,10 +269432,8 @@ async def index_ssd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275159,8 +269486,7 @@ async def index_ssd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275209,8 +269535,7 @@ async def index_ssd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275228,7 +269553,7 @@ async def index_ssd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ssd\" @@ -275268,10 +269593,8 @@ async def index_ssd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275324,8 +269647,7 @@ async def index_ssd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275374,8 +269696,7 @@ async def index_ssd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275393,7 +269714,7 @@ async def index_ssd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ssd\" @@ -275433,10 +269754,8 @@ async def index_ssd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275489,8 +269808,7 @@ async def index_ssd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275534,8 +269852,7 @@ def _index_ssd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -275548,7 +269865,10 @@ def _index_ssd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -275632,13 +269952,9 @@ def _index_ssd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -275721,8 +270037,7 @@ async def index_stormshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275740,7 +270055,7 @@ async def index_stormshield_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: """Return vulnerability data stored in index \"stormshield\" @@ -275780,10 +270095,8 @@ async def index_stormshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275836,8 +270149,7 @@ async def index_stormshield_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275886,8 +270198,7 @@ async def index_stormshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275905,7 +270216,7 @@ async def index_stormshield_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: """Return vulnerability data stored in index \"stormshield\" @@ -275945,10 +270256,8 @@ async def index_stormshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276001,8 +270310,7 @@ async def index_stormshield_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276051,8 +270359,7 @@ async def index_stormshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276070,7 +270377,7 @@ async def index_stormshield_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"stormshield\" @@ -276110,10 +270417,8 @@ async def index_stormshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276166,8 +270471,7 @@ async def index_stormshield_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276211,8 +270515,7 @@ def _index_stormshield_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276225,7 +270528,10 @@ def _index_stormshield_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -276309,13 +270615,9 @@ def _index_stormshield_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -276398,8 +270700,7 @@ async def index_stryker_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276417,7 +270718,7 @@ async def index_stryker_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: """Return vulnerability data stored in index \"stryker\" @@ -276457,10 +270758,8 @@ async def index_stryker_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276513,8 +270812,7 @@ async def index_stryker_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276563,8 +270861,7 @@ async def index_stryker_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276582,7 +270879,7 @@ async def index_stryker_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"stryker\" @@ -276622,10 +270919,8 @@ async def index_stryker_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276678,8 +270973,7 @@ async def index_stryker_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276728,8 +271022,7 @@ async def index_stryker_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276747,7 +271040,7 @@ async def index_stryker_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"stryker\" @@ -276787,10 +271080,8 @@ async def index_stryker_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276843,8 +271134,7 @@ async def index_stryker_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276888,8 +271178,7 @@ def _index_stryker_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276902,7 +271191,10 @@ def _index_stryker_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -276986,13 +271278,9 @@ def _index_stryker_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -277075,8 +271363,7 @@ async def index_sudo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277094,7 +271381,7 @@ async def index_sudo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: """Return vulnerability data stored in index \"sudo\" @@ -277134,10 +271421,8 @@ async def index_sudo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277190,8 +271475,7 @@ async def index_sudo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277240,8 +271524,7 @@ async def index_sudo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277259,7 +271542,7 @@ async def index_sudo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: """Return vulnerability data stored in index \"sudo\" @@ -277299,10 +271582,8 @@ async def index_sudo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277355,8 +271636,7 @@ async def index_sudo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277405,8 +271685,7 @@ async def index_sudo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277424,7 +271703,7 @@ async def index_sudo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sudo\" @@ -277464,10 +271743,8 @@ async def index_sudo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277520,8 +271797,7 @@ async def index_sudo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277565,8 +271841,7 @@ def _index_sudo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -277579,7 +271854,10 @@ def _index_sudo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -277663,13 +271941,9 @@ def _index_sudo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -277752,8 +272026,7 @@ async def index_suse_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277771,7 +272044,7 @@ async def index_suse_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: """Return vulnerability data stored in index \"suse\" @@ -277811,10 +272084,8 @@ async def index_suse_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277867,8 +272138,7 @@ async def index_suse_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277917,8 +272187,7 @@ async def index_suse_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277936,7 +272205,7 @@ async def index_suse_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: """Return vulnerability data stored in index \"suse\" @@ -277976,10 +272245,8 @@ async def index_suse_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278032,8 +272299,7 @@ async def index_suse_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278082,8 +272348,7 @@ async def index_suse_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278101,7 +272366,7 @@ async def index_suse_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"suse\" @@ -278141,10 +272406,8 @@ async def index_suse_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278197,8 +272460,7 @@ async def index_suse_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278242,8 +272504,7 @@ def _index_suse_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278256,7 +272517,10 @@ def _index_suse_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -278340,13 +272604,9 @@ def _index_suse_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -278429,8 +272689,7 @@ async def index_suse_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278448,7 +272707,7 @@ async def index_suse_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: """Return vulnerability data stored in index \"suse-security\" @@ -278488,10 +272747,8 @@ async def index_suse_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278544,8 +272801,7 @@ async def index_suse_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278594,8 +272850,7 @@ async def index_suse_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278613,7 +272868,7 @@ async def index_suse_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: """Return vulnerability data stored in index \"suse-security\" @@ -278653,10 +272908,8 @@ async def index_suse_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278709,8 +272962,7 @@ async def index_suse_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278759,8 +273011,7 @@ async def index_suse_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278778,7 +273029,7 @@ async def index_suse_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"suse-security\" @@ -278818,10 +273069,8 @@ async def index_suse_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278874,8 +273123,7 @@ async def index_suse_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278919,8 +273167,7 @@ def _index_suse_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278933,7 +273180,10 @@ def _index_suse_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -279017,13 +273267,9 @@ def _index_suse_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -279106,8 +273352,7 @@ async def index_swift_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279125,7 +273370,7 @@ async def index_swift_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"swift\" @@ -279165,10 +273410,8 @@ async def index_swift_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279221,8 +273464,7 @@ async def index_swift_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279271,8 +273513,7 @@ async def index_swift_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279290,7 +273531,7 @@ async def index_swift_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"swift\" @@ -279330,10 +273571,8 @@ async def index_swift_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279386,8 +273625,7 @@ async def index_swift_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279436,8 +273674,7 @@ async def index_swift_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279455,7 +273692,7 @@ async def index_swift_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"swift\" @@ -279495,10 +273732,8 @@ async def index_swift_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279551,8 +273786,7 @@ async def index_swift_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279596,8 +273830,7 @@ def _index_swift_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279610,7 +273843,10 @@ def _index_swift_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -279694,13 +273930,9 @@ def _index_swift_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -279783,8 +274015,7 @@ async def index_swisslog_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279802,7 +274033,7 @@ async def index_swisslog_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -279842,10 +274073,8 @@ async def index_swisslog_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279898,8 +274127,7 @@ async def index_swisslog_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279948,8 +274176,7 @@ async def index_swisslog_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279967,7 +274194,7 @@ async def index_swisslog_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -280007,10 +274234,8 @@ async def index_swisslog_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280063,8 +274288,7 @@ async def index_swisslog_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280113,8 +274337,7 @@ async def index_swisslog_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280132,7 +274355,7 @@ async def index_swisslog_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -280172,10 +274395,8 @@ async def index_swisslog_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280228,8 +274449,7 @@ async def index_swisslog_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280273,8 +274493,7 @@ def _index_swisslog_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280287,7 +274506,10 @@ def _index_swisslog_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -280371,13 +274593,9 @@ def _index_swisslog_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -280460,8 +274678,7 @@ async def index_symfony_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280479,7 +274696,7 @@ async def index_symfony_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: """Return vulnerability data stored in index \"symfony\" @@ -280519,10 +274736,8 @@ async def index_symfony_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280575,8 +274790,7 @@ async def index_symfony_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280625,8 +274839,7 @@ async def index_symfony_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280644,7 +274857,7 @@ async def index_symfony_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: """Return vulnerability data stored in index \"symfony\" @@ -280684,10 +274897,8 @@ async def index_symfony_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280740,8 +274951,7 @@ async def index_symfony_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280790,8 +275000,7 @@ async def index_symfony_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280809,7 +275018,7 @@ async def index_symfony_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"symfony\" @@ -280849,10 +275058,8 @@ async def index_symfony_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280905,8 +275112,7 @@ async def index_symfony_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280950,8 +275156,7 @@ def _index_symfony_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280964,7 +275169,10 @@ def _index_symfony_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -281048,13 +275256,9 @@ def _index_symfony_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -281137,8 +275341,7 @@ async def index_synacktiv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281156,7 +275359,7 @@ async def index_synacktiv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: """Return vulnerability data stored in index \"synacktiv\" @@ -281196,10 +275399,8 @@ async def index_synacktiv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281252,8 +275453,7 @@ async def index_synacktiv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281302,8 +275502,7 @@ async def index_synacktiv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281321,7 +275520,7 @@ async def index_synacktiv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: """Return vulnerability data stored in index \"synacktiv\" @@ -281361,10 +275560,8 @@ async def index_synacktiv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281417,8 +275614,7 @@ async def index_synacktiv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281467,8 +275663,7 @@ async def index_synacktiv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281486,7 +275681,7 @@ async def index_synacktiv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"synacktiv\" @@ -281526,10 +275721,8 @@ async def index_synacktiv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281582,8 +275775,7 @@ async def index_synacktiv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281627,8 +275819,7 @@ def _index_synacktiv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281641,7 +275832,10 @@ def _index_synacktiv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -281725,13 +275919,9 @@ def _index_synacktiv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -281814,8 +276004,7 @@ async def index_syncrosoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281833,7 +276022,7 @@ async def index_syncrosoft_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: """Return vulnerability data stored in index \"syncrosoft\" @@ -281873,10 +276062,8 @@ async def index_syncrosoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281929,8 +276116,7 @@ async def index_syncrosoft_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281979,8 +276165,7 @@ async def index_syncrosoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281998,7 +276183,7 @@ async def index_syncrosoft_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: """Return vulnerability data stored in index \"syncrosoft\" @@ -282038,10 +276223,8 @@ async def index_syncrosoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282094,8 +276277,7 @@ async def index_syncrosoft_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282144,8 +276326,7 @@ async def index_syncrosoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282163,7 +276344,7 @@ async def index_syncrosoft_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"syncrosoft\" @@ -282203,10 +276384,8 @@ async def index_syncrosoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282259,8 +276438,7 @@ async def index_syncrosoft_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282304,8 +276482,7 @@ def _index_syncrosoft_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282318,7 +276495,10 @@ def _index_syncrosoft_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -282402,13 +276582,9 @@ def _index_syncrosoft_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -282491,8 +276667,7 @@ async def index_synology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282510,7 +276685,7 @@ async def index_synology_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: """Return vulnerability data stored in index \"synology\" @@ -282550,10 +276725,8 @@ async def index_synology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282606,8 +276779,7 @@ async def index_synology_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282656,8 +276828,7 @@ async def index_synology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282675,7 +276846,7 @@ async def index_synology_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: """Return vulnerability data stored in index \"synology\" @@ -282715,10 +276886,8 @@ async def index_synology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282771,8 +276940,7 @@ async def index_synology_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282821,8 +276989,7 @@ async def index_synology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282840,7 +277007,7 @@ async def index_synology_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"synology\" @@ -282880,10 +277047,8 @@ async def index_synology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282936,8 +277101,7 @@ async def index_synology_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282981,8 +277145,7 @@ def _index_synology_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282995,7 +277158,10 @@ def _index_synology_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -283079,13 +277245,9 @@ def _index_synology_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -283168,8 +277330,7 @@ async def index_syss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283187,7 +277348,7 @@ async def index_syss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: """Return vulnerability data stored in index \"syss\" @@ -283227,10 +277388,8 @@ async def index_syss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283283,8 +277442,7 @@ async def index_syss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283333,8 +277491,7 @@ async def index_syss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283352,7 +277509,7 @@ async def index_syss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: """Return vulnerability data stored in index \"syss\" @@ -283392,10 +277549,8 @@ async def index_syss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283448,8 +277603,7 @@ async def index_syss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283498,8 +277652,7 @@ async def index_syss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283517,7 +277670,7 @@ async def index_syss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"syss\" @@ -283557,10 +277710,8 @@ async def index_syss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283613,8 +277764,7 @@ async def index_syss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283658,8 +277808,7 @@ def _index_syss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283672,7 +277821,10 @@ def _index_syss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -283756,13 +277908,9 @@ def _index_syss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -283845,8 +277993,7 @@ async def index_tailscale_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283864,7 +278011,7 @@ async def index_tailscale_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: """Return vulnerability data stored in index \"tailscale\" @@ -283904,10 +278051,8 @@ async def index_tailscale_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283960,8 +278105,7 @@ async def index_tailscale_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284010,8 +278154,7 @@ async def index_tailscale_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284029,7 +278172,7 @@ async def index_tailscale_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: """Return vulnerability data stored in index \"tailscale\" @@ -284069,10 +278212,8 @@ async def index_tailscale_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284125,8 +278266,7 @@ async def index_tailscale_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284175,8 +278315,7 @@ async def index_tailscale_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284194,7 +278333,7 @@ async def index_tailscale_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tailscale\" @@ -284234,10 +278373,8 @@ async def index_tailscale_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284290,8 +278427,7 @@ async def index_tailscale_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284335,8 +278471,7 @@ def _index_tailscale_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -284349,7 +278484,10 @@ def _index_tailscale_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -284433,13 +278571,9 @@ def _index_tailscale_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -284522,8 +278656,7 @@ async def index_teamviewer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284541,7 +278674,7 @@ async def index_teamviewer_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: """Return vulnerability data stored in index \"teamviewer\" @@ -284581,10 +278714,8 @@ async def index_teamviewer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284637,8 +278768,7 @@ async def index_teamviewer_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284687,8 +278817,7 @@ async def index_teamviewer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284706,7 +278835,7 @@ async def index_teamviewer_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: """Return vulnerability data stored in index \"teamviewer\" @@ -284746,10 +278875,8 @@ async def index_teamviewer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284802,8 +278929,7 @@ async def index_teamviewer_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284852,8 +278978,7 @@ async def index_teamviewer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284871,7 +278996,7 @@ async def index_teamviewer_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"teamviewer\" @@ -284911,10 +279036,8 @@ async def index_teamviewer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284967,8 +279090,7 @@ async def index_teamviewer_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285012,8 +279134,7 @@ def _index_teamviewer_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285026,7 +279147,10 @@ def _index_teamviewer_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -285110,13 +279234,9 @@ def _index_teamviewer_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -285199,8 +279319,7 @@ async def index_tenable_research_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285218,7 +279337,7 @@ async def index_tenable_research_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285258,10 +279377,8 @@ async def index_tenable_research_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285314,8 +279431,7 @@ async def index_tenable_research_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285364,8 +279480,7 @@ async def index_tenable_research_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285383,7 +279498,7 @@ async def index_tenable_research_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285423,10 +279538,8 @@ async def index_tenable_research_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285479,8 +279592,7 @@ async def index_tenable_research_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285529,8 +279641,7 @@ async def index_tenable_research_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285548,7 +279659,7 @@ async def index_tenable_research_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285588,10 +279699,8 @@ async def index_tenable_research_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285644,8 +279753,7 @@ async def index_tenable_research_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285689,8 +279797,7 @@ def _index_tenable_research_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285703,7 +279810,10 @@ def _index_tenable_research_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -285787,13 +279897,9 @@ def _index_tenable_research_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -285876,8 +279982,7 @@ async def index_tencent_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285895,7 +280000,7 @@ async def index_tencent_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: """Return vulnerability data stored in index \"tencent\" @@ -285935,10 +280040,8 @@ async def index_tencent_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285991,8 +280094,7 @@ async def index_tencent_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286041,8 +280143,7 @@ async def index_tencent_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286060,7 +280161,7 @@ async def index_tencent_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: """Return vulnerability data stored in index \"tencent\" @@ -286100,10 +280201,8 @@ async def index_tencent_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286156,8 +280255,7 @@ async def index_tencent_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286206,8 +280304,7 @@ async def index_tencent_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286225,7 +280322,7 @@ async def index_tencent_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tencent\" @@ -286265,10 +280362,8 @@ async def index_tencent_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286321,8 +280416,7 @@ async def index_tencent_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286366,8 +280460,7 @@ def _index_tencent_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -286380,7 +280473,10 @@ def _index_tencent_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -286464,13 +280560,9 @@ def _index_tencent_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -286553,8 +280645,7 @@ async def index_thales_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286572,7 +280663,7 @@ async def index_thales_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: """Return vulnerability data stored in index \"thales\" @@ -286612,10 +280703,8 @@ async def index_thales_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286668,8 +280757,7 @@ async def index_thales_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286718,8 +280806,7 @@ async def index_thales_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286737,7 +280824,7 @@ async def index_thales_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: """Return vulnerability data stored in index \"thales\" @@ -286777,10 +280864,8 @@ async def index_thales_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286833,8 +280918,7 @@ async def index_thales_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286883,8 +280967,7 @@ async def index_thales_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286902,7 +280985,7 @@ async def index_thales_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"thales\" @@ -286942,10 +281025,8 @@ async def index_thales_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286998,8 +281079,7 @@ async def index_thales_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287043,8 +281123,7 @@ def _index_thales_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287057,7 +281136,10 @@ def _index_thales_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -287141,13 +281223,9 @@ def _index_thales_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -287230,8 +281308,7 @@ async def index_themissinglink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287249,7 +281326,7 @@ async def index_themissinglink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: """Return vulnerability data stored in index \"themissinglink\" @@ -287289,10 +281366,8 @@ async def index_themissinglink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287345,8 +281420,7 @@ async def index_themissinglink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287395,8 +281469,7 @@ async def index_themissinglink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287414,7 +281487,7 @@ async def index_themissinglink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: """Return vulnerability data stored in index \"themissinglink\" @@ -287454,10 +281527,8 @@ async def index_themissinglink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287510,8 +281581,7 @@ async def index_themissinglink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287560,8 +281630,7 @@ async def index_themissinglink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287579,7 +281648,7 @@ async def index_themissinglink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"themissinglink\" @@ -287619,10 +281688,8 @@ async def index_themissinglink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287675,8 +281742,7 @@ async def index_themissinglink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287720,8 +281786,7 @@ def _index_themissinglink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287734,7 +281799,10 @@ def _index_themissinglink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -287818,13 +281886,9 @@ def _index_themissinglink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -287907,8 +281971,7 @@ async def index_thermo_fisher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287926,7 +281989,7 @@ async def index_thermo_fisher_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: """Return vulnerability data stored in index \"thermo-fisher\" @@ -287966,10 +282029,8 @@ async def index_thermo_fisher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288022,8 +282083,7 @@ async def index_thermo_fisher_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288072,8 +282132,7 @@ async def index_thermo_fisher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288091,7 +282150,7 @@ async def index_thermo_fisher_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: """Return vulnerability data stored in index \"thermo-fisher\" @@ -288131,10 +282190,8 @@ async def index_thermo_fisher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288187,8 +282244,7 @@ async def index_thermo_fisher_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288237,8 +282293,7 @@ async def index_thermo_fisher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288256,7 +282311,7 @@ async def index_thermo_fisher_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"thermo-fisher\" @@ -288296,10 +282351,8 @@ async def index_thermo_fisher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288352,8 +282405,7 @@ async def index_thermo_fisher_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288397,8 +282449,7 @@ def _index_thermo_fisher_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -288411,7 +282462,10 @@ def _index_thermo_fisher_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -288495,13 +282549,9 @@ def _index_thermo_fisher_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -288584,8 +282634,7 @@ async def index_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288603,7 +282652,7 @@ async def index_threat_actors_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: """Return vulnerability data stored in index \"threat-actors\" @@ -288643,10 +282692,8 @@ async def index_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288699,8 +282746,7 @@ async def index_threat_actors_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288749,8 +282795,7 @@ async def index_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288768,7 +282813,7 @@ async def index_threat_actors_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: """Return vulnerability data stored in index \"threat-actors\" @@ -288808,10 +282853,8 @@ async def index_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288864,8 +282907,7 @@ async def index_threat_actors_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288914,8 +282956,7 @@ async def index_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288933,7 +282974,7 @@ async def index_threat_actors_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"threat-actors\" @@ -288973,10 +283014,8 @@ async def index_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289029,8 +283068,7 @@ async def index_threat_actors_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289074,8 +283112,7 @@ def _index_threat_actors_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289088,7 +283125,10 @@ def _index_threat_actors_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -289172,13 +283212,9 @@ def _index_threat_actors_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -289261,8 +283297,7 @@ async def index_ti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289280,7 +283315,7 @@ async def index_ti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: """Return vulnerability data stored in index \"ti\" @@ -289320,10 +283355,8 @@ async def index_ti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289376,8 +283409,7 @@ async def index_ti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289426,8 +283458,7 @@ async def index_ti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289445,7 +283476,7 @@ async def index_ti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: """Return vulnerability data stored in index \"ti\" @@ -289485,10 +283516,8 @@ async def index_ti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289541,8 +283570,7 @@ async def index_ti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289591,8 +283619,7 @@ async def index_ti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289610,7 +283637,7 @@ async def index_ti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ti\" @@ -289650,10 +283677,8 @@ async def index_ti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289706,8 +283731,7 @@ async def index_ti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289751,8 +283775,7 @@ def _index_ti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289765,7 +283788,10 @@ def _index_ti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -289849,13 +283875,9 @@ def _index_ti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -289938,8 +283960,7 @@ async def index_tibco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289957,7 +283978,7 @@ async def index_tibco_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: """Return vulnerability data stored in index \"tibco\" @@ -289997,10 +284018,8 @@ async def index_tibco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290053,8 +284072,7 @@ async def index_tibco_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290103,8 +284121,7 @@ async def index_tibco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290122,7 +284139,7 @@ async def index_tibco_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: """Return vulnerability data stored in index \"tibco\" @@ -290162,10 +284179,8 @@ async def index_tibco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290218,8 +284233,7 @@ async def index_tibco_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290268,8 +284282,7 @@ async def index_tibco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290287,7 +284300,7 @@ async def index_tibco_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tibco\" @@ -290327,10 +284340,8 @@ async def index_tibco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290383,8 +284394,7 @@ async def index_tibco_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290428,8 +284438,7 @@ def _index_tibco_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -290442,7 +284451,10 @@ def _index_tibco_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -290526,13 +284538,9 @@ def _index_tibco_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -290615,8 +284623,7 @@ async def index_tp_link_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290634,7 +284641,7 @@ async def index_tp_link_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: """Return vulnerability data stored in index \"tp-link\" @@ -290674,10 +284681,8 @@ async def index_tp_link_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290730,8 +284735,7 @@ async def index_tp_link_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290780,8 +284784,7 @@ async def index_tp_link_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290799,7 +284802,7 @@ async def index_tp_link_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: """Return vulnerability data stored in index \"tp-link\" @@ -290839,10 +284842,8 @@ async def index_tp_link_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290895,8 +284896,7 @@ async def index_tp_link_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290945,8 +284945,7 @@ async def index_tp_link_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290964,7 +284963,7 @@ async def index_tp_link_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tp-link\" @@ -291004,10 +285003,8 @@ async def index_tp_link_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291060,8 +285057,7 @@ async def index_tp_link_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291105,8 +285101,7 @@ def _index_tp_link_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291119,7 +285114,10 @@ def _index_tp_link_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -291203,13 +285201,9 @@ def _index_tp_link_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -291292,8 +285286,7 @@ async def index_trane_technology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291311,7 +285304,7 @@ async def index_trane_technology_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: """Return vulnerability data stored in index \"trane-technology\" @@ -291351,10 +285344,8 @@ async def index_trane_technology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291407,8 +285398,7 @@ async def index_trane_technology_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291457,8 +285447,7 @@ async def index_trane_technology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291476,7 +285465,7 @@ async def index_trane_technology_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: """Return vulnerability data stored in index \"trane-technology\" @@ -291516,10 +285505,8 @@ async def index_trane_technology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291572,8 +285559,7 @@ async def index_trane_technology_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291622,8 +285608,7 @@ async def index_trane_technology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291641,7 +285626,7 @@ async def index_trane_technology_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trane-technology\" @@ -291681,10 +285666,8 @@ async def index_trane_technology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291737,8 +285720,7 @@ async def index_trane_technology_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291782,8 +285764,7 @@ def _index_trane_technology_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291796,7 +285777,10 @@ def _index_trane_technology_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -291880,13 +285864,9 @@ def _index_trane_technology_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -291969,8 +285949,7 @@ async def index_trendmicro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291988,7 +285967,7 @@ async def index_trendmicro_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: """Return vulnerability data stored in index \"trendmicro\" @@ -292028,10 +286007,8 @@ async def index_trendmicro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292084,8 +286061,7 @@ async def index_trendmicro_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292134,8 +286110,7 @@ async def index_trendmicro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292153,7 +286128,7 @@ async def index_trendmicro_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: """Return vulnerability data stored in index \"trendmicro\" @@ -292193,10 +286168,8 @@ async def index_trendmicro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292249,8 +286222,7 @@ async def index_trendmicro_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292299,8 +286271,7 @@ async def index_trendmicro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292318,7 +286289,7 @@ async def index_trendmicro_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trendmicro\" @@ -292358,10 +286329,8 @@ async def index_trendmicro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292414,8 +286383,7 @@ async def index_trendmicro_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292459,8 +286427,7 @@ def _index_trendmicro_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -292473,7 +286440,10 @@ def _index_trendmicro_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -292557,13 +286527,9 @@ def _index_trendmicro_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -292646,8 +286612,7 @@ async def index_trustwave_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292665,7 +286630,7 @@ async def index_trustwave_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: """Return vulnerability data stored in index \"trustwave\" @@ -292705,10 +286670,8 @@ async def index_trustwave_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292761,8 +286724,7 @@ async def index_trustwave_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292811,8 +286773,7 @@ async def index_trustwave_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292830,7 +286791,7 @@ async def index_trustwave_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: """Return vulnerability data stored in index \"trustwave\" @@ -292870,10 +286831,8 @@ async def index_trustwave_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292926,8 +286885,7 @@ async def index_trustwave_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292976,8 +286934,7 @@ async def index_trustwave_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292995,7 +286952,7 @@ async def index_trustwave_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trustwave\" @@ -293035,10 +286992,8 @@ async def index_trustwave_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293091,8 +287046,7 @@ async def index_trustwave_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293136,8 +287090,7 @@ def _index_trustwave_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293150,7 +287103,10 @@ def _index_trustwave_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -293234,13 +287190,9 @@ def _index_trustwave_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -293323,8 +287275,7 @@ async def index_twcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293342,7 +287293,7 @@ async def index_twcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"twcert\" @@ -293382,10 +287333,8 @@ async def index_twcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293438,8 +287387,7 @@ async def index_twcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293488,8 +287436,7 @@ async def index_twcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293507,7 +287454,7 @@ async def index_twcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"twcert\" @@ -293547,10 +287494,8 @@ async def index_twcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293603,8 +287548,7 @@ async def index_twcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293653,8 +287597,7 @@ async def index_twcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293672,7 +287615,7 @@ async def index_twcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"twcert\" @@ -293712,10 +287655,8 @@ async def index_twcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293768,8 +287709,7 @@ async def index_twcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293813,8 +287753,7 @@ def _index_twcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293827,7 +287766,10 @@ def _index_twcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -293911,13 +287853,9 @@ def _index_twcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -294000,8 +287938,7 @@ async def index_ubiquiti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294019,7 +287956,7 @@ async def index_ubiquiti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: """Return vulnerability data stored in index \"ubiquiti\" @@ -294059,10 +287996,8 @@ async def index_ubiquiti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294115,8 +288050,7 @@ async def index_ubiquiti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294165,8 +288099,7 @@ async def index_ubiquiti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294184,7 +288117,7 @@ async def index_ubiquiti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: """Return vulnerability data stored in index \"ubiquiti\" @@ -294224,10 +288157,8 @@ async def index_ubiquiti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294280,8 +288211,7 @@ async def index_ubiquiti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294330,8 +288260,7 @@ async def index_ubiquiti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294349,7 +288278,7 @@ async def index_ubiquiti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubiquiti\" @@ -294389,10 +288318,8 @@ async def index_ubiquiti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294445,8 +288372,7 @@ async def index_ubiquiti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294490,8 +288416,7 @@ def _index_ubiquiti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -294504,7 +288429,10 @@ def _index_ubiquiti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -294588,13 +288516,9 @@ def _index_ubiquiti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -294677,8 +288601,7 @@ async def index_ubuntu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294696,7 +288619,7 @@ async def index_ubuntu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: """Return vulnerability data stored in index \"ubuntu\" @@ -294736,10 +288659,8 @@ async def index_ubuntu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294792,8 +288713,7 @@ async def index_ubuntu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294842,8 +288762,7 @@ async def index_ubuntu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294861,7 +288780,7 @@ async def index_ubuntu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: """Return vulnerability data stored in index \"ubuntu\" @@ -294901,10 +288820,8 @@ async def index_ubuntu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294957,8 +288874,7 @@ async def index_ubuntu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295007,8 +288923,7 @@ async def index_ubuntu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295026,7 +288941,7 @@ async def index_ubuntu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubuntu\" @@ -295066,10 +288981,8 @@ async def index_ubuntu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295122,8 +289035,7 @@ async def index_ubuntu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295167,8 +289079,7 @@ def _index_ubuntu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295181,7 +289092,10 @@ def _index_ubuntu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -295265,13 +289179,9 @@ def _index_ubuntu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -295354,8 +289264,7 @@ async def index_ubuntu_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295373,7 +289282,7 @@ async def index_ubuntu_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295413,10 +289322,8 @@ async def index_ubuntu_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295469,8 +289376,7 @@ async def index_ubuntu_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295519,8 +289425,7 @@ async def index_ubuntu_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295538,7 +289443,7 @@ async def index_ubuntu_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295578,10 +289483,8 @@ async def index_ubuntu_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295634,8 +289537,7 @@ async def index_ubuntu_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295684,8 +289586,7 @@ async def index_ubuntu_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295703,7 +289604,7 @@ async def index_ubuntu_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295743,10 +289644,8 @@ async def index_ubuntu_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295799,8 +289698,7 @@ async def index_ubuntu_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295844,8 +289742,7 @@ def _index_ubuntu_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295858,7 +289755,10 @@ def _index_ubuntu_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -295942,13 +289842,9 @@ def _index_ubuntu_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -296031,8 +289927,7 @@ async def index_unify_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296050,7 +289945,7 @@ async def index_unify_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: """Return vulnerability data stored in index \"unify\" @@ -296090,10 +289985,8 @@ async def index_unify_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296146,8 +290039,7 @@ async def index_unify_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296196,8 +290088,7 @@ async def index_unify_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296215,7 +290106,7 @@ async def index_unify_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: """Return vulnerability data stored in index \"unify\" @@ -296255,10 +290146,8 @@ async def index_unify_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296311,8 +290200,7 @@ async def index_unify_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296361,8 +290249,7 @@ async def index_unify_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296380,7 +290267,7 @@ async def index_unify_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"unify\" @@ -296420,10 +290307,8 @@ async def index_unify_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296476,8 +290361,7 @@ async def index_unify_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296521,8 +290405,7 @@ def _index_unify_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -296535,7 +290418,10 @@ def _index_unify_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -296619,13 +290505,9 @@ def _index_unify_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -296708,8 +290590,7 @@ async def index_unisoc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296727,7 +290608,7 @@ async def index_unisoc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: """Return vulnerability data stored in index \"unisoc\" @@ -296767,10 +290648,8 @@ async def index_unisoc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296823,8 +290702,7 @@ async def index_unisoc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296873,8 +290751,7 @@ async def index_unisoc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296892,7 +290769,7 @@ async def index_unisoc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: """Return vulnerability data stored in index \"unisoc\" @@ -296932,10 +290809,8 @@ async def index_unisoc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296988,8 +290863,7 @@ async def index_unisoc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297038,8 +290912,7 @@ async def index_unisoc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297057,7 +290930,7 @@ async def index_unisoc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"unisoc\" @@ -297097,10 +290970,8 @@ async def index_unisoc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297153,8 +291024,7 @@ async def index_unisoc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297198,8 +291068,7 @@ def _index_unisoc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297212,7 +291081,10 @@ def _index_unisoc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -297296,13 +291168,9 @@ def _index_unisoc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -297385,8 +291253,7 @@ async def index_usd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297404,7 +291271,7 @@ async def index_usd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: """Return vulnerability data stored in index \"usd\" @@ -297444,10 +291311,8 @@ async def index_usd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297500,8 +291365,7 @@ async def index_usd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297550,8 +291414,7 @@ async def index_usd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297569,7 +291432,7 @@ async def index_usd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: """Return vulnerability data stored in index \"usd\" @@ -297609,10 +291472,8 @@ async def index_usd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297665,8 +291526,7 @@ async def index_usd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297715,8 +291575,7 @@ async def index_usd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297734,7 +291593,7 @@ async def index_usd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"usd\" @@ -297774,10 +291633,8 @@ async def index_usd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297830,8 +291687,7 @@ async def index_usd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297875,8 +291731,7 @@ def _index_usd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297889,7 +291744,10 @@ def _index_usd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -297973,13 +291831,9 @@ def _index_usd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -298062,8 +291916,7 @@ async def index_usom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298081,7 +291934,7 @@ async def index_usom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: """Return vulnerability data stored in index \"usom\" @@ -298121,10 +291974,8 @@ async def index_usom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298177,8 +292028,7 @@ async def index_usom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298227,8 +292077,7 @@ async def index_usom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298246,7 +292095,7 @@ async def index_usom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"usom\" @@ -298286,10 +292135,8 @@ async def index_usom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298342,8 +292189,7 @@ async def index_usom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298392,8 +292238,7 @@ async def index_usom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298411,7 +292256,7 @@ async def index_usom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"usom\" @@ -298451,10 +292296,8 @@ async def index_usom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298507,8 +292350,7 @@ async def index_usom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298552,8 +292394,7 @@ def _index_usom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -298566,7 +292407,10 @@ def _index_usom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -298650,13 +292494,9 @@ def _index_usom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -298739,8 +292579,7 @@ async def index_vandyke_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298758,7 +292597,7 @@ async def index_vandyke_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: """Return vulnerability data stored in index \"vandyke\" @@ -298798,10 +292637,8 @@ async def index_vandyke_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298854,8 +292691,7 @@ async def index_vandyke_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298904,8 +292740,7 @@ async def index_vandyke_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298923,7 +292758,7 @@ async def index_vandyke_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: """Return vulnerability data stored in index \"vandyke\" @@ -298963,10 +292798,8 @@ async def index_vandyke_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299019,8 +292852,7 @@ async def index_vandyke_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299069,8 +292901,7 @@ async def index_vandyke_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299088,7 +292919,7 @@ async def index_vandyke_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vandyke\" @@ -299128,10 +292959,8 @@ async def index_vandyke_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299184,8 +293013,7 @@ async def index_vandyke_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299229,8 +293057,7 @@ def _index_vandyke_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299243,7 +293070,10 @@ def _index_vandyke_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -299327,13 +293157,9 @@ def _index_vandyke_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -299416,8 +293242,7 @@ async def index_vapidlabs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299435,7 +293260,7 @@ async def index_vapidlabs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vapidlabs\" @@ -299475,10 +293300,8 @@ async def index_vapidlabs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299531,8 +293354,7 @@ async def index_vapidlabs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299581,8 +293403,7 @@ async def index_vapidlabs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299600,7 +293421,7 @@ async def index_vapidlabs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vapidlabs\" @@ -299640,10 +293461,8 @@ async def index_vapidlabs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299696,8 +293515,7 @@ async def index_vapidlabs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299746,8 +293564,7 @@ async def index_vapidlabs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299765,7 +293582,7 @@ async def index_vapidlabs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vapidlabs\" @@ -299805,10 +293622,8 @@ async def index_vapidlabs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299861,8 +293676,7 @@ async def index_vapidlabs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299906,8 +293720,7 @@ def _index_vapidlabs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299920,7 +293733,10 @@ def _index_vapidlabs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -300004,13 +293820,9 @@ def _index_vapidlabs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -300093,8 +293905,7 @@ async def index_vc_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300112,7 +293923,7 @@ async def index_vc_cpe_dictionary_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300152,10 +293963,8 @@ async def index_vc_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300208,8 +294017,7 @@ async def index_vc_cpe_dictionary_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300258,8 +294066,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300277,7 +294084,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300317,10 +294124,8 @@ async def index_vc_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300373,8 +294178,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300423,8 +294227,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300442,7 +294245,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300482,10 +294285,8 @@ async def index_vc_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300538,8 +294339,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300583,8 +294383,7 @@ def _index_vc_cpe_dictionary_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300597,7 +294396,10 @@ def _index_vc_cpe_dictionary_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -300681,13 +294483,9 @@ def _index_vc_cpe_dictionary_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -300770,8 +294568,7 @@ async def index_vde_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300789,7 +294586,7 @@ async def index_vde_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vde\" @@ -300829,10 +294626,8 @@ async def index_vde_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300885,8 +294680,7 @@ async def index_vde_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300935,8 +294729,7 @@ async def index_vde_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300954,7 +294747,7 @@ async def index_vde_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vde\" @@ -300994,10 +294787,8 @@ async def index_vde_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301050,8 +294841,7 @@ async def index_vde_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301100,8 +294890,7 @@ async def index_vde_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301119,7 +294908,7 @@ async def index_vde_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vde\" @@ -301159,10 +294948,8 @@ async def index_vde_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301215,8 +295002,7 @@ async def index_vde_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301260,8 +295046,7 @@ def _index_vde_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301274,7 +295059,10 @@ def _index_vde_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -301358,13 +295146,9 @@ def _index_vde_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -301447,8 +295231,7 @@ async def index_veeam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301466,7 +295249,7 @@ async def index_veeam_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: """Return vulnerability data stored in index \"veeam\" @@ -301506,10 +295289,8 @@ async def index_veeam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301562,8 +295343,7 @@ async def index_veeam_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301612,8 +295392,7 @@ async def index_veeam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301631,7 +295410,7 @@ async def index_veeam_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: """Return vulnerability data stored in index \"veeam\" @@ -301671,10 +295450,8 @@ async def index_veeam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301727,8 +295504,7 @@ async def index_veeam_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301777,8 +295553,7 @@ async def index_veeam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301796,7 +295571,7 @@ async def index_veeam_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"veeam\" @@ -301836,10 +295611,8 @@ async def index_veeam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301892,8 +295665,7 @@ async def index_veeam_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301937,8 +295709,7 @@ def _index_veeam_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301951,7 +295722,10 @@ def _index_veeam_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -302035,13 +295809,9 @@ def _index_veeam_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -302124,8 +295894,7 @@ async def index_veritas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302143,7 +295912,7 @@ async def index_veritas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: """Return vulnerability data stored in index \"veritas\" @@ -302183,10 +295952,8 @@ async def index_veritas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302239,8 +296006,7 @@ async def index_veritas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302289,8 +296055,7 @@ async def index_veritas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302308,7 +296073,7 @@ async def index_veritas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: """Return vulnerability data stored in index \"veritas\" @@ -302348,10 +296113,8 @@ async def index_veritas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302404,8 +296167,7 @@ async def index_veritas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302454,8 +296216,7 @@ async def index_veritas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302473,7 +296234,7 @@ async def index_veritas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"veritas\" @@ -302513,10 +296274,8 @@ async def index_veritas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302569,8 +296328,7 @@ async def index_veritas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302614,8 +296372,7 @@ def _index_veritas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302628,7 +296385,10 @@ def _index_veritas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -302712,13 +296472,9 @@ def _index_veritas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -302801,8 +296557,7 @@ async def index_virtuozzo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302820,7 +296575,7 @@ async def index_virtuozzo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: """Return vulnerability data stored in index \"virtuozzo\" @@ -302860,10 +296615,8 @@ async def index_virtuozzo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302916,8 +296669,7 @@ async def index_virtuozzo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302966,8 +296718,7 @@ async def index_virtuozzo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302985,7 +296736,7 @@ async def index_virtuozzo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: """Return vulnerability data stored in index \"virtuozzo\" @@ -303025,10 +296776,8 @@ async def index_virtuozzo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303081,8 +296830,7 @@ async def index_virtuozzo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303131,8 +296879,7 @@ async def index_virtuozzo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303150,7 +296897,7 @@ async def index_virtuozzo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"virtuozzo\" @@ -303190,10 +296937,8 @@ async def index_virtuozzo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303246,8 +296991,7 @@ async def index_virtuozzo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303291,8 +297035,7 @@ def _index_virtuozzo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303305,7 +297048,10 @@ def _index_virtuozzo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -303389,13 +297135,9 @@ def _index_virtuozzo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -303478,8 +297220,7 @@ async def index_vlc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303497,7 +297238,7 @@ async def index_vlc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: """Return vulnerability data stored in index \"vlc\" @@ -303537,10 +297278,8 @@ async def index_vlc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303593,8 +297332,7 @@ async def index_vlc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303643,8 +297381,7 @@ async def index_vlc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303662,7 +297399,7 @@ async def index_vlc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: """Return vulnerability data stored in index \"vlc\" @@ -303702,10 +297439,8 @@ async def index_vlc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303758,8 +297493,7 @@ async def index_vlc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303808,8 +297542,7 @@ async def index_vlc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303827,7 +297560,7 @@ async def index_vlc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vlc\" @@ -303867,10 +297600,8 @@ async def index_vlc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303923,8 +297654,7 @@ async def index_vlc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303968,8 +297698,7 @@ def _index_vlc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303982,7 +297711,10 @@ def _index_vlc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -304066,13 +297798,9 @@ def _index_vlc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -304155,8 +297883,7 @@ async def index_vmware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304174,7 +297901,7 @@ async def index_vmware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vmware\" @@ -304214,10 +297941,8 @@ async def index_vmware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304270,8 +297995,7 @@ async def index_vmware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304320,8 +298044,7 @@ async def index_vmware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304339,7 +298062,7 @@ async def index_vmware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vmware\" @@ -304379,10 +298102,8 @@ async def index_vmware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304435,8 +298156,7 @@ async def index_vmware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304485,8 +298205,7 @@ async def index_vmware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304504,7 +298223,7 @@ async def index_vmware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vmware\" @@ -304544,10 +298263,8 @@ async def index_vmware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304600,8 +298317,7 @@ async def index_vmware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304645,8 +298361,7 @@ def _index_vmware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304659,7 +298374,10 @@ def _index_vmware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -304743,13 +298461,9 @@ def _index_vmware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -304832,8 +298546,7 @@ async def index_voidsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304851,7 +298564,7 @@ async def index_voidsec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: """Return vulnerability data stored in index \"voidsec\" @@ -304891,10 +298604,8 @@ async def index_voidsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304947,8 +298658,7 @@ async def index_voidsec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304997,8 +298707,7 @@ async def index_voidsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305016,7 +298725,7 @@ async def index_voidsec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: """Return vulnerability data stored in index \"voidsec\" @@ -305056,10 +298765,8 @@ async def index_voidsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305112,8 +298819,7 @@ async def index_voidsec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305162,8 +298868,7 @@ async def index_voidsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305181,7 +298886,7 @@ async def index_voidsec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"voidsec\" @@ -305221,10 +298926,8 @@ async def index_voidsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305277,8 +298980,7 @@ async def index_voidsec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305322,8 +299024,7 @@ def _index_voidsec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305336,7 +299037,10 @@ def _index_voidsec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -305420,13 +299124,9 @@ def _index_voidsec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -305502,8 +299202,8 @@ async def index_vulncheck_canaries10d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305521,7 +299221,7 @@ async def index_vulncheck_canaries10d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305547,10 +299247,10 @@ async def index_vulncheck_canaries10d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305596,8 +299296,8 @@ async def index_vulncheck_canaries10d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305639,8 +299339,8 @@ async def index_vulncheck_canaries10d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305658,7 +299358,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305684,10 +299384,10 @@ async def index_vulncheck_canaries10d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305733,8 +299433,8 @@ async def index_vulncheck_canaries10d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305776,8 +299476,8 @@ async def index_vulncheck_canaries10d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305795,7 +299495,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305821,10 +299521,10 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305870,8 +299570,8 @@ async def index_vulncheck_canaries10d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305908,8 +299608,8 @@ def _index_vulncheck_canaries10d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305922,7 +299622,10 @@ def _index_vulncheck_canaries10d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -305978,13 +299681,13 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -306060,8 +299763,8 @@ async def index_vulncheck_canaries30d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306079,7 +299782,7 @@ async def index_vulncheck_canaries30d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306105,10 +299808,10 @@ async def index_vulncheck_canaries30d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306154,8 +299857,8 @@ async def index_vulncheck_canaries30d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306197,8 +299900,8 @@ async def index_vulncheck_canaries30d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306216,7 +299919,7 @@ async def index_vulncheck_canaries30d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306242,10 +299945,10 @@ async def index_vulncheck_canaries30d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306291,8 +299994,8 @@ async def index_vulncheck_canaries30d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306334,8 +300037,8 @@ async def index_vulncheck_canaries30d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306353,7 +300056,7 @@ async def index_vulncheck_canaries30d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306379,10 +300082,10 @@ async def index_vulncheck_canaries30d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306428,8 +300131,8 @@ async def index_vulncheck_canaries30d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306466,8 +300169,8 @@ def _index_vulncheck_canaries30d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -306480,7 +300183,10 @@ def _index_vulncheck_canaries30d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -306536,13 +300242,13 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -306618,8 +300324,8 @@ async def index_vulncheck_canaries3d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306637,7 +300343,7 @@ async def index_vulncheck_canaries3d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306663,10 +300369,10 @@ async def index_vulncheck_canaries3d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306712,8 +300418,8 @@ async def index_vulncheck_canaries3d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306755,8 +300461,8 @@ async def index_vulncheck_canaries3d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306774,7 +300480,7 @@ async def index_vulncheck_canaries3d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306800,10 +300506,10 @@ async def index_vulncheck_canaries3d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306849,8 +300555,8 @@ async def index_vulncheck_canaries3d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306892,8 +300598,8 @@ async def index_vulncheck_canaries3d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306911,7 +300617,7 @@ async def index_vulncheck_canaries3d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306937,10 +300643,10 @@ async def index_vulncheck_canaries3d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306986,8 +300692,8 @@ async def index_vulncheck_canaries3d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307024,8 +300730,8 @@ def _index_vulncheck_canaries3d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307038,7 +300744,10 @@ def _index_vulncheck_canaries3d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -307094,13 +300803,13 @@ def _index_vulncheck_canaries3d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -307176,8 +300885,8 @@ async def index_vulncheck_canaries90d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307195,7 +300904,7 @@ async def index_vulncheck_canaries90d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307221,10 +300930,10 @@ async def index_vulncheck_canaries90d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307270,8 +300979,8 @@ async def index_vulncheck_canaries90d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307313,8 +301022,8 @@ async def index_vulncheck_canaries90d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307332,7 +301041,7 @@ async def index_vulncheck_canaries90d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307358,10 +301067,10 @@ async def index_vulncheck_canaries90d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307407,8 +301116,8 @@ async def index_vulncheck_canaries90d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307450,8 +301159,8 @@ async def index_vulncheck_canaries90d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307469,7 +301178,7 @@ async def index_vulncheck_canaries90d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307495,10 +301204,10 @@ async def index_vulncheck_canaries90d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307544,8 +301253,8 @@ async def index_vulncheck_canaries90d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307582,8 +301291,8 @@ def _index_vulncheck_canaries90d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307596,7 +301305,10 @@ def _index_vulncheck_canaries90d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -307652,13 +301364,13 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -307734,8 +301446,8 @@ async def index_vulncheck_canaries_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307753,7 +301465,7 @@ async def index_vulncheck_canaries_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -307779,10 +301491,10 @@ async def index_vulncheck_canaries_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307828,8 +301540,8 @@ async def index_vulncheck_canaries_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307871,8 +301583,8 @@ async def index_vulncheck_canaries_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307890,7 +301602,7 @@ async def index_vulncheck_canaries_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -307916,10 +301628,10 @@ async def index_vulncheck_canaries_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307965,8 +301677,8 @@ async def index_vulncheck_canaries_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308008,8 +301720,8 @@ async def index_vulncheck_canaries_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308027,7 +301739,7 @@ async def index_vulncheck_canaries_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -308053,10 +301765,10 @@ async def index_vulncheck_canaries_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308102,8 +301814,8 @@ async def index_vulncheck_canaries_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308140,8 +301852,8 @@ def _index_vulncheck_canaries_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308154,7 +301866,10 @@ def _index_vulncheck_canaries_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -308210,13 +301925,13 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -308299,8 +302014,7 @@ async def index_vulncheck_config_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308318,7 +302032,7 @@ async def index_vulncheck_config_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308358,10 +302072,8 @@ async def index_vulncheck_config_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308414,8 +302126,7 @@ async def index_vulncheck_config_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308464,8 +302175,7 @@ async def index_vulncheck_config_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308483,7 +302193,7 @@ async def index_vulncheck_config_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308523,10 +302233,8 @@ async def index_vulncheck_config_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308579,8 +302287,7 @@ async def index_vulncheck_config_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308629,8 +302336,7 @@ async def index_vulncheck_config_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308648,7 +302354,7 @@ async def index_vulncheck_config_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308688,10 +302394,8 @@ async def index_vulncheck_config_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308744,8 +302448,7 @@ async def index_vulncheck_config_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308789,8 +302492,7 @@ def _index_vulncheck_config_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308803,7 +302505,10 @@ def _index_vulncheck_config_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -308887,13 +302592,9 @@ def _index_vulncheck_config_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -308976,8 +302677,7 @@ async def index_vulncheck_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308995,7 +302695,7 @@ async def index_vulncheck_cvelist_v5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309035,10 +302735,8 @@ async def index_vulncheck_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309091,8 +302789,7 @@ async def index_vulncheck_cvelist_v5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309141,8 +302838,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309160,7 +302856,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309200,10 +302896,8 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309256,8 +302950,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309306,8 +302999,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309325,7 +303017,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309365,10 +303057,8 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309421,8 +303111,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309466,8 +303155,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -309480,7 +303168,10 @@ def _index_vulncheck_cvelist_v5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -309564,13 +303255,9 @@ def _index_vulncheck_cvelist_v5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -309653,8 +303340,7 @@ async def index_vulncheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309672,7 +303358,7 @@ async def index_vulncheck_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: """Return vulnerability data stored in index \"vulncheck\" @@ -309712,10 +303398,8 @@ async def index_vulncheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309768,8 +303452,7 @@ async def index_vulncheck_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309818,8 +303501,7 @@ async def index_vulncheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309837,7 +303519,7 @@ async def index_vulncheck_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: """Return vulnerability data stored in index \"vulncheck\" @@ -309877,10 +303559,8 @@ async def index_vulncheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309933,8 +303613,7 @@ async def index_vulncheck_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309983,8 +303662,7 @@ async def index_vulncheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310002,7 +303680,7 @@ async def index_vulncheck_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck\" @@ -310042,10 +303720,8 @@ async def index_vulncheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310098,8 +303774,7 @@ async def index_vulncheck_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310143,8 +303818,7 @@ def _index_vulncheck_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310157,7 +303831,10 @@ def _index_vulncheck_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -310241,13 +303918,9 @@ def _index_vulncheck_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -310330,8 +304003,7 @@ async def index_vulncheck_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310349,7 +304021,7 @@ async def index_vulncheck_kev_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310389,10 +304061,8 @@ async def index_vulncheck_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310445,8 +304115,7 @@ async def index_vulncheck_kev_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310495,8 +304164,7 @@ async def index_vulncheck_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310514,7 +304182,7 @@ async def index_vulncheck_kev_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310554,10 +304222,8 @@ async def index_vulncheck_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310610,8 +304276,7 @@ async def index_vulncheck_kev_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310660,8 +304325,7 @@ async def index_vulncheck_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310679,7 +304343,7 @@ async def index_vulncheck_kev_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310719,10 +304383,8 @@ async def index_vulncheck_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310775,8 +304437,7 @@ async def index_vulncheck_kev_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310820,8 +304481,7 @@ def _index_vulncheck_kev_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310834,7 +304494,10 @@ def _index_vulncheck_kev_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -310918,13 +304581,9 @@ def _index_vulncheck_kev_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -311007,8 +304666,7 @@ async def index_vulncheck_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311026,7 +304684,7 @@ async def index_vulncheck_nvd2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311066,10 +304724,8 @@ async def index_vulncheck_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311122,8 +304778,7 @@ async def index_vulncheck_nvd2_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311172,8 +304827,7 @@ async def index_vulncheck_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311191,7 +304845,7 @@ async def index_vulncheck_nvd2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311231,10 +304885,8 @@ async def index_vulncheck_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311287,8 +304939,7 @@ async def index_vulncheck_nvd2_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311337,8 +304988,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311356,7 +305006,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311396,10 +305046,8 @@ async def index_vulncheck_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311452,8 +305100,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311497,8 +305144,7 @@ def _index_vulncheck_nvd2_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -311511,7 +305157,10 @@ def _index_vulncheck_nvd2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -311595,13 +305244,9 @@ def _index_vulncheck_nvd2_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -311684,8 +305329,7 @@ async def index_vulncheck_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311703,7 +305347,7 @@ async def index_vulncheck_nvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -311743,10 +305387,8 @@ async def index_vulncheck_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311799,8 +305441,7 @@ async def index_vulncheck_nvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311849,8 +305490,7 @@ async def index_vulncheck_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311868,7 +305508,7 @@ async def index_vulncheck_nvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -311908,10 +305548,8 @@ async def index_vulncheck_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311964,8 +305602,7 @@ async def index_vulncheck_nvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312014,8 +305651,7 @@ async def index_vulncheck_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312033,7 +305669,7 @@ async def index_vulncheck_nvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -312073,10 +305709,8 @@ async def index_vulncheck_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312129,8 +305763,7 @@ async def index_vulncheck_nvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312174,8 +305807,7 @@ def _index_vulncheck_nvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312188,7 +305820,10 @@ def _index_vulncheck_nvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -312272,13 +305907,9 @@ def _index_vulncheck_nvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -312361,8 +305992,7 @@ async def index_vulnerability_aliases_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312380,7 +306010,7 @@ async def index_vulnerability_aliases_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312420,10 +306050,8 @@ async def index_vulnerability_aliases_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312476,8 +306104,7 @@ async def index_vulnerability_aliases_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312526,8 +306153,7 @@ async def index_vulnerability_aliases_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312545,7 +306171,7 @@ async def index_vulnerability_aliases_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312585,10 +306211,8 @@ async def index_vulnerability_aliases_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312641,8 +306265,7 @@ async def index_vulnerability_aliases_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312691,8 +306314,7 @@ async def index_vulnerability_aliases_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312710,7 +306332,7 @@ async def index_vulnerability_aliases_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312750,10 +306372,8 @@ async def index_vulnerability_aliases_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312806,8 +306426,7 @@ async def index_vulnerability_aliases_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312851,8 +306470,7 @@ def _index_vulnerability_aliases_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312865,7 +306483,10 @@ def _index_vulnerability_aliases_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -312949,13 +306570,9 @@ def _index_vulnerability_aliases_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -313038,8 +306655,7 @@ async def index_vulnrichment_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313057,7 +306673,7 @@ async def index_vulnrichment_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: """Return vulnerability data stored in index \"vulnrichment\" @@ -313097,10 +306713,8 @@ async def index_vulnrichment_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313153,8 +306767,7 @@ async def index_vulnrichment_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313203,8 +306816,7 @@ async def index_vulnrichment_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313222,7 +306834,7 @@ async def index_vulnrichment_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: """Return vulnerability data stored in index \"vulnrichment\" @@ -313262,10 +306874,8 @@ async def index_vulnrichment_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313318,8 +306928,7 @@ async def index_vulnrichment_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313368,8 +306977,7 @@ async def index_vulnrichment_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313387,7 +306995,7 @@ async def index_vulnrichment_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulnrichment\" @@ -313427,10 +307035,8 @@ async def index_vulnrichment_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313483,8 +307089,7 @@ async def index_vulnrichment_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313528,8 +307133,7 @@ def _index_vulnrichment_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -313542,7 +307146,10 @@ def _index_vulnrichment_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -313626,13 +307233,9 @@ def _index_vulnrichment_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -313715,8 +307318,7 @@ async def index_vyaire_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313734,7 +307336,7 @@ async def index_vyaire_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vyaire\" @@ -313774,10 +307376,8 @@ async def index_vyaire_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313830,8 +307430,7 @@ async def index_vyaire_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313880,8 +307479,7 @@ async def index_vyaire_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313899,7 +307497,7 @@ async def index_vyaire_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vyaire\" @@ -313939,10 +307537,8 @@ async def index_vyaire_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313995,8 +307591,7 @@ async def index_vyaire_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314045,8 +307640,7 @@ async def index_vyaire_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314064,7 +307658,7 @@ async def index_vyaire_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vyaire\" @@ -314104,10 +307698,8 @@ async def index_vyaire_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314160,8 +307752,7 @@ async def index_vyaire_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314205,8 +307796,7 @@ def _index_vyaire_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314219,7 +307809,10 @@ def _index_vyaire_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -314303,13 +307896,9 @@ def _index_vyaire_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -314392,8 +307981,7 @@ async def index_watchguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314411,7 +307999,7 @@ async def index_watchguard_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: """Return vulnerability data stored in index \"watchguard\" @@ -314451,10 +308039,8 @@ async def index_watchguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314507,8 +308093,7 @@ async def index_watchguard_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314557,8 +308142,7 @@ async def index_watchguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314576,7 +308160,7 @@ async def index_watchguard_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: """Return vulnerability data stored in index \"watchguard\" @@ -314616,10 +308200,8 @@ async def index_watchguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314672,8 +308254,7 @@ async def index_watchguard_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314722,8 +308303,7 @@ async def index_watchguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314741,7 +308321,7 @@ async def index_watchguard_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"watchguard\" @@ -314781,10 +308361,8 @@ async def index_watchguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314837,8 +308415,7 @@ async def index_watchguard_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314882,8 +308459,7 @@ def _index_watchguard_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314896,7 +308472,10 @@ def _index_watchguard_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -314980,13 +308559,9 @@ def _index_watchguard_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -315069,8 +308644,7 @@ async def index_whatsapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315088,7 +308662,7 @@ async def index_whatsapp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: """Return vulnerability data stored in index \"whatsapp\" @@ -315128,10 +308702,8 @@ async def index_whatsapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315184,8 +308756,7 @@ async def index_whatsapp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315234,8 +308805,7 @@ async def index_whatsapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315253,7 +308823,7 @@ async def index_whatsapp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: """Return vulnerability data stored in index \"whatsapp\" @@ -315293,10 +308863,8 @@ async def index_whatsapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315349,8 +308917,7 @@ async def index_whatsapp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315399,8 +308966,7 @@ async def index_whatsapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315418,7 +308984,7 @@ async def index_whatsapp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"whatsapp\" @@ -315458,10 +309024,8 @@ async def index_whatsapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315514,8 +309078,7 @@ async def index_whatsapp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315559,8 +309122,7 @@ def _index_whatsapp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -315573,7 +309135,10 @@ def _index_whatsapp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -315657,13 +309222,9 @@ def _index_whatsapp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -315746,8 +309307,7 @@ async def index_wibu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315765,7 +309325,7 @@ async def index_wibu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: """Return vulnerability data stored in index \"wibu\" @@ -315805,10 +309365,8 @@ async def index_wibu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315861,8 +309419,7 @@ async def index_wibu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315911,8 +309468,7 @@ async def index_wibu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315930,7 +309486,7 @@ async def index_wibu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: """Return vulnerability data stored in index \"wibu\" @@ -315970,10 +309526,8 @@ async def index_wibu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316026,8 +309580,7 @@ async def index_wibu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316076,8 +309629,7 @@ async def index_wibu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316095,7 +309647,7 @@ async def index_wibu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wibu\" @@ -316135,10 +309687,8 @@ async def index_wibu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316191,8 +309741,7 @@ async def index_wibu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316236,8 +309785,7 @@ def _index_wibu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316250,7 +309798,10 @@ def _index_wibu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -316334,13 +309885,9 @@ def _index_wibu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -316423,8 +309970,7 @@ async def index_wireshark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316442,7 +309988,7 @@ async def index_wireshark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: """Return vulnerability data stored in index \"wireshark\" @@ -316482,10 +310028,8 @@ async def index_wireshark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316538,8 +310082,7 @@ async def index_wireshark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316588,8 +310131,7 @@ async def index_wireshark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316607,7 +310149,7 @@ async def index_wireshark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: """Return vulnerability data stored in index \"wireshark\" @@ -316647,10 +310189,8 @@ async def index_wireshark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316703,8 +310243,7 @@ async def index_wireshark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316753,8 +310292,7 @@ async def index_wireshark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316772,7 +310310,7 @@ async def index_wireshark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wireshark\" @@ -316812,10 +310350,8 @@ async def index_wireshark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316868,8 +310404,7 @@ async def index_wireshark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316913,8 +310448,7 @@ def _index_wireshark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316927,7 +310461,10 @@ def _index_wireshark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -317011,13 +310548,9 @@ def _index_wireshark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -317100,8 +310633,7 @@ async def index_with_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317119,7 +310651,7 @@ async def index_with_secure_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: """Return vulnerability data stored in index \"with-secure\" @@ -317159,10 +310691,8 @@ async def index_with_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317215,8 +310745,7 @@ async def index_with_secure_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317265,8 +310794,7 @@ async def index_with_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317284,7 +310812,7 @@ async def index_with_secure_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: """Return vulnerability data stored in index \"with-secure\" @@ -317324,10 +310852,8 @@ async def index_with_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317380,8 +310906,7 @@ async def index_with_secure_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317430,8 +310955,7 @@ async def index_with_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317449,7 +310973,7 @@ async def index_with_secure_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"with-secure\" @@ -317489,10 +311013,8 @@ async def index_with_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317545,8 +311067,7 @@ async def index_with_secure_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317590,8 +311111,7 @@ def _index_with_secure_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317604,7 +311124,10 @@ def _index_with_secure_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -317688,13 +311211,9 @@ def _index_with_secure_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -317777,8 +311296,7 @@ async def index_wolfi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317796,7 +311314,7 @@ async def index_wolfi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: """Return vulnerability data stored in index \"wolfi\" @@ -317836,10 +311354,8 @@ async def index_wolfi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317892,8 +311408,7 @@ async def index_wolfi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317942,8 +311457,7 @@ async def index_wolfi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317961,7 +311475,7 @@ async def index_wolfi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: """Return vulnerability data stored in index \"wolfi\" @@ -318001,10 +311515,8 @@ async def index_wolfi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318057,8 +311569,7 @@ async def index_wolfi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318107,8 +311618,7 @@ async def index_wolfi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318126,7 +311636,7 @@ async def index_wolfi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wolfi\" @@ -318166,10 +311676,8 @@ async def index_wolfi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318222,8 +311730,7 @@ async def index_wolfi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318267,8 +311774,7 @@ def _index_wolfi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318281,7 +311787,10 @@ def _index_wolfi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -318365,13 +311874,9 @@ def _index_wolfi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -318454,8 +311959,7 @@ async def index_wolfssl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318473,7 +311977,7 @@ async def index_wolfssl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: """Return vulnerability data stored in index \"wolfssl\" @@ -318513,10 +312017,8 @@ async def index_wolfssl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318569,8 +312071,7 @@ async def index_wolfssl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318619,8 +312120,7 @@ async def index_wolfssl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318638,7 +312138,7 @@ async def index_wolfssl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: """Return vulnerability data stored in index \"wolfssl\" @@ -318678,10 +312178,8 @@ async def index_wolfssl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318734,8 +312232,7 @@ async def index_wolfssl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318784,8 +312281,7 @@ async def index_wolfssl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318803,7 +312299,7 @@ async def index_wolfssl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wolfssl\" @@ -318843,10 +312339,8 @@ async def index_wolfssl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318899,8 +312393,7 @@ async def index_wolfssl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318944,8 +312437,7 @@ def _index_wolfssl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318958,7 +312450,10 @@ def _index_wolfssl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -319042,13 +312537,9 @@ def _index_wolfssl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -319131,8 +312622,7 @@ async def index_wordfence_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319150,7 +312640,7 @@ async def index_wordfence_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: """Return vulnerability data stored in index \"wordfence\" @@ -319190,10 +312680,8 @@ async def index_wordfence_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319246,8 +312734,7 @@ async def index_wordfence_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319296,8 +312783,7 @@ async def index_wordfence_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319315,7 +312801,7 @@ async def index_wordfence_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: """Return vulnerability data stored in index \"wordfence\" @@ -319355,10 +312841,8 @@ async def index_wordfence_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319411,8 +312895,7 @@ async def index_wordfence_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319461,8 +312944,7 @@ async def index_wordfence_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319480,7 +312962,7 @@ async def index_wordfence_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wordfence\" @@ -319520,10 +313002,8 @@ async def index_wordfence_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319576,8 +313056,7 @@ async def index_wordfence_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319621,8 +313100,7 @@ def _index_wordfence_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319635,7 +313113,10 @@ def _index_wordfence_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -319719,13 +313200,9 @@ def _index_wordfence_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -319808,8 +313285,7 @@ async def index_xen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319827,7 +313303,7 @@ async def index_xen_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: """Return vulnerability data stored in index \"xen\" @@ -319867,10 +313343,8 @@ async def index_xen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319923,8 +313397,7 @@ async def index_xen_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319973,8 +313446,7 @@ async def index_xen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319992,7 +313464,7 @@ async def index_xen_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: """Return vulnerability data stored in index \"xen\" @@ -320032,10 +313504,8 @@ async def index_xen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320088,8 +313558,7 @@ async def index_xen_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320138,8 +313607,7 @@ async def index_xen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320157,7 +313625,7 @@ async def index_xen_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xen\" @@ -320197,10 +313665,8 @@ async def index_xen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320253,8 +313719,7 @@ async def index_xen_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320298,8 +313763,7 @@ def _index_xen_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320312,7 +313776,10 @@ def _index_xen_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -320396,13 +313863,9 @@ def _index_xen_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -320485,8 +313948,7 @@ async def index_xerox_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320504,7 +313966,7 @@ async def index_xerox_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: """Return vulnerability data stored in index \"xerox\" @@ -320544,10 +314006,8 @@ async def index_xerox_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320600,8 +314060,7 @@ async def index_xerox_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320650,8 +314109,7 @@ async def index_xerox_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320669,7 +314127,7 @@ async def index_xerox_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: """Return vulnerability data stored in index \"xerox\" @@ -320709,10 +314167,8 @@ async def index_xerox_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320765,8 +314221,7 @@ async def index_xerox_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320815,8 +314270,7 @@ async def index_xerox_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320834,7 +314288,7 @@ async def index_xerox_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xerox\" @@ -320874,10 +314328,8 @@ async def index_xerox_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320930,8 +314382,7 @@ async def index_xerox_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320975,8 +314426,7 @@ def _index_xerox_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320989,7 +314439,10 @@ def _index_xerox_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -321073,13 +314526,9 @@ def _index_xerox_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -321162,8 +314611,7 @@ async def index_xiaomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321181,7 +314629,7 @@ async def index_xiaomi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: """Return vulnerability data stored in index \"xiaomi\" @@ -321221,10 +314669,8 @@ async def index_xiaomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321277,8 +314723,7 @@ async def index_xiaomi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321327,8 +314772,7 @@ async def index_xiaomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321346,7 +314790,7 @@ async def index_xiaomi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: """Return vulnerability data stored in index \"xiaomi\" @@ -321386,10 +314830,8 @@ async def index_xiaomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321442,8 +314884,7 @@ async def index_xiaomi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321492,8 +314933,7 @@ async def index_xiaomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321511,7 +314951,7 @@ async def index_xiaomi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xiaomi\" @@ -321551,10 +314991,8 @@ async def index_xiaomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321607,8 +315045,7 @@ async def index_xiaomi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321652,8 +315089,7 @@ def _index_xiaomi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321666,7 +315102,10 @@ def _index_xiaomi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -321750,13 +315189,9 @@ def _index_xiaomi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -321839,8 +315274,7 @@ async def index_xylem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321858,7 +315292,7 @@ async def index_xylem_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: """Return vulnerability data stored in index \"xylem\" @@ -321898,10 +315332,8 @@ async def index_xylem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321954,8 +315386,7 @@ async def index_xylem_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322004,8 +315435,7 @@ async def index_xylem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322023,7 +315453,7 @@ async def index_xylem_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: """Return vulnerability data stored in index \"xylem\" @@ -322063,10 +315493,8 @@ async def index_xylem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322119,8 +315547,7 @@ async def index_xylem_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322169,8 +315596,7 @@ async def index_xylem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322188,7 +315614,7 @@ async def index_xylem_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xylem\" @@ -322228,10 +315654,8 @@ async def index_xylem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322284,8 +315708,7 @@ async def index_xylem_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322329,8 +315752,7 @@ def _index_xylem_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -322343,7 +315765,10 @@ def _index_xylem_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -322427,13 +315852,9 @@ def _index_xylem_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -322516,8 +315937,7 @@ async def index_yamaha_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322535,7 +315955,7 @@ async def index_yamaha_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: """Return vulnerability data stored in index \"yamaha\" @@ -322575,10 +315995,8 @@ async def index_yamaha_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322631,8 +316049,7 @@ async def index_yamaha_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322681,8 +316098,7 @@ async def index_yamaha_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322700,7 +316116,7 @@ async def index_yamaha_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: """Return vulnerability data stored in index \"yamaha\" @@ -322740,10 +316156,8 @@ async def index_yamaha_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322796,8 +316210,7 @@ async def index_yamaha_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322846,8 +316259,7 @@ async def index_yamaha_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322865,7 +316277,7 @@ async def index_yamaha_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yamaha\" @@ -322905,10 +316317,8 @@ async def index_yamaha_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322961,8 +316371,7 @@ async def index_yamaha_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323006,8 +316415,7 @@ def _index_yamaha_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323020,7 +316428,10 @@ def _index_yamaha_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -323104,13 +316515,9 @@ def _index_yamaha_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -323193,8 +316600,7 @@ async def index_yokogawa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323212,7 +316618,7 @@ async def index_yokogawa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"yokogawa\" @@ -323252,10 +316658,8 @@ async def index_yokogawa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323308,8 +316712,7 @@ async def index_yokogawa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323358,8 +316761,7 @@ async def index_yokogawa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323377,7 +316779,7 @@ async def index_yokogawa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"yokogawa\" @@ -323417,10 +316819,8 @@ async def index_yokogawa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323473,8 +316873,7 @@ async def index_yokogawa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323523,8 +316922,7 @@ async def index_yokogawa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323542,7 +316940,7 @@ async def index_yokogawa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yokogawa\" @@ -323582,10 +316980,8 @@ async def index_yokogawa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323638,8 +317034,7 @@ async def index_yokogawa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323683,8 +317078,7 @@ def _index_yokogawa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323697,7 +317091,10 @@ def _index_yokogawa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -323781,13 +317178,9 @@ def _index_yokogawa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -323870,8 +317263,7 @@ async def index_yubico_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323889,7 +317281,7 @@ async def index_yubico_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: """Return vulnerability data stored in index \"yubico\" @@ -323929,10 +317321,8 @@ async def index_yubico_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323985,8 +317375,7 @@ async def index_yubico_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324035,8 +317424,7 @@ async def index_yubico_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324054,7 +317442,7 @@ async def index_yubico_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: """Return vulnerability data stored in index \"yubico\" @@ -324094,10 +317482,8 @@ async def index_yubico_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324150,8 +317536,7 @@ async def index_yubico_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324200,8 +317585,7 @@ async def index_yubico_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324219,7 +317603,7 @@ async def index_yubico_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yubico\" @@ -324259,10 +317643,8 @@ async def index_yubico_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324315,8 +317697,7 @@ async def index_yubico_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324360,8 +317741,7 @@ def _index_yubico_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -324374,7 +317754,10 @@ def _index_yubico_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -324458,13 +317841,9 @@ def _index_yubico_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -324547,8 +317926,7 @@ async def index_zdi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324566,7 +317944,7 @@ async def index_zdi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: """Return vulnerability data stored in index \"zdi\" @@ -324606,10 +317984,8 @@ async def index_zdi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324662,8 +318038,7 @@ async def index_zdi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324712,8 +318087,7 @@ async def index_zdi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324731,7 +318105,7 @@ async def index_zdi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"zdi\" @@ -324771,10 +318145,8 @@ async def index_zdi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324827,8 +318199,7 @@ async def index_zdi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324877,8 +318248,7 @@ async def index_zdi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324896,7 +318266,7 @@ async def index_zdi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zdi\" @@ -324936,10 +318306,8 @@ async def index_zdi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324992,8 +318360,7 @@ async def index_zdi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325037,8 +318404,7 @@ def _index_zdi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325051,7 +318417,10 @@ def _index_zdi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -325135,13 +318504,9 @@ def _index_zdi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -325224,8 +318589,7 @@ async def index_zebra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325243,7 +318607,7 @@ async def index_zebra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination: """Return vulnerability data stored in index \"zebra\" @@ -325283,10 +318647,8 @@ async def index_zebra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325339,8 +318701,7 @@ async def index_zebra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325389,8 +318750,7 @@ async def index_zebra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325408,7 +318768,7 @@ async def index_zebra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination]: """Return vulnerability data stored in index \"zebra\" @@ -325448,10 +318808,8 @@ async def index_zebra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325504,8 +318862,7 @@ async def index_zebra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325554,8 +318911,7 @@ async def index_zebra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325573,7 +318929,7 @@ async def index_zebra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zebra\" @@ -325613,10 +318969,8 @@ async def index_zebra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325669,8 +319023,7 @@ async def index_zebra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325714,8 +319067,7 @@ def _index_zebra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325728,7 +319080,10 @@ def _index_zebra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -325812,13 +319167,9 @@ def _index_zebra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -325901,8 +319252,7 @@ async def index_zeroscience_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325920,7 +319270,7 @@ async def index_zeroscience_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination: """Return vulnerability data stored in index \"zeroscience\" @@ -325960,10 +319310,8 @@ async def index_zeroscience_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326016,8 +319364,7 @@ async def index_zeroscience_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326066,8 +319413,7 @@ async def index_zeroscience_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326085,7 +319431,7 @@ async def index_zeroscience_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"zeroscience\" @@ -326125,10 +319471,8 @@ async def index_zeroscience_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326181,8 +319525,7 @@ async def index_zeroscience_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326231,8 +319574,7 @@ async def index_zeroscience_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326250,7 +319592,7 @@ async def index_zeroscience_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zeroscience\" @@ -326290,10 +319632,8 @@ async def index_zeroscience_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326346,8 +319686,7 @@ async def index_zeroscience_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326391,8 +319730,7 @@ def _index_zeroscience_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -326405,7 +319743,10 @@ def _index_zeroscience_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -326489,13 +319830,9 @@ def _index_zeroscience_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -326578,8 +319915,7 @@ async def index_zimbra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326597,7 +319933,7 @@ async def index_zimbra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination: """Return vulnerability data stored in index \"zimbra\" @@ -326637,10 +319973,8 @@ async def index_zimbra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326693,8 +320027,7 @@ async def index_zimbra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326743,8 +320076,7 @@ async def index_zimbra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326762,7 +320094,7 @@ async def index_zimbra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination]: """Return vulnerability data stored in index \"zimbra\" @@ -326802,10 +320134,8 @@ async def index_zimbra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326858,8 +320188,7 @@ async def index_zimbra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326908,8 +320237,7 @@ async def index_zimbra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326927,7 +320255,7 @@ async def index_zimbra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zimbra\" @@ -326967,10 +320295,8 @@ async def index_zimbra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327023,8 +320349,7 @@ async def index_zimbra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327068,8 +320393,7 @@ def _index_zimbra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327082,7 +320406,10 @@ def _index_zimbra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -327166,13 +320493,9 @@ def _index_zimbra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -327255,8 +320578,7 @@ async def index_zoom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327274,7 +320596,7 @@ async def index_zoom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination: """Return vulnerability data stored in index \"zoom\" @@ -327314,10 +320636,8 @@ async def index_zoom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327370,8 +320690,7 @@ async def index_zoom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327420,8 +320739,7 @@ async def index_zoom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327439,7 +320757,7 @@ async def index_zoom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination]: """Return vulnerability data stored in index \"zoom\" @@ -327479,10 +320797,8 @@ async def index_zoom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327535,8 +320851,7 @@ async def index_zoom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327585,8 +320900,7 @@ async def index_zoom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327604,7 +320918,7 @@ async def index_zoom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zoom\" @@ -327644,10 +320958,8 @@ async def index_zoom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327700,8 +321012,7 @@ async def index_zoom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327745,8 +321056,7 @@ def _index_zoom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327759,7 +321069,10 @@ def _index_zoom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -327843,13 +321156,9 @@ def _index_zoom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -327932,8 +321241,7 @@ async def index_zscaler_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327951,7 +321259,7 @@ async def index_zscaler_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination: """Return vulnerability data stored in index \"zscaler\" @@ -327991,10 +321299,8 @@ async def index_zscaler_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328047,8 +321353,7 @@ async def index_zscaler_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328097,8 +321402,7 @@ async def index_zscaler_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328116,7 +321420,7 @@ async def index_zscaler_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination]: """Return vulnerability data stored in index \"zscaler\" @@ -328156,10 +321460,8 @@ async def index_zscaler_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328212,8 +321514,7 @@ async def index_zscaler_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328262,8 +321563,7 @@ async def index_zscaler_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328281,7 +321581,7 @@ async def index_zscaler_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zscaler\" @@ -328321,10 +321621,8 @@ async def index_zscaler_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328377,8 +321675,7 @@ async def index_zscaler_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328422,8 +321719,7 @@ def _index_zscaler_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -328436,7 +321732,10 @@ def _index_zscaler_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -328520,13 +321819,9 @@ def _index_zscaler_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -328609,8 +321904,7 @@ async def index_zuso_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328628,7 +321922,7 @@ async def index_zuso_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination: """Return vulnerability data stored in index \"zuso\" @@ -328668,10 +321962,8 @@ async def index_zuso_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328724,8 +322016,7 @@ async def index_zuso_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328774,8 +322065,7 @@ async def index_zuso_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328793,7 +322083,7 @@ async def index_zuso_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination]: """Return vulnerability data stored in index \"zuso\" @@ -328833,10 +322123,8 @@ async def index_zuso_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328889,8 +322177,7 @@ async def index_zuso_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328939,8 +322226,7 @@ async def index_zuso_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328958,7 +322244,7 @@ async def index_zuso_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zuso\" @@ -328998,10 +322284,8 @@ async def index_zuso_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329054,8 +322338,7 @@ async def index_zuso_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329099,8 +322382,7 @@ def _index_zuso_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329113,7 +322395,10 @@ def _index_zuso_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -329197,13 +322482,9 @@ def _index_zuso_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -329286,8 +322567,7 @@ async def index_zyxel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329305,7 +322585,7 @@ async def index_zyxel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination: """Return vulnerability data stored in index \"zyxel\" @@ -329345,10 +322625,8 @@ async def index_zyxel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329401,8 +322679,7 @@ async def index_zyxel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329451,8 +322728,7 @@ async def index_zyxel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329470,7 +322746,7 @@ async def index_zyxel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination]: """Return vulnerability data stored in index \"zyxel\" @@ -329510,10 +322786,8 @@ async def index_zyxel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329566,8 +322840,7 @@ async def index_zyxel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329616,8 +322889,7 @@ async def index_zyxel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329635,7 +322907,7 @@ async def index_zyxel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zyxel\" @@ -329675,10 +322947,8 @@ async def index_zyxel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329731,8 +323001,7 @@ async def index_zyxel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329776,8 +323045,7 @@ def _index_zyxel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329790,7 +323058,10 @@ def _index_zyxel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -329874,13 +323145,9 @@ def _index_zyxel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: diff --git a/vulncheck_sdk/aio/api_client.py b/vulncheck_sdk/aio/api_client.py index 109e7779..7a3c5ebf 100644 --- a/vulncheck_sdk/aio/api_client.py +++ b/vulncheck_sdk/aio/api_client.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.41/python' + self.user_agent = 'OpenAPI-Generator/0.0.42/python' self.client_side_validation = configuration.client_side_validation async def __aenter__(self): diff --git a/vulncheck_sdk/aio/configuration.py b/vulncheck_sdk/aio/configuration.py index 0f3eab8f..58b48ab9 100644 --- a/vulncheck_sdk/aio/configuration.py +++ b/vulncheck_sdk/aio/configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -213,7 +213,7 @@ def __init__( ) -> None: """Constructor """ - self._base_path = "/v3" if host is None else host + self._base_path = "https://api.vulncheck.com/v3" if host is None else host """Default Base url """ self.server_index = 0 if server_index is None and host is None else server_index @@ -531,8 +531,8 @@ def to_debug_report(self) -> str: return "Python SDK Debug Report:\n"\ "OS: {env}\n"\ "Python Version: {pyversion}\n"\ - "Version of the API: 3.0\n"\ - "SDK Package Version: 0.0.41".\ + "Version of the API: latest\n"\ + "SDK Package Version: 0.0.42".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: @@ -542,7 +542,11 @@ def get_host_settings(self) -> List[HostSetting]: """ return [ { - 'url': "/v3", + 'url': "https://api.vulncheck.com/v3", + 'description': "No description provided", + }, + { + 'url': "https://api.vulncheck.com/v4", 'description': "No description provided", } ] diff --git a/vulncheck_sdk/aio/exceptions.py b/vulncheck_sdk/aio/exceptions.py index 655c6473..408eac35 100644 --- a/vulncheck_sdk/aio/exceptions.py +++ b/vulncheck_sdk/aio/exceptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/vulncheck_sdk/aio/models/__init__.py b/vulncheck_sdk/aio/models/__init__.py index db203bca..c7d04bf0 100644 --- a/vulncheck_sdk/aio/models/__init__.py +++ b/vulncheck_sdk/aio/models/__init__.py @@ -4,9 +4,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -160,13 +160,11 @@ from vulncheck_sdk.aio.models.advisory_cve_detail import AdvisoryCVEDetail from vulncheck_sdk.aio.models.advisory_cve_details_link import AdvisoryCVEDetailsLink from vulncheck_sdk.aio.models.advisory_cve_reference import AdvisoryCVEReference -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference from vulncheck_sdk.aio.models.advisory_cvss import AdvisoryCVSS from vulncheck_sdk.aio.models.advisory_cvssv2 import AdvisoryCVSSV2 from vulncheck_sdk.aio.models.advisory_cvssv3 import AdvisoryCVSSV3 from vulncheck_sdk.aio.models.advisory_cvssv40 import AdvisoryCVSSV40 from vulncheck_sdk.aio.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode from vulncheck_sdk.aio.models.advisory_canvas_exploit import AdvisoryCanvasExploit from vulncheck_sdk.aio.models.advisory_capec import AdvisoryCapec from vulncheck_sdk.aio.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory @@ -226,7 +224,6 @@ from vulncheck_sdk.aio.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails from vulncheck_sdk.aio.models.advisory_danfoss import AdvisoryDanfoss from vulncheck_sdk.aio.models.advisory_dassault import AdvisoryDassault -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_debian_cve import AdvisoryDebianCVE from vulncheck_sdk.aio.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory from vulncheck_sdk.aio.models.advisory_dell import AdvisoryDell @@ -236,9 +233,7 @@ from vulncheck_sdk.aio.models.advisory_distro_version import AdvisoryDistroVersion from vulncheck_sdk.aio.models.advisory_django import AdvisoryDjango from vulncheck_sdk.aio.models.advisory_document_metadata import AdvisoryDocumentMetadata -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote from vulncheck_sdk.aio.models.advisory_document_publisher import AdvisoryDocumentPublisher -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking from vulncheck_sdk.aio.models.advisory_dot_cms import AdvisoryDotCMS from vulncheck_sdk.aio.models.advisory_dragos_advisory import AdvisoryDragosAdvisory from vulncheck_sdk.aio.models.advisory_draytek import AdvisoryDraytek @@ -353,7 +348,6 @@ from vulncheck_sdk.aio.models.advisory_ip_intel_record import AdvisoryIpIntelRecord from vulncheck_sdk.aio.models.advisory_israeli_alert import AdvisoryIsraeliAlert from vulncheck_sdk.aio.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.aio.models.advisory_istio import AdvisoryIstio from vulncheck_sdk.aio.models.advisory_ivanti import AdvisoryIvanti from vulncheck_sdk.aio.models.advisory_ivanti_rss import AdvisoryIvantiRSS @@ -534,7 +528,6 @@ from vulncheck_sdk.aio.models.advisory_product import AdvisoryProduct from vulncheck_sdk.aio.models.advisory_product_branch import AdvisoryProductBranch from vulncheck_sdk.aio.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree from vulncheck_sdk.aio.models.advisory_products_affected import AdvisoryProductsAffected from vulncheck_sdk.aio.models.advisory_progress import AdvisoryProgress from vulncheck_sdk.aio.models.advisory_proofpoint import AdvisoryProofpoint @@ -564,12 +557,10 @@ from vulncheck_sdk.aio.models.advisory_redhat_cve import AdvisoryRedhatCVE from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference from vulncheck_sdk.aio.models.advisory_related_rule import AdvisoryRelatedRule -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship from vulncheck_sdk.aio.models.advisory_remediation_data import AdvisoryRemediationData from vulncheck_sdk.aio.models.advisory_renesas import AdvisoryRenesas from vulncheck_sdk.aio.models.advisory_reported_exploit import AdvisoryReportedExploit from vulncheck_sdk.aio.models.advisory_restart_data import AdvisoryRestartData -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision from vulncheck_sdk.aio.models.advisory_revision_history import AdvisoryRevisionHistory from vulncheck_sdk.aio.models.advisory_revive import AdvisoryRevive from vulncheck_sdk.aio.models.advisory_rhel_cve import AdvisoryRhelCVE @@ -603,7 +594,6 @@ from vulncheck_sdk.aio.models.advisory_schneider_cve import AdvisorySchneiderCVE from vulncheck_sdk.aio.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory from vulncheck_sdk.aio.models.advisory_schutzwerk import AdvisorySchutzwerk -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet from vulncheck_sdk.aio.models.advisory_sec_fix import AdvisorySecFix from vulncheck_sdk.aio.models.advisory_security_bulletin import AdvisorySecurityBulletin from vulncheck_sdk.aio.models.advisory_security_lab import AdvisorySecurityLab @@ -655,7 +645,6 @@ from vulncheck_sdk.aio.models.advisory_splunk import AdvisorySplunk from vulncheck_sdk.aio.models.advisory_splunk_product import AdvisorySplunkProduct from vulncheck_sdk.aio.models.advisory_spring import AdvisorySpring -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus from vulncheck_sdk.aio.models.advisory_stormshield import AdvisoryStormshield from vulncheck_sdk.aio.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory from vulncheck_sdk.aio.models.advisory_sudo import AdvisorySudo @@ -677,7 +666,6 @@ from vulncheck_sdk.aio.models.advisory_thales import AdvisoryThales from vulncheck_sdk.aio.models.advisory_the_missing_link import AdvisoryTheMissingLink from vulncheck_sdk.aio.models.advisory_thermo_fisher import AdvisoryThermoFisher -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat from vulncheck_sdk.aio.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.aio.models.advisory_threat_data import AdvisoryThreatData from vulncheck_sdk.aio.models.advisory_tibco import AdvisoryTibco @@ -698,7 +686,6 @@ from vulncheck_sdk.aio.models.advisory_unify import AdvisoryUnify from vulncheck_sdk.aio.models.advisory_unisoc import AdvisoryUnisoc from vulncheck_sdk.aio.models.advisory_update import AdvisoryUpdate -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated from vulncheck_sdk.aio.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel from vulncheck_sdk.aio.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary from vulncheck_sdk.aio.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs @@ -720,7 +707,6 @@ from vulncheck_sdk.aio.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig from vulncheck_sdk.aio.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability from vulncheck_sdk.aio.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage from vulncheck_sdk.aio.models.advisory_vulnerable_product import AdvisoryVulnerableProduct from vulncheck_sdk.aio.models.advisory_vulnrichment import AdvisoryVulnrichment @@ -780,7 +766,6 @@ from vulncheck_sdk.aio.models.api_configurations import ApiConfigurations from vulncheck_sdk.aio.models.api_cve_items import ApiCveItems from vulncheck_sdk.aio.models.api_cve_items_extended import ApiCveItemsExtended -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime from vulncheck_sdk.aio.models.api_description import ApiDescription from vulncheck_sdk.aio.models.api_description_data import ApiDescriptionData from vulncheck_sdk.aio.models.api_epss import ApiEPSS @@ -1335,6 +1320,11 @@ from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata import RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata import RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata from vulncheck_sdk.aio.models.render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata import RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata +from vulncheck_sdk.aio.models.search_error_response import SearchErrorResponse +from vulncheck_sdk.aio.models.search_v4_advisory_meta import SearchV4AdvisoryMeta +from vulncheck_sdk.aio.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue +from vulncheck_sdk.aio.models.search_v4_feed_item import SearchV4FeedItem +from vulncheck_sdk.aio.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue from vulncheck_sdk.aio.models.v3controllers_backup_response_metadata import V3controllersBackupResponseMetadata from vulncheck_sdk.aio.models.v3controllers_purl_response_data import V3controllersPurlResponseData from vulncheck_sdk.aio.models.v3controllers_purl_response_metadata import V3controllersPurlResponseMetadata diff --git a/vulncheck_sdk/aio/models/advisory_a10.py b/vulncheck_sdk/aio/models/advisory_a10.py index 789ea876..08fb3af9 100644 --- a/vulncheck_sdk/aio/models/advisory_a10.py +++ b/vulncheck_sdk/aio/models/advisory_a10.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryA10(BaseModel): """ - AdvisoryA10 + advisory.A10 """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_abb_advisory.py b/vulncheck_sdk/aio/models/advisory_abb_advisory.py index ead5fa58..dc28d01d 100644 --- a/vulncheck_sdk/aio/models/advisory_abb_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_abb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryABBAdvisory(BaseModel): """ - AdvisoryABBAdvisory + advisory.ABBAdvisory """ # noqa: E501 abb_vulnerability_id: Optional[List[StrictStr]] = None csaf: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_abbott.py b/vulncheck_sdk/aio/models/advisory_abbott.py index 6188b796..9fac5776 100644 --- a/vulncheck_sdk/aio/models/advisory_abbott.py +++ b/vulncheck_sdk/aio/models/advisory_abbott.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAbbott(BaseModel): """ - AdvisoryAbbott + advisory.Abbott """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_absolute.py b/vulncheck_sdk/aio/models/advisory_absolute.py index d9bc5b83..353e1c3d 100644 --- a/vulncheck_sdk/aio/models/advisory_absolute.py +++ b/vulncheck_sdk/aio/models/advisory_absolute.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAbsolute(BaseModel): """ - AdvisoryAbsolute + advisory.Absolute """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_acknowledgement.py b/vulncheck_sdk/aio/models/advisory_acknowledgement.py index 52db92a1..8c42ab48 100644 --- a/vulncheck_sdk/aio/models/advisory_acknowledgement.py +++ b/vulncheck_sdk/aio/models/advisory_acknowledgement.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAcknowledgement(BaseModel): """ - AdvisoryAcknowledgement + advisory.Acknowledgement """ # noqa: E501 name: Optional[List[AdvisoryIVal]] = None url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_acronis.py b/vulncheck_sdk/aio/models/advisory_acronis.py index a3e7dbbd..6a681f8b 100644 --- a/vulncheck_sdk/aio/models/advisory_acronis.py +++ b/vulncheck_sdk/aio/models/advisory_acronis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAcronis(BaseModel): """ - AdvisoryAcronis + advisory.Acronis """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_adobe_advisory.py b/vulncheck_sdk/aio/models/advisory_adobe_advisory.py index f97afb7c..6aaba9a2 100644 --- a/vulncheck_sdk/aio/models/advisory_adobe_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_adobe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryAdobeAdvisory(BaseModel): """ - AdvisoryAdobeAdvisory + advisory.AdobeAdvisory """ # noqa: E501 adobe_cves: Optional[List[AdvisoryAdobeCVE]] = None affected: Optional[List[AdvisoryAdobeAffected]] = None diff --git a/vulncheck_sdk/aio/models/advisory_adobe_affected.py b/vulncheck_sdk/aio/models/advisory_adobe_affected.py index d5b8d161..5b5a8a96 100644 --- a/vulncheck_sdk/aio/models/advisory_adobe_affected.py +++ b/vulncheck_sdk/aio/models/advisory_adobe_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeAffected(BaseModel): """ - AdvisoryAdobeAffected + advisory.AdobeAffected """ # noqa: E501 platform: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_adobe_cve.py b/vulncheck_sdk/aio/models/advisory_adobe_cve.py index b0de325e..e128669c 100644 --- a/vulncheck_sdk/aio/models/advisory_adobe_cve.py +++ b/vulncheck_sdk/aio/models/advisory_adobe_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeCVE(BaseModel): """ - AdvisoryAdobeCVE + advisory.AdobeCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_adobe_solution.py b/vulncheck_sdk/aio/models/advisory_adobe_solution.py index c41d761b..94ad925a 100644 --- a/vulncheck_sdk/aio/models/advisory_adobe_solution.py +++ b/vulncheck_sdk/aio/models/advisory_adobe_solution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeSolution(BaseModel): """ - AdvisoryAdobeSolution + advisory.AdobeSolution """ # noqa: E501 platform: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_adp.py b/vulncheck_sdk/aio/models/advisory_adp.py index 9f30a20f..df17b442 100644 --- a/vulncheck_sdk/aio/models/advisory_adp.py +++ b/vulncheck_sdk/aio/models/advisory_adp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryADP(BaseModel): """ - AdvisoryADP + advisory.ADP """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None metrics: Optional[List[AdvisoryVulnrichmentMetric]] = None diff --git a/vulncheck_sdk/aio/models/advisory_adp_container.py b/vulncheck_sdk/aio/models/advisory_adp_container.py index 29e4acbd..c68e2273 100644 --- a/vulncheck_sdk/aio/models/advisory_adp_container.py +++ b/vulncheck_sdk/aio/models/advisory_adp_container.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -32,7 +32,7 @@ class AdvisoryADPContainer(BaseModel): """ - AdvisoryADPContainer + advisory.ADPContainer """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None date_public: Optional[StrictStr] = Field(default=None, description="OK", alias="datePublic") @@ -40,7 +40,7 @@ class AdvisoryADPContainer(BaseModel): impacts: Optional[List[AdvisoryImpact]] = Field(default=None, description="OK") metrics: Optional[List[AdvisoryMetric]] = Field(default=None, description="OK") problem_types: Optional[List[AdvisoryMProblemTypes]] = Field(default=None, description="OK", alias="problemTypes") - provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, description="OK", alias="providerMetadata") + provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, alias="providerMetadata") references: Optional[List[AdvisoryMReference]] = None tags: Optional[List[StrictStr]] = Field(default=None, description="OK") title: Optional[StrictStr] = Field(default=None, description="OK") diff --git a/vulncheck_sdk/aio/models/advisory_advantech.py b/vulncheck_sdk/aio/models/advisory_advantech.py index b2c2cf0f..23e62467 100644 --- a/vulncheck_sdk/aio/models/advisory_advantech.py +++ b/vulncheck_sdk/aio/models/advisory_advantech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdvantech(BaseModel): """ - AdvisoryAdvantech + advisory.Advantech """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_advisory.py b/vulncheck_sdk/aio/models/advisory_advisory.py index f200e2aa..256ad7df 100644 --- a/vulncheck_sdk/aio/models/advisory_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAdvisory(BaseModel): """ - AdvisoryAdvisory + advisory.Advisory """ # noqa: E501 affects: Optional[StrictStr] = None announced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_advisory_details.py b/vulncheck_sdk/aio/models/advisory_advisory_details.py index 930fc1a9..a9a7a41d 100644 --- a/vulncheck_sdk/aio/models/advisory_advisory_details.py +++ b/vulncheck_sdk/aio/models/advisory_advisory_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,24 +18,22 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.aio.models.advisory_bugzilla import AdvisoryBugzilla -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.aio.models.advisory_oval_cve import AdvisoryOvalCVE -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated from typing import Optional, Set from typing_extensions import Self class AdvisoryAdvisoryDetails(BaseModel): """ - AdvisoryAdvisoryDetails + advisory.AdvisoryDetails """ # noqa: E501 bugzilla: Optional[AdvisoryBugzilla] = None cve: Optional[AdvisoryOvalCVE] = None - issued: Optional[AdvisoryIssued] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="advisory.Issued") severity: Optional[StrictStr] = None - updated: Optional[AdvisoryUpdated] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="advisory.Updated") __properties: ClassVar[List[str]] = ["bugzilla", "cve", "issued", "severity", "updated"] model_config = ConfigDict( @@ -83,12 +81,6 @@ def to_dict(self) -> Dict[str, Any]: # override the default output from pydantic by calling `to_dict()` of cve if self.cve: _dict['cve'] = self.cve.to_dict() - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -103,9 +95,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: _obj = cls.model_validate({ "bugzilla": AdvisoryBugzilla.from_dict(obj["bugzilla"]) if obj.get("bugzilla") is not None else None, "cve": AdvisoryOvalCVE.from_dict(obj["cve"]) if obj.get("cve") is not None else None, - "issued": AdvisoryIssued.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "severity": obj.get("severity"), - "updated": AdvisoryUpdated.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_advisory_record.py b/vulncheck_sdk/aio/models/advisory_advisory_record.py index 19215587..5dffdad6 100644 --- a/vulncheck_sdk/aio/models/advisory_advisory_record.py +++ b/vulncheck_sdk/aio/models/advisory_advisory_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdvisoryRecord(BaseModel): """ - AdvisoryAdvisoryRecord + advisory.AdvisoryRecord """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected.py b/vulncheck_sdk/aio/models/advisory_affected.py index dbacf1ba..523070e4 100644 --- a/vulncheck_sdk/aio/models/advisory_affected.py +++ b/vulncheck_sdk/aio/models/advisory_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.aio.models.advisory_osv_package import AdvisoryOSVPackage from vulncheck_sdk.aio.models.advisory_range import AdvisoryRange @@ -28,10 +28,10 @@ class AdvisoryAffected(BaseModel): """ - AdvisoryAffected + advisory.Affected """ # noqa: E501 - database_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the database") - ecosystem_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the ecosystem") + database_specific: Optional[Any] = None + ecosystem_specific: Optional[Any] = None package: Optional[AdvisoryOSVPackage] = None ranges: Optional[List[AdvisoryRange]] = None severity: Optional[List[AdvisorySeverity]] = None @@ -94,6 +94,16 @@ def to_dict(self) -> Dict[str, Any]: if _item_severity: _items.append(_item_severity.to_dict()) _dict['severity'] = _items + # set to None if database_specific (nullable) is None + # and model_fields_set contains the field + if self.database_specific is None and "database_specific" in self.model_fields_set: + _dict['database_specific'] = None + + # set to None if ecosystem_specific (nullable) is None + # and model_fields_set contains the field + if self.ecosystem_specific is None and "ecosystem_specific" in self.model_fields_set: + _dict['ecosystem_specific'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_affected_chrome.py b/vulncheck_sdk/aio/models/advisory_affected_chrome.py index 9d0837b8..9cc7da9a 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_chrome.py +++ b/vulncheck_sdk/aio/models/advisory_affected_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedChrome(BaseModel): """ - AdvisoryAffectedChrome + advisory.AffectedChrome """ # noqa: E501 fixed_version: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_debian_package.py b/vulncheck_sdk/aio/models/advisory_affected_debian_package.py index f4a50c0c..f1b285f7 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_debian_package.py +++ b/vulncheck_sdk/aio/models/advisory_affected_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedDebianPackage(BaseModel): """ - AdvisoryAffectedDebianPackage + advisory.AffectedDebianPackage """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_debian_release.py b/vulncheck_sdk/aio/models/advisory_affected_debian_release.py index e02bc9eb..222236ae 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_debian_release.py +++ b/vulncheck_sdk/aio/models/advisory_affected_debian_release.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAffectedDebianRelease(BaseModel): """ - AdvisoryAffectedDebianRelease + advisory.AffectedDebianRelease """ # noqa: E501 fixed_version: Optional[StrictStr] = None nodsa: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_debian_repository.py b/vulncheck_sdk/aio/models/advisory_affected_debian_repository.py index 43ecc60c..c991191b 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_debian_repository.py +++ b/vulncheck_sdk/aio/models/advisory_affected_debian_repository.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedDebianRepository(BaseModel): """ - AdvisoryAffectedDebianRepository + advisory.AffectedDebianRepository """ # noqa: E501 repository_name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_file.py b/vulncheck_sdk/aio/models/advisory_affected_file.py index d68961c4..0b395dfb 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_file.py +++ b/vulncheck_sdk/aio/models/advisory_affected_file.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedFile(BaseModel): """ - AdvisoryAffectedFile + advisory.AffectedFile """ # noqa: E501 file_last_modified: Optional[StrictStr] = None file_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_product.py b/vulncheck_sdk/aio/models/advisory_affected_product.py index 19c71127..776bfdf2 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_product.py +++ b/vulncheck_sdk/aio/models/advisory_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedProduct(BaseModel): """ - AdvisoryAffectedProduct + advisory.AffectedProduct """ # noqa: E501 affected_releases: Optional[StrictStr] = Field(default=None, alias="affectedReleases") fixed_releases: Optional[StrictStr] = Field(default=None, alias="fixedReleases") diff --git a/vulncheck_sdk/aio/models/advisory_affected_rel.py b/vulncheck_sdk/aio/models/advisory_affected_rel.py index c25e8c63..36af68e8 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_rel.py +++ b/vulncheck_sdk/aio/models/advisory_affected_rel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedRel(BaseModel): """ - AdvisoryAffectedRel + advisory.AffectedRel """ # noqa: E501 advisory: Optional[StrictStr] = None cpe: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_affected_ubuntu_package.py b/vulncheck_sdk/aio/models/advisory_affected_ubuntu_package.py index 9141b83d..f22301c6 100644 --- a/vulncheck_sdk/aio/models/advisory_affected_ubuntu_package.py +++ b/vulncheck_sdk/aio/models/advisory_affected_ubuntu_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAffectedUbuntuPackage(BaseModel): """ - AdvisoryAffectedUbuntuPackage + advisory.AffectedUbuntuPackage """ # noqa: E501 break_commit_url: Optional[List[StrictStr]] = None fix_commit_url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_aix.py b/vulncheck_sdk/aio/models/advisory_aix.py index d83e4db7..f0a14cac 100644 --- a/vulncheck_sdk/aio/models/advisory_aix.py +++ b/vulncheck_sdk/aio/models/advisory_aix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAIX(BaseModel): """ - AdvisoryAIX + advisory.AIX """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_aleph_research.py b/vulncheck_sdk/aio/models/advisory_aleph_research.py index e7410905..d613f957 100644 --- a/vulncheck_sdk/aio/models/advisory_aleph_research.py +++ b/vulncheck_sdk/aio/models/advisory_aleph_research.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlephResearch(BaseModel): """ - AdvisoryAlephResearch + advisory.AlephResearch """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_alibaba.py b/vulncheck_sdk/aio/models/advisory_alibaba.py index a2ea7370..ccc4cdbb 100644 --- a/vulncheck_sdk/aio/models/advisory_alibaba.py +++ b/vulncheck_sdk/aio/models/advisory_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlibaba(BaseModel): """ - AdvisoryAlibaba + advisory.Alibaba """ # noqa: E501 cnnvd: Optional[List[StrictStr]] = None cnvd: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_alma_date.py b/vulncheck_sdk/aio/models/advisory_alma_date.py index e0a45ea3..ba5659ac 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_date.py +++ b/vulncheck_sdk/aio/models/advisory_alma_date.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryAlmaDate(BaseModel): """ - AdvisoryAlmaDate + advisory.AlmaDate """ # noqa: E501 - var_date: Optional[StrictInt] = Field(default=None, alias="$date") + date: Optional[StrictInt] = Field(default=None, alias="$date") __properties: ClassVar[List[str]] = ["$date"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/advisory_alma_linux_update.py b/vulncheck_sdk/aio/models/advisory_alma_linux_update.py index 277353b4..73177fd9 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_linux_update.py +++ b/vulncheck_sdk/aio/models/advisory_alma_linux_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryAlmaLinuxUpdate(BaseModel): """ - AdvisoryAlmaLinuxUpdate + advisory.AlmaLinuxUpdate """ # noqa: E501 bs_repo_id: Optional[AdvisoryAlmaObjectID] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_alma_object_id.py b/vulncheck_sdk/aio/models/advisory_alma_object_id.py index 319b3502..8f7327e5 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_object_id.py +++ b/vulncheck_sdk/aio/models/advisory_alma_object_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaObjectID(BaseModel): """ - AdvisoryAlmaObjectID + advisory.AlmaObjectID """ # noqa: E501 oid: Optional[StrictStr] = Field(default=None, alias="$oid") __properties: ClassVar[List[str]] = ["$oid"] diff --git a/vulncheck_sdk/aio/models/advisory_alma_package.py b/vulncheck_sdk/aio/models/advisory_alma_package.py index d6b76b01..4973a601 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_package.py +++ b/vulncheck_sdk/aio/models/advisory_alma_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaPackage(BaseModel): """ - AdvisoryAlmaPackage + advisory.AlmaPackage """ # noqa: E501 arch: Optional[StrictStr] = None epoch: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_alma_package_list.py b/vulncheck_sdk/aio/models/advisory_alma_package_list.py index 7fb6cbf2..a187619f 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_package_list.py +++ b/vulncheck_sdk/aio/models/advisory_alma_package_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlmaPackageList(BaseModel): """ - AdvisoryAlmaPackageList + advisory.AlmaPackageList """ # noqa: E501 name: Optional[StrictStr] = None packages: Optional[List[AdvisoryAlmaPackage]] = None diff --git a/vulncheck_sdk/aio/models/advisory_alma_reference.py b/vulncheck_sdk/aio/models/advisory_alma_reference.py index 72616af2..3bf9586c 100644 --- a/vulncheck_sdk/aio/models/advisory_alma_reference.py +++ b/vulncheck_sdk/aio/models/advisory_alma_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaReference(BaseModel): """ - AdvisoryAlmaReference + advisory.AlmaReference """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db.py b/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db.py index d5cf1b70..565225cc 100644 --- a/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db.py +++ b/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlpineLinuxSecDB(BaseModel): """ - AdvisoryAlpineLinuxSecDB + advisory.AlpineLinuxSecDB """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db_package.py b/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db_package.py index 580aa570..8069305d 100644 --- a/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db_package.py +++ b/vulncheck_sdk/aio/models/advisory_alpine_linux_sec_db_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlpineLinuxSecDBPackage(BaseModel): """ - AdvisoryAlpineLinuxSecDBPackage + advisory.AlpineLinuxSecDBPackage """ # noqa: E501 package_name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryAlpineLinuxSecurityFix]] = None diff --git a/vulncheck_sdk/aio/models/advisory_alpine_linux_security_fix.py b/vulncheck_sdk/aio/models/advisory_alpine_linux_security_fix.py index e94d6c0d..80032a2e 100644 --- a/vulncheck_sdk/aio/models/advisory_alpine_linux_security_fix.py +++ b/vulncheck_sdk/aio/models/advisory_alpine_linux_security_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlpineLinuxSecurityFix(BaseModel): """ - AdvisoryAlpineLinuxSecurityFix + advisory.AlpineLinuxSecurityFix """ # noqa: E501 cve: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_amazon_affected_package.py b/vulncheck_sdk/aio/models/advisory_amazon_affected_package.py index a55a53b5..3ab1a127 100644 --- a/vulncheck_sdk/aio/models/advisory_amazon_affected_package.py +++ b/vulncheck_sdk/aio/models/advisory_amazon_affected_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAmazonAffectedPackage(BaseModel): """ - AdvisoryAmazonAffectedPackage + advisory.AmazonAffectedPackage """ # noqa: E501 advisory: Optional[StrictStr] = None package: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_amazon_cve.py b/vulncheck_sdk/aio/models/advisory_amazon_cve.py index cc5a59d7..712604a3 100644 --- a/vulncheck_sdk/aio/models/advisory_amazon_cve.py +++ b/vulncheck_sdk/aio/models/advisory_amazon_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAmazonCVE(BaseModel): """ - AdvisoryAmazonCVE + advisory.AmazonCVE """ # noqa: E501 affected: Optional[List[AdvisoryAmazonAffectedPackage]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_amd.py b/vulncheck_sdk/aio/models/advisory_amd.py index e1532238..ca4a7a48 100644 --- a/vulncheck_sdk/aio/models/advisory_amd.py +++ b/vulncheck_sdk/aio/models/advisory_amd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAMD(BaseModel): """ - AdvisoryAMD + advisory.AMD """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ami.py b/vulncheck_sdk/aio/models/advisory_ami.py index 49822b44..4ed743fb 100644 --- a/vulncheck_sdk/aio/models/advisory_ami.py +++ b/vulncheck_sdk/aio/models/advisory_ami.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAMI(BaseModel): """ - AdvisoryAMI + advisory.AMI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_anchore_nvd_override.py b/vulncheck_sdk/aio/models/advisory_anchore_nvd_override.py index d12b6737..67a17b97 100644 --- a/vulncheck_sdk/aio/models/advisory_anchore_nvd_override.py +++ b/vulncheck_sdk/aio/models/advisory_anchore_nvd_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAnchoreNVDOverride(BaseModel): """ - AdvisoryAnchoreNVDOverride + advisory.AnchoreNVDOverride """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_advisory.py b/vulncheck_sdk/aio/models/advisory_android_advisory.py index 6b8e98d5..cb2a4ede 100644 --- a/vulncheck_sdk/aio/models/advisory_android_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_android_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryAndroidAdvisory(BaseModel): """ - AdvisoryAndroidAdvisory + advisory.AndroidAdvisory """ # noqa: E501 affected: Optional[List[AdvisoryAndroidAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_affected.py b/vulncheck_sdk/aio/models/advisory_android_affected.py index b5c53980..2fdc31fd 100644 --- a/vulncheck_sdk/aio/models/advisory_android_affected.py +++ b/vulncheck_sdk/aio/models/advisory_android_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryAndroidAffected(BaseModel): """ - AdvisoryAndroidAffected + advisory.AndroidAffected """ # noqa: E501 ecosystem_specific: Optional[AdvisoryEcoSystem] = None package: Optional[AdvisoryAndroidPackage] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_event.py b/vulncheck_sdk/aio/models/advisory_android_event.py index 2cdfffd2..476c2687 100644 --- a/vulncheck_sdk/aio/models/advisory_android_event.py +++ b/vulncheck_sdk/aio/models/advisory_android_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidEvent(BaseModel): """ - AdvisoryAndroidEvent + advisory.AndroidEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_package.py b/vulncheck_sdk/aio/models/advisory_android_package.py index 72857337..e7fe6282 100644 --- a/vulncheck_sdk/aio/models/advisory_android_package.py +++ b/vulncheck_sdk/aio/models/advisory_android_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidPackage(BaseModel): """ - AdvisoryAndroidPackage + advisory.AndroidPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_range.py b/vulncheck_sdk/aio/models/advisory_android_range.py index b0042f20..f0d38eb5 100644 --- a/vulncheck_sdk/aio/models/advisory_android_range.py +++ b/vulncheck_sdk/aio/models/advisory_android_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAndroidRange(BaseModel): """ - AdvisoryAndroidRange + advisory.AndroidRange """ # noqa: E501 events: Optional[List[AdvisoryAndroidEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_android_reference.py b/vulncheck_sdk/aio/models/advisory_android_reference.py index 016c3a80..3450fd03 100644 --- a/vulncheck_sdk/aio/models/advisory_android_reference.py +++ b/vulncheck_sdk/aio/models/advisory_android_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidReference(BaseModel): """ - AdvisoryAndroidReference + advisory.AndroidReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_active_mq.py b/vulncheck_sdk/aio/models/advisory_apache_active_mq.py index 6eadcee2..d8467ff6 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_active_mq.py +++ b/vulncheck_sdk/aio/models/advisory_apache_active_mq.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheActiveMQ(BaseModel): """ - AdvisoryApacheActiveMQ + advisory.ApacheActiveMQ """ # noqa: E501 affected_versions: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_archiva.py b/vulncheck_sdk/aio/models/advisory_apache_archiva.py index d4873d05..fdb8ac3c 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_archiva.py +++ b/vulncheck_sdk/aio/models/advisory_apache_archiva.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheArchiva(BaseModel): """ - AdvisoryApacheArchiva + advisory.ApacheArchiva """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_arrow.py b/vulncheck_sdk/aio/models/advisory_apache_arrow.py index fde1e1ca..a2480230 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_arrow.py +++ b/vulncheck_sdk/aio/models/advisory_apache_arrow.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheArrow(BaseModel): """ - AdvisoryApacheArrow + advisory.ApacheArrow """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_camel.py b/vulncheck_sdk/aio/models/advisory_apache_camel.py index f8be582a..f02066d6 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_camel.py +++ b/vulncheck_sdk/aio/models/advisory_apache_camel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCamel(BaseModel): """ - AdvisoryApacheCamel + advisory.ApacheCamel """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_commons.py b/vulncheck_sdk/aio/models/advisory_apache_commons.py index cfa6c369..464eb867 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_commons.py +++ b/vulncheck_sdk/aio/models/advisory_apache_commons.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCommons(BaseModel): """ - AdvisoryApacheCommons + advisory.ApacheCommons """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_couch_db.py b/vulncheck_sdk/aio/models/advisory_apache_couch_db.py index ed53aef7..ecfb907a 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_couch_db.py +++ b/vulncheck_sdk/aio/models/advisory_apache_couch_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCouchDB(BaseModel): """ - AdvisoryApacheCouchDB + advisory.ApacheCouchDB """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_flink.py b/vulncheck_sdk/aio/models/advisory_apache_flink.py index acee4d94..d2727d2f 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_flink.py +++ b/vulncheck_sdk/aio/models/advisory_apache_flink.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheFlink(BaseModel): """ - AdvisoryApacheFlink + advisory.ApacheFlink """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_guacamole.py b/vulncheck_sdk/aio/models/advisory_apache_guacamole.py index d63381c4..11da440d 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_guacamole.py +++ b/vulncheck_sdk/aio/models/advisory_apache_guacamole.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheGuacamole(BaseModel): """ - AdvisoryApacheGuacamole + advisory.ApacheGuacamole """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_hadoop.py b/vulncheck_sdk/aio/models/advisory_apache_hadoop.py index fe0d31e0..4765133b 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_hadoop.py +++ b/vulncheck_sdk/aio/models/advisory_apache_hadoop.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheHadoop(BaseModel): """ - AdvisoryApacheHadoop + advisory.ApacheHadoop """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_http.py b/vulncheck_sdk/aio/models/advisory_apache_http.py index ea667147..2d991ab2 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_http.py +++ b/vulncheck_sdk/aio/models/advisory_apache_http.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheHTTP(BaseModel): """ - AdvisoryApacheHTTP + advisory.ApacheHTTP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_jsp_wiki.py b/vulncheck_sdk/aio/models/advisory_apache_jsp_wiki.py index b68c6d34..b236b9fc 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_jsp_wiki.py +++ b/vulncheck_sdk/aio/models/advisory_apache_jsp_wiki.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheJSPWiki(BaseModel): """ - AdvisoryApacheJSPWiki + advisory.ApacheJSPWiki """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_kafka.py b/vulncheck_sdk/aio/models/advisory_apache_kafka.py index b21b831c..1829f3c4 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_kafka.py +++ b/vulncheck_sdk/aio/models/advisory_apache_kafka.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheKafka(BaseModel): """ - AdvisoryApacheKafka + advisory.ApacheKafka """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_logging_services.py b/vulncheck_sdk/aio/models/advisory_apache_logging_services.py index b8aff054..29d14e01 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_logging_services.py +++ b/vulncheck_sdk/aio/models/advisory_apache_logging_services.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheLoggingServices(BaseModel): """ - AdvisoryApacheLoggingServices + advisory.ApacheLoggingServices """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_ni_fi.py b/vulncheck_sdk/aio/models/advisory_apache_ni_fi.py index 42e3d886..06bd0388 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_ni_fi.py +++ b/vulncheck_sdk/aio/models/advisory_apache_ni_fi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheNiFi(BaseModel): """ - AdvisoryApacheNiFi + advisory.ApacheNiFi """ # noqa: E501 affected_version: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_of_biz.py b/vulncheck_sdk/aio/models/advisory_apache_of_biz.py index e66a63fe..0e555ed2 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_of_biz.py +++ b/vulncheck_sdk/aio/models/advisory_apache_of_biz.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOFBiz(BaseModel): """ - AdvisoryApacheOFBiz + advisory.ApacheOFBiz """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_open_meetings.py b/vulncheck_sdk/aio/models/advisory_apache_open_meetings.py index 639b6306..37f61a9b 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_open_meetings.py +++ b/vulncheck_sdk/aio/models/advisory_apache_open_meetings.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOpenMeetings(BaseModel): """ - AdvisoryApacheOpenMeetings + advisory.ApacheOpenMeetings """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_open_office.py b/vulncheck_sdk/aio/models/advisory_apache_open_office.py index a9fd38de..59ca6838 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_open_office.py +++ b/vulncheck_sdk/aio/models/advisory_apache_open_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOpenOffice(BaseModel): """ - AdvisoryApacheOpenOffice + advisory.ApacheOpenOffice """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_pulsar.py b/vulncheck_sdk/aio/models/advisory_apache_pulsar.py index 7dcd8ab3..3d6c4ef8 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_pulsar.py +++ b/vulncheck_sdk/aio/models/advisory_apache_pulsar.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApachePulsar(BaseModel): """ - AdvisoryApachePulsar + advisory.ApachePulsar """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_shiro.py b/vulncheck_sdk/aio/models/advisory_apache_shiro.py index 67c7d987..87c9c995 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_shiro.py +++ b/vulncheck_sdk/aio/models/advisory_apache_shiro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheShiro(BaseModel): """ - AdvisoryApacheShiro + advisory.ApacheShiro """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_spark.py b/vulncheck_sdk/aio/models/advisory_apache_spark.py index 5d08a563..ceabc464 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_spark.py +++ b/vulncheck_sdk/aio/models/advisory_apache_spark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSpark(BaseModel): """ - AdvisoryApacheSpark + advisory.ApacheSpark """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_struts.py b/vulncheck_sdk/aio/models/advisory_apache_struts.py index 574e4c3d..377404a2 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_struts.py +++ b/vulncheck_sdk/aio/models/advisory_apache_struts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheStruts(BaseModel): """ - AdvisoryApacheStruts + advisory.ApacheStruts """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_subversion.py b/vulncheck_sdk/aio/models/advisory_apache_subversion.py index 160742d5..c5d20474 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_subversion.py +++ b/vulncheck_sdk/aio/models/advisory_apache_subversion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSubversion(BaseModel): """ - AdvisoryApacheSubversion + advisory.ApacheSubversion """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_superset.py b/vulncheck_sdk/aio/models/advisory_apache_superset.py index 7f569245..2a96619d 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_superset.py +++ b/vulncheck_sdk/aio/models/advisory_apache_superset.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSuperset(BaseModel): """ - AdvisoryApacheSuperset + advisory.ApacheSuperset """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_tomcat.py b/vulncheck_sdk/aio/models/advisory_apache_tomcat.py index c9ecef22..a7377294 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_tomcat.py +++ b/vulncheck_sdk/aio/models/advisory_apache_tomcat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheTomcat(BaseModel): """ - AdvisoryApacheTomcat + advisory.ApacheTomcat """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apache_zoo_keeper.py b/vulncheck_sdk/aio/models/advisory_apache_zoo_keeper.py index 153f343f..2e85a14a 100644 --- a/vulncheck_sdk/aio/models/advisory_apache_zoo_keeper.py +++ b/vulncheck_sdk/aio/models/advisory_apache_zoo_keeper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheZooKeeper(BaseModel): """ - AdvisoryApacheZooKeeper + advisory.ApacheZooKeeper """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_app_check.py b/vulncheck_sdk/aio/models/advisory_app_check.py index 23de000c..2d2f0113 100644 --- a/vulncheck_sdk/aio/models/advisory_app_check.py +++ b/vulncheck_sdk/aio/models/advisory_app_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppCheck(BaseModel): """ - AdvisoryAppCheck + advisory.AppCheck """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_appgate.py b/vulncheck_sdk/aio/models/advisory_appgate.py index bc505b60..943fe86a 100644 --- a/vulncheck_sdk/aio/models/advisory_appgate.py +++ b/vulncheck_sdk/aio/models/advisory_appgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppgate(BaseModel): """ - AdvisoryAppgate + advisory.Appgate """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_apple_advisory.py b/vulncheck_sdk/aio/models/advisory_apple_advisory.py index ffa2e8e5..65ce6be9 100644 --- a/vulncheck_sdk/aio/models/advisory_apple_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_apple_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAppleAdvisory(BaseModel): """ - AdvisoryAppleAdvisory + advisory.AppleAdvisory """ # noqa: E501 components: Optional[List[AdvisoryAppleComponent]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_apple_component.py b/vulncheck_sdk/aio/models/advisory_apple_component.py index 00778454..68a4e54c 100644 --- a/vulncheck_sdk/aio/models/advisory_apple_component.py +++ b/vulncheck_sdk/aio/models/advisory_apple_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppleComponent(BaseModel): """ - AdvisoryAppleComponent + advisory.AppleComponent """ # noqa: E501 available_for: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_arch_issue.py b/vulncheck_sdk/aio/models/advisory_arch_issue.py index 174ea13d..6f4a16f6 100644 --- a/vulncheck_sdk/aio/models/advisory_arch_issue.py +++ b/vulncheck_sdk/aio/models/advisory_arch_issue.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryArchIssue(BaseModel): """ - AdvisoryArchIssue + advisory.ArchIssue """ # noqa: E501 advisories: Optional[List[StrictStr]] = None affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_arista.py b/vulncheck_sdk/aio/models/advisory_arista.py index df8387fd..585af9aa 100644 --- a/vulncheck_sdk/aio/models/advisory_arista.py +++ b/vulncheck_sdk/aio/models/advisory_arista.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryArista(BaseModel): """ - AdvisoryArista + advisory.Arista """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_aruba.py b/vulncheck_sdk/aio/models/advisory_aruba.py index dca681c9..536d3709 100644 --- a/vulncheck_sdk/aio/models/advisory_aruba.py +++ b/vulncheck_sdk/aio/models/advisory_aruba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAruba(BaseModel): """ - AdvisoryAruba + advisory.Aruba """ # noqa: E501 csaf: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_asrg.py b/vulncheck_sdk/aio/models/advisory_asrg.py index bc10a30b..6274360e 100644 --- a/vulncheck_sdk/aio/models/advisory_asrg.py +++ b/vulncheck_sdk/aio/models/advisory_asrg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryASRG(BaseModel): """ - AdvisoryASRG + advisory.ASRG """ # noqa: E501 affected_products: Optional[StrictStr] = None capec: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_asset_note.py b/vulncheck_sdk/aio/models/advisory_asset_note.py index 27474888..56c8b5c8 100644 --- a/vulncheck_sdk/aio/models/advisory_asset_note.py +++ b/vulncheck_sdk/aio/models/advisory_asset_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAssetNote(BaseModel): """ - AdvisoryAssetNote + advisory.AssetNote """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_asterisk.py b/vulncheck_sdk/aio/models/advisory_asterisk.py index 44ffcafe..66676874 100644 --- a/vulncheck_sdk/aio/models/advisory_asterisk.py +++ b/vulncheck_sdk/aio/models/advisory_asterisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAsterisk(BaseModel): """ - AdvisoryAsterisk + advisory.Asterisk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_astra.py b/vulncheck_sdk/aio/models/advisory_astra.py index 9ffcf006..c09dae7a 100644 --- a/vulncheck_sdk/aio/models/advisory_astra.py +++ b/vulncheck_sdk/aio/models/advisory_astra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAstra(BaseModel): """ - AdvisoryAstra + advisory.Astra """ # noqa: E501 bdu: Optional[List[StrictStr]] = None bulletin_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_asus.py b/vulncheck_sdk/aio/models/advisory_asus.py index 8b68ea0d..8e39a784 100644 --- a/vulncheck_sdk/aio/models/advisory_asus.py +++ b/vulncheck_sdk/aio/models/advisory_asus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAsus(BaseModel): """ - AdvisoryAsus + advisory.Asus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_atlassian_advisory.py b/vulncheck_sdk/aio/models/advisory_atlassian_advisory.py index 9023db54..a0b639ee 100644 --- a/vulncheck_sdk/aio/models/advisory_atlassian_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_atlassian_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtlassianAdvisory(BaseModel): """ - AdvisoryAtlassianAdvisory + advisory.AtlassianAdvisory """ # noqa: E501 affected_version: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_atlassian_products.py b/vulncheck_sdk/aio/models/advisory_atlassian_products.py index 38a3a856..b04c0c12 100644 --- a/vulncheck_sdk/aio/models/advisory_atlassian_products.py +++ b/vulncheck_sdk/aio/models/advisory_atlassian_products.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtlassianProducts(BaseModel): """ - AdvisoryAtlassianProducts + advisory.AtlassianProducts """ # noqa: E501 affected: Optional[List[StrictStr]] = None fixed: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_atlassian_vuln.py b/vulncheck_sdk/aio/models/advisory_atlassian_vuln.py index b5b4fc1f..5a83905c 100644 --- a/vulncheck_sdk/aio/models/advisory_atlassian_vuln.py +++ b/vulncheck_sdk/aio/models/advisory_atlassian_vuln.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAtlassianVuln(BaseModel): """ - AdvisoryAtlassianVuln + advisory.AtlassianVuln """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_atredis.py b/vulncheck_sdk/aio/models/advisory_atredis.py index 90661c6e..65a2c366 100644 --- a/vulncheck_sdk/aio/models/advisory_atredis.py +++ b/vulncheck_sdk/aio/models/advisory_atredis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtredis(BaseModel): """ - AdvisoryAtredis + advisory.Atredis """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_audiocodes.py b/vulncheck_sdk/aio/models/advisory_audiocodes.py index 69591d4e..6adbabf4 100644 --- a/vulncheck_sdk/aio/models/advisory_audiocodes.py +++ b/vulncheck_sdk/aio/models/advisory_audiocodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAudiocodes(BaseModel): """ - AdvisoryAudiocodes + advisory.Audiocodes """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_aus_cert.py b/vulncheck_sdk/aio/models/advisory_aus_cert.py index 23c68123..c1e37453 100644 --- a/vulncheck_sdk/aio/models/advisory_aus_cert.py +++ b/vulncheck_sdk/aio/models/advisory_aus_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAusCert(BaseModel): """ - AdvisoryAusCert + advisory.AusCert """ # noqa: E501 body: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = Field(default=None, alias="bulletinId") diff --git a/vulncheck_sdk/aio/models/advisory_autodesk.py b/vulncheck_sdk/aio/models/advisory_autodesk.py index 40b2d8b2..96d2c2ec 100644 --- a/vulncheck_sdk/aio/models/advisory_autodesk.py +++ b/vulncheck_sdk/aio/models/advisory_autodesk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAutodesk(BaseModel): """ - AdvisoryAutodesk + advisory.Autodesk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_avaya.py b/vulncheck_sdk/aio/models/advisory_avaya.py index ba642708..fd74b5bc 100644 --- a/vulncheck_sdk/aio/models/advisory_avaya.py +++ b/vulncheck_sdk/aio/models/advisory_avaya.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAvaya(BaseModel): """ - AdvisoryAvaya + advisory.Avaya """ # noqa: E501 advisory_number: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_aveva_advisory.py b/vulncheck_sdk/aio/models/advisory_aveva_advisory.py index aa85f3d0..78502960 100644 --- a/vulncheck_sdk/aio/models/advisory_aveva_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_aveva_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAVEVAAdvisory(BaseModel): """ - AdvisoryAVEVAAdvisory + advisory.AVEVAAdvisory """ # noqa: E501 aveva_vulnerability_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_avidml_advs.py b/vulncheck_sdk/aio/models/advisory_avidml_advs.py index 2611f652..71db98ba 100644 --- a/vulncheck_sdk/aio/models/advisory_avidml_advs.py +++ b/vulncheck_sdk/aio/models/advisory_avidml_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAVIDMLAdvs(BaseModel): """ - AdvisoryAVIDMLAdvs + advisory.AVIDMLAdvs """ # noqa: E501 date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_avigilon.py b/vulncheck_sdk/aio/models/advisory_avigilon.py index 34a87476..54a0103a 100644 --- a/vulncheck_sdk/aio/models/advisory_avigilon.py +++ b/vulncheck_sdk/aio/models/advisory_avigilon.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAvigilon(BaseModel): """ - AdvisoryAvigilon + advisory.Avigilon """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_award.py b/vulncheck_sdk/aio/models/advisory_award.py index 0cf81a39..39544258 100644 --- a/vulncheck_sdk/aio/models/advisory_award.py +++ b/vulncheck_sdk/aio/models/advisory_award.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAward(BaseModel): """ - AdvisoryAward + advisory.Award """ # noqa: E501 amount: Optional[StrictStr] = None currency: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_aws.py b/vulncheck_sdk/aio/models/advisory_aws.py index 1f63c5cf..6c76d6cc 100644 --- a/vulncheck_sdk/aio/models/advisory_aws.py +++ b/vulncheck_sdk/aio/models/advisory_aws.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAWS(BaseModel): """ - AdvisoryAWS + advisory.AWS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_axis.py b/vulncheck_sdk/aio/models/advisory_axis.py index d77d9179..88fecde6 100644 --- a/vulncheck_sdk/aio/models/advisory_axis.py +++ b/vulncheck_sdk/aio/models/advisory_axis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAxis(BaseModel): """ - AdvisoryAxis + advisory.Axis """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_azul.py b/vulncheck_sdk/aio/models/advisory_azul.py index 733e62d5..358b41be 100644 --- a/vulncheck_sdk/aio/models/advisory_azul.py +++ b/vulncheck_sdk/aio/models/advisory_azul.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryAzul(BaseModel): """ - AdvisoryAzul + advisory.Azul """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_b_braun_advisory.py b/vulncheck_sdk/aio/models/advisory_b_braun_advisory.py index 7e4eb554..ca78dedf 100644 --- a/vulncheck_sdk/aio/models/advisory_b_braun_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_b_braun_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBBraunAdvisory(BaseModel): """ - AdvisoryBBraunAdvisory + advisory.BBraunAdvisory """ # noqa: E501 attention: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_bandr.py b/vulncheck_sdk/aio/models/advisory_bandr.py index 40366e97..120c5f9e 100644 --- a/vulncheck_sdk/aio/models/advisory_bandr.py +++ b/vulncheck_sdk/aio/models/advisory_bandr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBandr(BaseModel): """ - AdvisoryBandr + advisory.Bandr """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_baxter_advisory.py b/vulncheck_sdk/aio/models/advisory_baxter_advisory.py index 46e845e5..13cac173 100644 --- a/vulncheck_sdk/aio/models/advisory_baxter_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_baxter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBaxterAdvisory(BaseModel): """ - AdvisoryBaxterAdvisory + advisory.BaxterAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bdu_advisory.py b/vulncheck_sdk/aio/models/advisory_bdu_advisory.py index bcda8a72..87aea07b 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryBDUAdvisory(BaseModel): """ - AdvisoryBDUAdvisory + advisory.BDUAdvisory """ # noqa: E501 bdu_id: Optional[StrictStr] = Field(default=None, description="BDU:2022-03833") cve: Optional[List[StrictStr]] = Field(default=None, description="[]string{\"CVE-2022-28194\"}") diff --git a/vulncheck_sdk/aio/models/advisory_bdu_cvss.py b/vulncheck_sdk/aio/models/advisory_bdu_cvss.py index 6a3ff324..a41ea0a8 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_cvss.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUCvss(BaseModel): """ - AdvisoryBDUCvss + advisory.BDUCvss """ # noqa: E501 vector: Optional[AdvisoryBDUVector] = None __properties: ClassVar[List[str]] = ["vector"] diff --git a/vulncheck_sdk/aio/models/advisory_bdu_cvss3.py b/vulncheck_sdk/aio/models/advisory_bdu_cvss3.py index abede29f..15c830b2 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_cvss3.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_cvss3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUCvss3(BaseModel): """ - AdvisoryBDUCvss3 + advisory.BDUCvss3 """ # noqa: E501 vector: Optional[AdvisoryBDUVector] = None __properties: ClassVar[List[str]] = ["vector"] diff --git a/vulncheck_sdk/aio/models/advisory_bdu_environment.py b/vulncheck_sdk/aio/models/advisory_bdu_environment.py index 4d1ad728..b1e30bd8 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_environment.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_environment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUEnvironment(BaseModel): """ - AdvisoryBDUEnvironment + advisory.BDUEnvironment """ # noqa: E501 os: Optional[AdvisoryBDUOs] = None __properties: ClassVar[List[str]] = ["os"] diff --git a/vulncheck_sdk/aio/models/advisory_bdu_soft.py b/vulncheck_sdk/aio/models/advisory_bdu_soft.py index 8ce11a94..470e2f88 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_soft.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUSoft(BaseModel): """ - AdvisoryBDUSoft + advisory.BDUSoft """ # noqa: E501 name: Optional[StrictStr] = None platform: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bdu_types.py b/vulncheck_sdk/aio/models/advisory_bdu_types.py index 31a4549e..3537298b 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_types.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUTypes(BaseModel): """ - AdvisoryBDUTypes + advisory.BDUTypes """ # noqa: E501 text: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bdu_vector.py b/vulncheck_sdk/aio/models/advisory_bdu_vector.py index e34a1f5c..22b62be9 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_vector.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_vector.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUVector(BaseModel): """ - AdvisoryBDUVector + advisory.BDUVector """ # noqa: E501 score: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bdu_vulnerable_software.py b/vulncheck_sdk/aio/models/advisory_bdu_vulnerable_software.py index f227a3b9..4d584fb2 100644 --- a/vulncheck_sdk/aio/models/advisory_bdu_vulnerable_software.py +++ b/vulncheck_sdk/aio/models/advisory_bdu_vulnerable_software.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUVulnerableSoftware(BaseModel): """ - AdvisoryBDUVulnerableSoftware + advisory.BDUVulnerableSoftware """ # noqa: E501 soft: Optional[AdvisoryBDUSoft] = None __properties: ClassVar[List[str]] = ["soft"] diff --git a/vulncheck_sdk/aio/models/advisory_bduos.py b/vulncheck_sdk/aio/models/advisory_bduos.py index 8b00db71..ff959105 100644 --- a/vulncheck_sdk/aio/models/advisory_bduos.py +++ b/vulncheck_sdk/aio/models/advisory_bduos.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUOs(BaseModel): """ - AdvisoryBDUOs + advisory.BDUOs """ # noqa: E501 name: Optional[StrictStr] = None platform: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_beckhoff_advisory.py b/vulncheck_sdk/aio/models/advisory_beckhoff_advisory.py index 0f983e29..a245f257 100644 --- a/vulncheck_sdk/aio/models/advisory_beckhoff_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_beckhoff_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeckhoffAdvisory(BaseModel): """ - AdvisoryBeckhoffAdvisory + advisory.BeckhoffAdvisory """ # noqa: E501 beckhoff_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_beckman_coulter.py b/vulncheck_sdk/aio/models/advisory_beckman_coulter.py index a3691841..8ca864e7 100644 --- a/vulncheck_sdk/aio/models/advisory_beckman_coulter.py +++ b/vulncheck_sdk/aio/models/advisory_beckman_coulter.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeckmanCoulter(BaseModel): """ - AdvisoryBeckmanCoulter + advisory.BeckmanCoulter """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_becton_dickinson_advisory.py b/vulncheck_sdk/aio/models/advisory_becton_dickinson_advisory.py index 582747e9..6f817e40 100644 --- a/vulncheck_sdk/aio/models/advisory_becton_dickinson_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_becton_dickinson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBectonDickinsonAdvisory(BaseModel): """ - AdvisoryBectonDickinsonAdvisory + advisory.BectonDickinsonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_belden_advisory.py b/vulncheck_sdk/aio/models/advisory_belden_advisory.py index cbe6e158..307fbb13 100644 --- a/vulncheck_sdk/aio/models/advisory_belden_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_belden_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeldenAdvisory(BaseModel): """ - AdvisoryBeldenAdvisory + advisory.BeldenAdvisory """ # noqa: E501 belden_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_beyond_trust.py b/vulncheck_sdk/aio/models/advisory_beyond_trust.py index 776d43e0..97db421c 100644 --- a/vulncheck_sdk/aio/models/advisory_beyond_trust.py +++ b/vulncheck_sdk/aio/models/advisory_beyond_trust.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeyondTrust(BaseModel): """ - AdvisoryBeyondTrust + advisory.BeyondTrust """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_binarly.py b/vulncheck_sdk/aio/models/advisory_binarly.py index 301494d6..582b8e2a 100644 --- a/vulncheck_sdk/aio/models/advisory_binarly.py +++ b/vulncheck_sdk/aio/models/advisory_binarly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBinarly(BaseModel): """ - AdvisoryBinarly + advisory.Binarly """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bit_defender.py b/vulncheck_sdk/aio/models/advisory_bit_defender.py index ec83c619..da067140 100644 --- a/vulncheck_sdk/aio/models/advisory_bit_defender.py +++ b/vulncheck_sdk/aio/models/advisory_bit_defender.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBitDefender(BaseModel): """ - AdvisoryBitDefender + advisory.BitDefender """ # noqa: E501 additional_details: Optional[StrictStr] = None affected_products: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_black_berry.py b/vulncheck_sdk/aio/models/advisory_black_berry.py index 5072bfc3..df96e1e6 100644 --- a/vulncheck_sdk/aio/models/advisory_black_berry.py +++ b/vulncheck_sdk/aio/models/advisory_black_berry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBlackBerry(BaseModel): """ - AdvisoryBlackBerry + advisory.BlackBerry """ # noqa: E501 bsrt: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_bls.py b/vulncheck_sdk/aio/models/advisory_bls.py index 4821c1c0..de48fcd7 100644 --- a/vulncheck_sdk/aio/models/advisory_bls.py +++ b/vulncheck_sdk/aio/models/advisory_bls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBLS(BaseModel): """ - AdvisoryBLS + advisory.BLS """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_bosch_advisory.py b/vulncheck_sdk/aio/models/advisory_bosch_advisory.py index c6026707..24b94a19 100644 --- a/vulncheck_sdk/aio/models/advisory_bosch_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_bosch_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBoschAdvisory(BaseModel): """ - AdvisoryBoschAdvisory + advisory.BoschAdvisory """ # noqa: E501 bosch_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_boston_scientific_advisory.py b/vulncheck_sdk/aio/models/advisory_boston_scientific_advisory.py index 35dd8bf4..47a165a1 100644 --- a/vulncheck_sdk/aio/models/advisory_boston_scientific_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_boston_scientific_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBostonScientificAdvisory(BaseModel): """ - AdvisoryBostonScientificAdvisory + advisory.BostonScientificAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_botnet.py b/vulncheck_sdk/aio/models/advisory_botnet.py index d9d14387..0ea2d55d 100644 --- a/vulncheck_sdk/aio/models/advisory_botnet.py +++ b/vulncheck_sdk/aio/models/advisory_botnet.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryBotnet(BaseModel): """ - AdvisoryBotnet + advisory.Botnet """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/aio/models/advisory_bugzilla.py b/vulncheck_sdk/aio/models/advisory_bugzilla.py index 76a65b59..9626852e 100644 --- a/vulncheck_sdk/aio/models/advisory_bugzilla.py +++ b/vulncheck_sdk/aio/models/advisory_bugzilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBugzilla(BaseModel): """ - AdvisoryBugzilla + advisory.Bugzilla """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ca_cyber_centre_advisory.py b/vulncheck_sdk/aio/models/advisory_ca_cyber_centre_advisory.py index e4e83182..b154bffe 100644 --- a/vulncheck_sdk/aio/models/advisory_ca_cyber_centre_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_ca_cyber_centre_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCACyberCentreAdvisory(BaseModel): """ - AdvisoryCACyberCentreAdvisory + advisory.CACyberCentreAdvisory """ # noqa: E501 control_systems: Optional[StrictBool] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_canvas_exploit.py b/vulncheck_sdk/aio/models/advisory_canvas_exploit.py index 759c3daa..c1f7726c 100644 --- a/vulncheck_sdk/aio/models/advisory_canvas_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_canvas_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCanvasExploit(BaseModel): """ - AdvisoryCanvasExploit + advisory.CanvasExploit """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_capec.py b/vulncheck_sdk/aio/models/advisory_capec.py index 0aa04bfe..d4f9a2d6 100644 --- a/vulncheck_sdk/aio/models/advisory_capec.py +++ b/vulncheck_sdk/aio/models/advisory_capec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCapec(BaseModel): """ - AdvisoryCapec + advisory.Capec """ # noqa: E501 capec_id: Optional[StrictStr] = None capec_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_carestream_advisory.py b/vulncheck_sdk/aio/models/advisory_carestream_advisory.py index e105a0a7..21b56873 100644 --- a/vulncheck_sdk/aio/models/advisory_carestream_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_carestream_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCarestreamAdvisory(BaseModel): """ - AdvisoryCarestreamAdvisory + advisory.CarestreamAdvisory """ # noqa: E501 carestream_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_carrier.py b/vulncheck_sdk/aio/models/advisory_carrier.py index 7002b46f..1a5a1c1b 100644 --- a/vulncheck_sdk/aio/models/advisory_carrier.py +++ b/vulncheck_sdk/aio/models/advisory_carrier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCarrier(BaseModel): """ - AdvisoryCarrier + advisory.Carrier """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cbl_mariner.py b/vulncheck_sdk/aio/models/advisory_cbl_mariner.py index 01bad464..1c8c9fac 100644 --- a/vulncheck_sdk/aio/models/advisory_cbl_mariner.py +++ b/vulncheck_sdk/aio/models/advisory_cbl_mariner.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCBLMariner(BaseModel): """ - AdvisoryCBLMariner + advisory.CBLMariner """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_centos_package.py b/vulncheck_sdk/aio/models/advisory_centos_package.py index 40c5907b..0a2c5f42 100644 --- a/vulncheck_sdk/aio/models/advisory_centos_package.py +++ b/vulncheck_sdk/aio/models/advisory_centos_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCentosPackage(BaseModel): """ - AdvisoryCentosPackage + advisory.CentosPackage """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_be.py b/vulncheck_sdk/aio/models/advisory_cert_be.py index 70197d20..ec41bfb4 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_be.py +++ b/vulncheck_sdk/aio/models/advisory_cert_be.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertBE(BaseModel): """ - AdvisoryCertBE + advisory.CertBE """ # noqa: E501 affected_software: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_fr_advisory.py b/vulncheck_sdk/aio/models/advisory_cert_fr_advisory.py index 6ec16da0..7b643b2a 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_fr_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_cert_fr_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertFRAdvisory(BaseModel): """ - AdvisoryCertFRAdvisory + advisory.CertFRAdvisory """ # noqa: E501 affected_systems_fr: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_in.py b/vulncheck_sdk/aio/models/advisory_cert_in.py index 8e7aeab1..c74d160d 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_in.py +++ b/vulncheck_sdk/aio/models/advisory_cert_in.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertIN(BaseModel): """ - AdvisoryCertIN + advisory.CertIN """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_ir_security_alert.py b/vulncheck_sdk/aio/models/advisory_cert_ir_security_alert.py index efee2acc..3d15bb6b 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_ir_security_alert.py +++ b/vulncheck_sdk/aio/models/advisory_cert_ir_security_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertIRSecurityAlert(BaseModel): """ - AdvisoryCertIRSecurityAlert + advisory.CertIRSecurityAlert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_se.py b/vulncheck_sdk/aio/models/advisory_cert_se.py index 64f463d0..2d9c79d5 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_se.py +++ b/vulncheck_sdk/aio/models/advisory_cert_se.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertSE(BaseModel): """ - AdvisoryCertSE + advisory.CertSE """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cert_ua.py b/vulncheck_sdk/aio/models/advisory_cert_ua.py index 5df559ac..8f3ae9c2 100644 --- a/vulncheck_sdk/aio/models/advisory_cert_ua.py +++ b/vulncheck_sdk/aio/models/advisory_cert_ua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertUA(BaseModel): """ - AdvisoryCertUA + advisory.CertUA """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_certeu_advisory.py b/vulncheck_sdk/aio/models/advisory_certeu_advisory.py index 6420dec1..0ee16c30 100644 --- a/vulncheck_sdk/aio/models/advisory_certeu_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_certeu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCERTEUAdvisory(BaseModel): """ - AdvisoryCERTEUAdvisory + advisory.CERTEUAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="advisoryId") affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") diff --git a/vulncheck_sdk/aio/models/advisory_cesa.py b/vulncheck_sdk/aio/models/advisory_cesa.py index f6ca787f..6b033591 100644 --- a/vulncheck_sdk/aio/models/advisory_cesa.py +++ b/vulncheck_sdk/aio/models/advisory_cesa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCESA(BaseModel): """ - AdvisoryCESA + advisory.CESA """ # noqa: E501 arch: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_chain_guard.py b/vulncheck_sdk/aio/models/advisory_chain_guard.py index 415c90a1..22af289a 100644 --- a/vulncheck_sdk/aio/models/advisory_chain_guard.py +++ b/vulncheck_sdk/aio/models/advisory_chain_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChainGuard(BaseModel): """ - AdvisoryChainGuard + advisory.ChainGuard """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_chain_guard_package.py b/vulncheck_sdk/aio/models/advisory_chain_guard_package.py index c084eeee..f5a0acb1 100644 --- a/vulncheck_sdk/aio/models/advisory_chain_guard_package.py +++ b/vulncheck_sdk/aio/models/advisory_chain_guard_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChainGuardPackage(BaseModel): """ - AdvisoryChainGuardPackage + advisory.ChainGuardPackage """ # noqa: E501 name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryChainGuardSecFix]] = None diff --git a/vulncheck_sdk/aio/models/advisory_chain_guard_sec_fix.py b/vulncheck_sdk/aio/models/advisory_chain_guard_sec_fix.py index be6912db..cd7b50ae 100644 --- a/vulncheck_sdk/aio/models/advisory_chain_guard_sec_fix.py +++ b/vulncheck_sdk/aio/models/advisory_chain_guard_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryChainGuardSecFix(BaseModel): """ - AdvisoryChainGuardSecFix + advisory.ChainGuardSecFix """ # noqa: E501 cve: Optional[List[StrictStr]] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_check_point.py b/vulncheck_sdk/aio/models/advisory_check_point.py index 0669b542..953a881a 100644 --- a/vulncheck_sdk/aio/models/advisory_check_point.py +++ b/vulncheck_sdk/aio/models/advisory_check_point.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCheckPoint(BaseModel): """ - AdvisoryCheckPoint + advisory.CheckPoint """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_chrome.py b/vulncheck_sdk/aio/models/advisory_chrome.py index 7144a285..0299a759 100644 --- a/vulncheck_sdk/aio/models/advisory_chrome.py +++ b/vulncheck_sdk/aio/models/advisory_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChrome(BaseModel): """ - AdvisoryChrome + advisory.Chrome """ # noqa: E501 affected: Optional[List[AdvisoryAffectedChrome]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ciena.py b/vulncheck_sdk/aio/models/advisory_ciena.py index d9fe246f..09c1ed2a 100644 --- a/vulncheck_sdk/aio/models/advisory_ciena.py +++ b/vulncheck_sdk/aio/models/advisory_ciena.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCiena(BaseModel): """ - AdvisoryCiena + advisory.Ciena """ # noqa: E501 cves: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cis_control.py b/vulncheck_sdk/aio/models/advisory_cis_control.py index 5ff7c33c..9396ead5 100644 --- a/vulncheck_sdk/aio/models/advisory_cis_control.py +++ b/vulncheck_sdk/aio/models/advisory_cis_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCISControl(BaseModel): """ - AdvisoryCISControl + advisory.CISControl """ # noqa: E501 cis_control_description: Optional[StrictStr] = None cis_control_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cisa_alert.py b/vulncheck_sdk/aio/models/advisory_cisa_alert.py index b4c97a72..04b9130d 100644 --- a/vulncheck_sdk/aio/models/advisory_cisa_alert.py +++ b/vulncheck_sdk/aio/models/advisory_cisa_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCISAAlert(BaseModel): """ - AdvisoryCISAAlert + advisory.CISAAlert """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") alert_id: Optional[StrictStr] = Field(default=None, alias="alertID") diff --git a/vulncheck_sdk/aio/models/advisory_cisa_csaf_adv.py b/vulncheck_sdk/aio/models/advisory_cisa_csaf_adv.py index eca85cdc..d1efc340 100644 --- a/vulncheck_sdk/aio/models/advisory_cisa_csaf_adv.py +++ b/vulncheck_sdk/aio/models/advisory_cisa_csaf_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCisaCsafAdv(BaseModel): """ - AdvisoryCisaCsafAdv + advisory.CisaCsafAdv """ # noqa: E501 csaf_json: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cisco_advisory.py b/vulncheck_sdk/aio/models/advisory_cisco_advisory.py index f2b1635a..565b2d8b 100644 --- a/vulncheck_sdk/aio/models/advisory_cisco_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_cisco_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCiscoAdvisory(BaseModel): """ - AdvisoryCiscoAdvisory + advisory.CiscoAdvisory """ # noqa: E501 cisco_bug_id: Optional[StrictStr] = Field(default=None, description="multiple", alias="ciscoBugId") csaf: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cisco_csaf.py b/vulncheck_sdk/aio/models/advisory_cisco_csaf.py index 7d5e8ee7..8e03be6a 100644 --- a/vulncheck_sdk/aio/models/advisory_cisco_csaf.py +++ b/vulncheck_sdk/aio/models/advisory_cisco_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryCiscoCSAF(BaseModel): """ - AdvisoryCiscoCSAF + advisory.CiscoCSAF """ # noqa: E501 - csaf: Optional[Dict[str, Any]] = None + csaf: Optional[Any] = None cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None identifier: Optional[StrictStr] = None @@ -75,6 +75,11 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if csaf (nullable) is None + # and model_fields_set contains the field + if self.csaf is None and "csaf" in self.model_fields_set: + _dict['csaf'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_cisco_known_good_value.py b/vulncheck_sdk/aio/models/advisory_cisco_known_good_value.py index 7386fd67..a1633ffe 100644 --- a/vulncheck_sdk/aio/models/advisory_cisco_known_good_value.py +++ b/vulncheck_sdk/aio/models/advisory_cisco_known_good_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCiscoKnownGoodValue(BaseModel): """ - AdvisoryCiscoKnownGoodValue + advisory.CiscoKnownGoodValue """ # noqa: E501 biv_category: Optional[StrictStr] = None biv_hash: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_citrix_advisory.py b/vulncheck_sdk/aio/models/advisory_citrix_advisory.py index 1b149e32..e9fd9e41 100644 --- a/vulncheck_sdk/aio/models/advisory_citrix_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_citrix_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCitrixAdvisory(BaseModel): """ - AdvisoryCitrixAdvisory + advisory.CitrixAdvisory """ # noqa: E501 citrix_id: Optional[StrictStr] = Field(default=None, alias="citrixId") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_claroty_vulnerability.py b/vulncheck_sdk/aio/models/advisory_claroty_vulnerability.py index 22da0d85..00bb1329 100644 --- a/vulncheck_sdk/aio/models/advisory_claroty_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_claroty_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryClarotyVulnerability(BaseModel): """ - AdvisoryClarotyVulnerability + advisory.ClarotyVulnerability """ # noqa: E501 advisory_url: Optional[StrictStr] = None claroty_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cloud_bees.py b/vulncheck_sdk/aio/models/advisory_cloud_bees.py index 00fb8d01..d2d1947a 100644 --- a/vulncheck_sdk/aio/models/advisory_cloud_bees.py +++ b/vulncheck_sdk/aio/models/advisory_cloud_bees.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCloudBees(BaseModel): """ - AdvisoryCloudBees + advisory.CloudBees """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cloud_vuln_db_advisory.py b/vulncheck_sdk/aio/models/advisory_cloud_vuln_db_advisory.py index 74629900..88624aae 100644 --- a/vulncheck_sdk/aio/models/advisory_cloud_vuln_db_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_cloud_vuln_db_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCloudVulnDBAdvisory(BaseModel): """ - AdvisoryCloudVulnDBAdvisory + advisory.CloudVulnDBAdvisory """ # noqa: E501 affected_services: Optional[StrictStr] = Field(default=None, alias="affectedServices") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cnnvd_entry_json.py b/vulncheck_sdk/aio/models/advisory_cnnvd_entry_json.py index 07d6df5f..8ad08ed7 100644 --- a/vulncheck_sdk/aio/models/advisory_cnnvd_entry_json.py +++ b/vulncheck_sdk/aio/models/advisory_cnnvd_entry_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCNNVDEntryJSON(BaseModel): """ - AdvisoryCNNVDEntryJSON + advisory.CNNVDEntryJSON """ # noqa: E501 bugtraq_id: Optional[StrictStr] = Field(default=None, alias="bugtraq-id") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cnvd_bulletin.py b/vulncheck_sdk/aio/models/advisory_cnvd_bulletin.py index 92f10696..3e489c78 100644 --- a/vulncheck_sdk/aio/models/advisory_cnvd_bulletin.py +++ b/vulncheck_sdk/aio/models/advisory_cnvd_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,12 +25,12 @@ class AdvisoryCNVDBulletin(BaseModel): """ - AdvisoryCNVDBulletin + advisory.CNVDBulletin """ # noqa: E501 cnta: Optional[StrictStr] = None cnvd: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cnvd_flaw.py b/vulncheck_sdk/aio/models/advisory_cnvd_flaw.py index 8d3fda12..7baf5b6c 100644 --- a/vulncheck_sdk/aio/models/advisory_cnvd_flaw.py +++ b/vulncheck_sdk/aio/models/advisory_cnvd_flaw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCNVDFlaw(BaseModel): """ - AdvisoryCNVDFlaw + advisory.CNVDFlaw """ # noqa: E501 affected_products_cn: Optional[StrictStr] = None bugtraq_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_codesys_advisory.py b/vulncheck_sdk/aio/models/advisory_codesys_advisory.py index 6ffda70d..357af45a 100644 --- a/vulncheck_sdk/aio/models/advisory_codesys_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_codesys_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCodesysAdvisory(BaseModel): """ - AdvisoryCodesysAdvisory + advisory.CodesysAdvisory """ # noqa: E501 codesys_id: Optional[StrictStr] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault.py b/vulncheck_sdk/aio/models/advisory_comm_vault.py index 29a1318b..77b24e51 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryCommVault(BaseModel): """ - AdvisoryCommVault + advisory.CommVault """ # noqa: E501 cve: Optional[List[StrictStr]] = None cve_details: Optional[List[AdvisoryCommVaultCVEDetails]] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault_cve_details.py b/vulncheck_sdk/aio/models/advisory_comm_vault_cve_details.py index 76353436..cf3c09b2 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault_cve_details.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultCVEDetails(BaseModel): """ - AdvisoryCommVaultCVEDetails + advisory.CommVaultCVEDetails """ # noqa: E501 cve_id: Optional[StrictStr] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product.py b/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product.py index cd8273ba..794b7091 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCommVaultImpactedProduct(BaseModel): """ - AdvisoryCommVaultImpactedProduct + advisory.CommVaultImpactedProduct """ # noqa: E501 description: Optional[StrictStr] = None impacted_product_details: Optional[List[AdvisoryCommVaultImpactedProductDetails]] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product_details.py b/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product_details.py index 90cbd9d9..3bbad949 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product_details.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault_impacted_product_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultImpactedProductDetails(BaseModel): """ - AdvisoryCommVaultImpactedProductDetails + advisory.CommVaultImpactedProductDetails """ # noqa: E501 affected_versions: Optional[StrictStr] = None platforms: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault_resolution.py b/vulncheck_sdk/aio/models/advisory_comm_vault_resolution.py index 485dd6f4..7920a08a 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault_resolution.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault_resolution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCommVaultResolution(BaseModel): """ - AdvisoryCommVaultResolution + advisory.CommVaultResolution """ # noqa: E501 description: Optional[StrictStr] = None resolution_details: Optional[List[AdvisoryCommVaultResolutionDetails]] = None diff --git a/vulncheck_sdk/aio/models/advisory_comm_vault_resolution_details.py b/vulncheck_sdk/aio/models/advisory_comm_vault_resolution_details.py index d88fbdd1..0d85eaa2 100644 --- a/vulncheck_sdk/aio/models/advisory_comm_vault_resolution_details.py +++ b/vulncheck_sdk/aio/models/advisory_comm_vault_resolution_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultResolutionDetails(BaseModel): """ - AdvisoryCommVaultResolutionDetails + advisory.CommVaultResolutionDetails """ # noqa: E501 feature_release: Optional[StrictStr] = None maintenance_release: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_compass_security.py b/vulncheck_sdk/aio/models/advisory_compass_security.py index 17a0512d..b98eafe5 100644 --- a/vulncheck_sdk/aio/models/advisory_compass_security.py +++ b/vulncheck_sdk/aio/models/advisory_compass_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCompassSecurity(BaseModel): """ - AdvisoryCompassSecurity + advisory.CompassSecurity """ # noqa: E501 csnc_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_container_os.py b/vulncheck_sdk/aio/models/advisory_container_os.py index 54db2e05..6bf6bca3 100644 --- a/vulncheck_sdk/aio/models/advisory_container_os.py +++ b/vulncheck_sdk/aio/models/advisory_container_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryContainerOS(BaseModel): """ - AdvisoryContainerOS + advisory.ContainerOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_core_impact_exploit.py b/vulncheck_sdk/aio/models/advisory_core_impact_exploit.py index 67e6cd23..2301a6e0 100644 --- a/vulncheck_sdk/aio/models/advisory_core_impact_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_core_impact_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCoreImpactExploit(BaseModel): """ - AdvisoryCoreImpactExploit + advisory.CoreImpactExploit """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_correction.py b/vulncheck_sdk/aio/models/advisory_correction.py index 12387126..61c9ad21 100644 --- a/vulncheck_sdk/aio/models/advisory_correction.py +++ b/vulncheck_sdk/aio/models/advisory_correction.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCorrection(BaseModel): """ - AdvisoryCorrection + advisory.Correction """ # noqa: E501 corrected_at: Optional[StrictStr] = Field(default=None, alias="correctedAt") orelease: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cos_update.py b/vulncheck_sdk/aio/models/advisory_cos_update.py index cbb67979..f53f1bd3 100644 --- a/vulncheck_sdk/aio/models/advisory_cos_update.py +++ b/vulncheck_sdk/aio/models/advisory_cos_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCOSUpdate(BaseModel): """ - AdvisoryCOSUpdate + advisory.COSUpdate """ # noqa: E501 changed: Optional[List[StrictStr]] = None featured: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_cpe_match.py b/vulncheck_sdk/aio/models/advisory_cpe_match.py index 530286b9..66a8ebd6 100644 --- a/vulncheck_sdk/aio/models/advisory_cpe_match.py +++ b/vulncheck_sdk/aio/models/advisory_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCPEMatch(BaseModel): """ - AdvisoryCPEMatch + advisory.CPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/aio/models/advisory_cpe_node.py b/vulncheck_sdk/aio/models/advisory_cpe_node.py index 57560423..2847cdd3 100644 --- a/vulncheck_sdk/aio/models/advisory_cpe_node.py +++ b/vulncheck_sdk/aio/models/advisory_cpe_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCPENode(BaseModel): """ - AdvisoryCPENode + advisory.CPENode """ # noqa: E501 cpe_match: Optional[List[AdvisoryCPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/advisory_credit.py b/vulncheck_sdk/aio/models/advisory_credit.py index 5a10ebfc..428f3e5f 100644 --- a/vulncheck_sdk/aio/models/advisory_credit.py +++ b/vulncheck_sdk/aio/models/advisory_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCredit(BaseModel): """ - AdvisoryCredit + advisory.Credit """ # noqa: E501 lang: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_crestron.py b/vulncheck_sdk/aio/models/advisory_crestron.py index 2a9ba11d..05a19744 100644 --- a/vulncheck_sdk/aio/models/advisory_crestron.py +++ b/vulncheck_sdk/aio/models/advisory_crestron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCrestron(BaseModel): """ - AdvisoryCrestron + advisory.Crestron """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_crowd_sec.py b/vulncheck_sdk/aio/models/advisory_crowd_sec.py index e8d84cb1..f537e8a7 100644 --- a/vulncheck_sdk/aio/models/advisory_crowd_sec.py +++ b/vulncheck_sdk/aio/models/advisory_crowd_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCrowdSec(BaseModel): """ - AdvisoryCrowdSec + advisory.CrowdSec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_csaf.py b/vulncheck_sdk/aio/models/advisory_csaf.py index 928a2089..5b287699 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf.py +++ b/vulncheck_sdk/aio/models/advisory_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,11 +29,11 @@ class AdvisoryCSAF(BaseModel): """ - AdvisoryCSAF + advisory.CSAF """ # noqa: E501 - document: Optional[AdvisoryDocumentMetadata] = Field(default=None, description="Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property") + document: Optional[AdvisoryDocumentMetadata] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes") - product_tree: Optional[AdvisoryProductBranch] = Field(default=None, description="ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property") + product_tree: Optional[AdvisoryProductBranch] = None vulnerabilities: Optional[List[AdvisoryCSAFVulnerability]] = Field(default=None, description="Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property") __properties: ClassVar[List[str]] = ["document", "notes", "product_tree", "vulnerabilities"] diff --git a/vulncheck_sdk/aio/models/advisory_csaf_note.py b/vulncheck_sdk/aio/models/advisory_csaf_note.py index 3ff687aa..c08866bc 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf_note.py +++ b/vulncheck_sdk/aio/models/advisory_csaf_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCSAFNote(BaseModel): """ - AdvisoryCSAFNote + advisory.CSAFNote """ # noqa: E501 audience: Optional[StrictStr] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_csaf_reference.py b/vulncheck_sdk/aio/models/advisory_csaf_reference.py index d09855d5..fe538a78 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf_reference.py +++ b/vulncheck_sdk/aio/models/advisory_csaf_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCSAFReference(BaseModel): """ - AdvisoryCSAFReference + advisory.CSAFReference """ # noqa: E501 category: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_csaf_relationship.py b/vulncheck_sdk/aio/models/advisory_csaf_relationship.py index 3d064f45..f3cb487c 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf_relationship.py +++ b/vulncheck_sdk/aio/models/advisory_csaf_relationship.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCSAFRelationship(BaseModel): """ - AdvisoryCSAFRelationship + advisory.CSAFRelationship """ # noqa: E501 category: Optional[StrictStr] = None full_product_name: Optional[AdvisoryProduct] = None diff --git a/vulncheck_sdk/aio/models/advisory_csaf_score.py b/vulncheck_sdk/aio/models/advisory_csaf_score.py index 1c263a17..7afa0a0e 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf_score.py +++ b/vulncheck_sdk/aio/models/advisory_csaf_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryCSAFScore(BaseModel): """ - AdvisoryCSAFScore + advisory.CSAFScore """ # noqa: E501 cvss_v2: Optional[AdvisoryCVSSV2] = None cvss_v3: Optional[AdvisoryCVSSV3] = None diff --git a/vulncheck_sdk/aio/models/advisory_csaf_vulnerability.py b/vulncheck_sdk/aio/models/advisory_csaf_vulnerability.py index ab0d8e52..64826a93 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_csaf_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class AdvisoryCSAFVulnerability(BaseModel): """ - AdvisoryCSAFVulnerability + advisory.CSAFVulnerability """ # noqa: E501 cve: Optional[StrictStr] = Field(default=None, description="MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve") cwe: Optional[AdvisoryCwe] = None diff --git a/vulncheck_sdk/aio/models/advisory_curl.py b/vulncheck_sdk/aio/models/advisory_curl.py index ce93993f..788e6836 100644 --- a/vulncheck_sdk/aio/models/advisory_curl.py +++ b/vulncheck_sdk/aio/models/advisory_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCurl(BaseModel): """ - AdvisoryCurl + advisory.Curl """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_curl_affected.py b/vulncheck_sdk/aio/models/advisory_curl_affected.py index 7e6dd84c..2b7f6586 100644 --- a/vulncheck_sdk/aio/models/advisory_curl_affected.py +++ b/vulncheck_sdk/aio/models/advisory_curl_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCurlAffected(BaseModel): """ - AdvisoryCurlAffected + advisory.CurlAffected """ # noqa: E501 ranges: Optional[List[AdvisoryCurlRange]] = None versions: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_curl_credit.py b/vulncheck_sdk/aio/models/advisory_curl_credit.py index 5a27f1d6..c4caa2c4 100644 --- a/vulncheck_sdk/aio/models/advisory_curl_credit.py +++ b/vulncheck_sdk/aio/models/advisory_curl_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlCredit(BaseModel): """ - AdvisoryCurlCredit + advisory.CurlCredit """ # noqa: E501 name: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_curl_cwe.py b/vulncheck_sdk/aio/models/advisory_curl_cwe.py index 41c5b575..212e8048 100644 --- a/vulncheck_sdk/aio/models/advisory_curl_cwe.py +++ b/vulncheck_sdk/aio/models/advisory_curl_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlCWE(BaseModel): """ - AdvisoryCurlCWE + advisory.CurlCWE """ # noqa: E501 desc: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_curl_range.py b/vulncheck_sdk/aio/models/advisory_curl_range.py index d5905bbb..a3f86d1c 100644 --- a/vulncheck_sdk/aio/models/advisory_curl_range.py +++ b/vulncheck_sdk/aio/models/advisory_curl_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlRange(BaseModel): """ - AdvisoryCurlRange + advisory.CurlRange """ # noqa: E501 events: Optional[List[Dict[str, StrictStr]]] = None repo: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cve_detail.py b/vulncheck_sdk/aio/models/advisory_cve_detail.py index 1c88309d..5407de9f 100644 --- a/vulncheck_sdk/aio/models/advisory_cve_detail.py +++ b/vulncheck_sdk/aio/models/advisory_cve_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEDetail(BaseModel): """ - AdvisoryCVEDetail + advisory.CVEDetail """ # noqa: E501 base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") cveid: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cve_details_link.py b/vulncheck_sdk/aio/models/advisory_cve_details_link.py index b625a7d0..b969c03f 100644 --- a/vulncheck_sdk/aio/models/advisory_cve_details_link.py +++ b/vulncheck_sdk/aio/models/advisory_cve_details_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEDetailsLink(BaseModel): """ - AdvisoryCVEDetailsLink + advisory.CVEDetailsLink """ # noqa: E501 url: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cve_reference.py b/vulncheck_sdk/aio/models/advisory_cve_reference.py index b29bd9d7..5872c15d 100644 --- a/vulncheck_sdk/aio/models/advisory_cve_reference.py +++ b/vulncheck_sdk/aio/models/advisory_cve_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEReference(BaseModel): """ - AdvisoryCVEReference + advisory.CVEReference """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cvrf.py b/vulncheck_sdk/aio/models/advisory_cvrf.py index 3e6c3cd5..aff454b3 100644 --- a/vulncheck_sdk/aio/models/advisory_cvrf.py +++ b/vulncheck_sdk/aio/models/advisory_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,28 +18,17 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability from typing import Optional, Set from typing_extensions import Self class AdvisoryCvrf(BaseModel): """ - AdvisoryCvrf + advisory.Cvrf """ # noqa: E501 cve: Optional[List[StrictStr]] = None - notes: Optional[List[AdvisoryDocumentNote]] = None - product_tree: Optional[AdvisoryProductTree] = Field(default=None, alias="productTree") - references: Optional[List[AdvisoryCVRFReference]] = None - title: Optional[StrictStr] = None - tracking: Optional[AdvisoryDocumentTracking] = None - vulnerabilities: Optional[List[AdvisoryVulnerability]] = None - __properties: ClassVar[List[str]] = ["cve", "notes", "productTree", "references", "title", "tracking", "vulnerabilities"] + __properties: ClassVar[List[str]] = ["cve"] model_config = ConfigDict( populate_by_name=True, @@ -80,33 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in notes (list) - _items = [] - if self.notes: - for _item_notes in self.notes: - if _item_notes: - _items.append(_item_notes.to_dict()) - _dict['notes'] = _items - # override the default output from pydantic by calling `to_dict()` of product_tree - if self.product_tree: - _dict['productTree'] = self.product_tree.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of tracking - if self.tracking: - _dict['tracking'] = self.tracking.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in vulnerabilities (list) - _items = [] - if self.vulnerabilities: - for _item_vulnerabilities in self.vulnerabilities: - if _item_vulnerabilities: - _items.append(_item_vulnerabilities.to_dict()) - _dict['vulnerabilities'] = _items return _dict @classmethod @@ -119,13 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cve": obj.get("cve"), - "notes": [AdvisoryDocumentNote.from_dict(_item) for _item in obj["notes"]] if obj.get("notes") is not None else None, - "productTree": AdvisoryProductTree.from_dict(obj["productTree"]) if obj.get("productTree") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "title": obj.get("title"), - "tracking": AdvisoryDocumentTracking.from_dict(obj["tracking"]) if obj.get("tracking") is not None else None, - "vulnerabilities": [AdvisoryVulnerability.from_dict(_item) for _item in obj["vulnerabilities"]] if obj.get("vulnerabilities") is not None else None + "cve": obj.get("cve") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_cvrf_reference.py b/vulncheck_sdk/aio/models/advisory_cvrf_reference.py deleted file mode 100644 index e62a271a..00000000 --- a/vulncheck_sdk/aio/models/advisory_cvrf_reference.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCVRFReference(BaseModel): - """ - AdvisoryCVRFReference - """ # noqa: E501 - description: Optional[StrictStr] = None - url: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["description", "url"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "description": obj.get("description"), - "url": obj.get("url") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_cvss.py b/vulncheck_sdk/aio/models/advisory_cvss.py index 9cc213aa..4760c02c 100644 --- a/vulncheck_sdk/aio/models/advisory_cvss.py +++ b/vulncheck_sdk/aio/models/advisory_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSS(BaseModel): """ - AdvisoryCVSS + advisory.CVSS """ # noqa: E501 score: Optional[StrictStr] = None severity: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cvsss_v23.py b/vulncheck_sdk/aio/models/advisory_cvsss_v23.py index 9f4b60da..4b95699b 100644 --- a/vulncheck_sdk/aio/models/advisory_cvsss_v23.py +++ b/vulncheck_sdk/aio/models/advisory_cvsss_v23.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCvsssV23(BaseModel): """ - AdvisoryCvsssV23 + advisory.CvsssV2_3 """ # noqa: E501 basescore: Optional[StrictStr] = None temporalscore: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cvssv2.py b/vulncheck_sdk/aio/models/advisory_cvssv2.py index 4d6347a4..9fc67c13 100644 --- a/vulncheck_sdk/aio/models/advisory_cvssv2.py +++ b/vulncheck_sdk/aio/models/advisory_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV2(BaseModel): """ - AdvisoryCVSSV2 + advisory.CVSSV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/aio/models/advisory_cvssv3.py b/vulncheck_sdk/aio/models/advisory_cvssv3.py index 881da650..f913eeb7 100644 --- a/vulncheck_sdk/aio/models/advisory_cvssv3.py +++ b/vulncheck_sdk/aio/models/advisory_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV3(BaseModel): """ - AdvisoryCVSSV3 + advisory.CVSSV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/aio/models/advisory_cvssv40.py b/vulncheck_sdk/aio/models/advisory_cvssv40.py index fa7bf159..12ae4b29 100644 --- a/vulncheck_sdk/aio/models/advisory_cvssv40.py +++ b/vulncheck_sdk/aio/models/advisory_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV40(BaseModel): """ - AdvisoryCVSSV40 + this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") recovery: Optional[StrictStr] = Field(default=None, alias="Recovery") diff --git a/vulncheck_sdk/aio/models/advisory_cvssv40_threat.py b/vulncheck_sdk/aio/models/advisory_cvssv40_threat.py index 3ca22f61..0ea1d936 100644 --- a/vulncheck_sdk/aio/models/advisory_cvssv40_threat.py +++ b/vulncheck_sdk/aio/models/advisory_cvssv40_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV40Threat(BaseModel): """ - AdvisoryCVSSV40Threat + advisory.CVSSV40Threat """ # noqa: E501 base_threat_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseThreatScore") base_threat_severity: Optional[StrictStr] = Field(default=None, alias="baseThreatSeverity") diff --git a/vulncheck_sdk/aio/models/advisory_cwe.py b/vulncheck_sdk/aio/models/advisory_cwe.py index fafcbeb7..7ee8ecbb 100644 --- a/vulncheck_sdk/aio/models/advisory_cwe.py +++ b/vulncheck_sdk/aio/models/advisory_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCwe(BaseModel): """ - AdvisoryCwe + advisory.Cwe """ # noqa: E501 id: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cwe_acceptance_level.py b/vulncheck_sdk/aio/models/advisory_cwe_acceptance_level.py index d4d7d910..86c56db5 100644 --- a/vulncheck_sdk/aio/models/advisory_cwe_acceptance_level.py +++ b/vulncheck_sdk/aio/models/advisory_cwe_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCweAcceptanceLevel(BaseModel): """ - AdvisoryCweAcceptanceLevel + advisory.CweAcceptanceLevel """ # noqa: E501 description: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/aio/models/advisory_cwe_data.py b/vulncheck_sdk/aio/models/advisory_cwe_data.py index 372fe6dd..a46b3f50 100644 --- a/vulncheck_sdk/aio/models/advisory_cwe_data.py +++ b/vulncheck_sdk/aio/models/advisory_cwe_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCweData(BaseModel): """ - AdvisoryCweData + advisory.CweData """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_cwes.py b/vulncheck_sdk/aio/models/advisory_cwes.py index afb5b020..dc294e63 100644 --- a/vulncheck_sdk/aio/models/advisory_cwes.py +++ b/vulncheck_sdk/aio/models/advisory_cwes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,19 +18,17 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictInt +from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode from typing import Optional, Set from typing_extensions import Self class AdvisoryCwes(BaseModel): """ - AdvisoryCwes + advisory.Cwes """ # noqa: E501 - nodes: Optional[List[AdvisoryCWENode]] = None - total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") - __properties: ClassVar[List[str]] = ["nodes", "totalCount"] + nodes: Optional[List[Dict[str, Any]]] = None + __properties: ClassVar[List[str]] = ["nodes"] model_config = ConfigDict( populate_by_name=True, @@ -71,13 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in nodes (list) - _items = [] - if self.nodes: - for _item_nodes in self.nodes: - if _item_nodes: - _items.append(_item_nodes.to_dict()) - _dict['nodes'] = _items return _dict @classmethod @@ -90,8 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "nodes": [AdvisoryCWENode.from_dict(_item) for _item in obj["nodes"]] if obj.get("nodes") is not None else None, - "totalCount": obj.get("totalCount") + "nodes": obj.get("nodes") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_cycle.py b/vulncheck_sdk/aio/models/advisory_cycle.py index 812309b2..48a1a06e 100644 --- a/vulncheck_sdk/aio/models/advisory_cycle.py +++ b/vulncheck_sdk/aio/models/advisory_cycle.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,20 +25,20 @@ class AdvisoryCycle(BaseModel): """ - AdvisoryCycle + advisory.Cycle """ # noqa: E501 codename: Optional[StrictStr] = None cycle: Optional[StrictStr] = None - discontinued: Optional[Dict[str, Any]] = None - eol: Optional[Dict[str, Any]] = None - extended_support: Optional[Dict[str, Any]] = Field(default=None, alias="extendedSupport") + discontinued: Optional[Any] = None + eol: Optional[Any] = None + extended_support: Optional[Any] = Field(default=None, alias="extendedSupport") latest: Optional[StrictStr] = None latest_release_date: Optional[StrictStr] = Field(default=None, alias="latestReleaseDate") link: Optional[StrictStr] = None - lts: Optional[Dict[str, Any]] = None + lts: Optional[Any] = None release_date: Optional[StrictStr] = Field(default=None, alias="releaseDate") release_label: Optional[StrictStr] = Field(default=None, alias="releaseLabel") - support: Optional[Dict[str, Any]] = None + support: Optional[Any] = None __properties: ClassVar[List[str]] = ["codename", "cycle", "discontinued", "eol", "extendedSupport", "latest", "latestReleaseDate", "link", "lts", "releaseDate", "releaseLabel", "support"] model_config = ConfigDict( @@ -80,6 +80,31 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if discontinued (nullable) is None + # and model_fields_set contains the field + if self.discontinued is None and "discontinued" in self.model_fields_set: + _dict['discontinued'] = None + + # set to None if eol (nullable) is None + # and model_fields_set contains the field + if self.eol is None and "eol" in self.model_fields_set: + _dict['eol'] = None + + # set to None if extended_support (nullable) is None + # and model_fields_set contains the field + if self.extended_support is None and "extended_support" in self.model_fields_set: + _dict['extendedSupport'] = None + + # set to None if lts (nullable) is None + # and model_fields_set contains the field + if self.lts is None and "lts" in self.model_fields_set: + _dict['lts'] = None + + # set to None if support (nullable) is None + # and model_fields_set contains the field + if self.support is None and "support" in self.model_fields_set: + _dict['support'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_d_link.py b/vulncheck_sdk/aio/models/advisory_d_link.py index cac66eed..a63c90d6 100644 --- a/vulncheck_sdk/aio/models/advisory_d_link.py +++ b/vulncheck_sdk/aio/models/advisory_d_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDLink(BaseModel): """ - AdvisoryDLink + advisory.DLink """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_dahua.py b/vulncheck_sdk/aio/models/advisory_dahua.py index d4508d41..26ad22ca 100644 --- a/vulncheck_sdk/aio/models/advisory_dahua.py +++ b/vulncheck_sdk/aio/models/advisory_dahua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDahua(BaseModel): """ - AdvisoryDahua + advisory.Dahua """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_dan_foss_cve_details.py b/vulncheck_sdk/aio/models/advisory_dan_foss_cve_details.py index 1a5fa19f..b2b6a880 100644 --- a/vulncheck_sdk/aio/models/advisory_dan_foss_cve_details.py +++ b/vulncheck_sdk/aio/models/advisory_dan_foss_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDanFossCVEDetails(BaseModel): """ - AdvisoryDanFossCVEDetails + advisory.DanFossCVEDetails """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_danfoss.py b/vulncheck_sdk/aio/models/advisory_danfoss.py index 7642cfe6..380c9078 100644 --- a/vulncheck_sdk/aio/models/advisory_danfoss.py +++ b/vulncheck_sdk/aio/models/advisory_danfoss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDanfoss(BaseModel): """ - AdvisoryDanfoss + advisory.Danfoss """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_dassault.py b/vulncheck_sdk/aio/models/advisory_dassault.py index 5b5bfd83..ee7f7b4a 100644 --- a/vulncheck_sdk/aio/models/advisory_dassault.py +++ b/vulncheck_sdk/aio/models/advisory_dassault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDassault(BaseModel): """ - AdvisoryDassault + advisory.Dassault """ # noqa: E501 affected_products: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_db_specific.py b/vulncheck_sdk/aio/models/advisory_db_specific.py index 54b1cdb0..11308797 100644 --- a/vulncheck_sdk/aio/models/advisory_db_specific.py +++ b/vulncheck_sdk/aio/models/advisory_db_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryDBSpecific(BaseModel): """ - AdvisoryDBSpecific + advisory.DBSpecific """ # noqa: E501 cwe: Optional[AdvisoryCurlCWE] = Field(default=None, alias="CWE") award: Optional[AdvisoryAward] = None diff --git a/vulncheck_sdk/aio/models/advisory_debian_cve.py b/vulncheck_sdk/aio/models/advisory_debian_cve.py index b744bcd0..4fcb1d9f 100644 --- a/vulncheck_sdk/aio/models/advisory_debian_cve.py +++ b/vulncheck_sdk/aio/models/advisory_debian_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDebianCVE(BaseModel): """ - AdvisoryDebianCVE + advisory.DebianCVE """ # noqa: E501 cve: Optional[StrictStr] = None debianbug: Optional[StrictInt] = None diff --git a/vulncheck_sdk/aio/models/advisory_debian_security_advisory.py b/vulncheck_sdk/aio/models/advisory_debian_security_advisory.py index 07eab53c..c5ccd15e 100644 --- a/vulncheck_sdk/aio/models/advisory_debian_security_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_debian_security_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDebianSecurityAdvisory(BaseModel): """ - AdvisoryDebianSecurityAdvisory + advisory.DebianSecurityAdvisory """ # noqa: E501 affected_packages: Optional[List[AdvisoryAffectedDebianPackage]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_dell.py b/vulncheck_sdk/aio/models/advisory_dell.py index f5b01009..d5deed1c 100644 --- a/vulncheck_sdk/aio/models/advisory_dell.py +++ b/vulncheck_sdk/aio/models/advisory_dell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDell(BaseModel): """ - AdvisoryDell + advisory.Dell """ # noqa: E501 article_number: Optional[StrictStr] = Field(default=None, alias="articleNumber") combined_product_list: Optional[StrictStr] = Field(default=None, alias="combinedProductList") diff --git a/vulncheck_sdk/aio/models/advisory_dell_cve.py b/vulncheck_sdk/aio/models/advisory_dell_cve.py index 53d883b0..b6d601e1 100644 --- a/vulncheck_sdk/aio/models/advisory_dell_cve.py +++ b/vulncheck_sdk/aio/models/advisory_dell_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDellCVE(BaseModel): """ - AdvisoryDellCVE + advisory.DellCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_delta_advisory.py b/vulncheck_sdk/aio/models/advisory_delta_advisory.py index 21f627bf..e641c1e6 100644 --- a/vulncheck_sdk/aio/models/advisory_delta_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_delta_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDeltaAdvisory(BaseModel): """ - AdvisoryDeltaAdvisory + advisory.DeltaAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_dfn_cert.py b/vulncheck_sdk/aio/models/advisory_dfn_cert.py index a2b3eaac..2771dd98 100644 --- a/vulncheck_sdk/aio/models/advisory_dfn_cert.py +++ b/vulncheck_sdk/aio/models/advisory_dfn_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDFNCert(BaseModel): """ - AdvisoryDFNCert + advisory.DFNCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_distro_package.py b/vulncheck_sdk/aio/models/advisory_distro_package.py index 9b588c1a..c3c4db78 100644 --- a/vulncheck_sdk/aio/models/advisory_distro_package.py +++ b/vulncheck_sdk/aio/models/advisory_distro_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryDistroPackage(BaseModel): """ - AdvisoryDistroPackage + advisory.DistroPackage """ # noqa: E501 binary: Optional[StrictBool] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_distro_version.py b/vulncheck_sdk/aio/models/advisory_distro_version.py index 829417ef..432c7a6e 100644 --- a/vulncheck_sdk/aio/models/advisory_distro_version.py +++ b/vulncheck_sdk/aio/models/advisory_distro_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDistroVersion(BaseModel): """ - AdvisoryDistroVersion + advisory.DistroVersion """ # noqa: E501 arch: Optional[StrictStr] = None published_date: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_django.py b/vulncheck_sdk/aio/models/advisory_django.py index 57ebd5e5..5c4273ce 100644 --- a/vulncheck_sdk/aio/models/advisory_django.py +++ b/vulncheck_sdk/aio/models/advisory_django.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDjango(BaseModel): """ - AdvisoryDjango + advisory.Django """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_dnn.py b/vulncheck_sdk/aio/models/advisory_dnn.py index 5d656ce1..725471b2 100644 --- a/vulncheck_sdk/aio/models/advisory_dnn.py +++ b/vulncheck_sdk/aio/models/advisory_dnn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDNN(BaseModel): """ - AdvisoryDNN + advisory.DNN """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_document_metadata.py b/vulncheck_sdk/aio/models/advisory_document_metadata.py index 834e1728..4a32ff16 100644 --- a/vulncheck_sdk/aio/models/advisory_document_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_document_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,11 +29,11 @@ class AdvisoryDocumentMetadata(BaseModel): """ - AdvisoryDocumentMetadata + Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property """ # noqa: E501 category: Optional[StrictStr] = None csaf_version: Optional[StrictStr] = None - distribution: Optional[Dict[str, Any]] = None + distribution: Optional[Dict[str, Any]] = Field(default=None, description="advisory.CSAFDistribution") lang: Optional[StrictStr] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="used by ncsc") publisher: Optional[AdvisoryPublisher] = None diff --git a/vulncheck_sdk/aio/models/advisory_document_publisher.py b/vulncheck_sdk/aio/models/advisory_document_publisher.py index fd1e707c..6092a992 100644 --- a/vulncheck_sdk/aio/models/advisory_document_publisher.py +++ b/vulncheck_sdk/aio/models/advisory_document_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDocumentPublisher(BaseModel): """ - AdvisoryDocumentPublisher + advisory.DocumentPublisher """ # noqa: E501 contact_details: Optional[StrictStr] = None issuing_authority: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_document_tracking.py b/vulncheck_sdk/aio/models/advisory_document_tracking.py deleted file mode 100644 index aa0ac550..00000000 --- a/vulncheck_sdk/aio/models/advisory_document_tracking.py +++ /dev/null @@ -1,106 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentTracking(BaseModel): - """ - AdvisoryDocumentTracking - """ # noqa: E501 - current_release_date: Optional[StrictStr] = Field(default=None, alias="currentReleaseDate") - id: Optional[StrictStr] = None - initial_release_date: Optional[StrictStr] = Field(default=None, alias="initialReleaseDate") - revision_history: Optional[List[AdvisoryRevision]] = Field(default=None, alias="revisionHistory") - status: Optional[StrictStr] = None - version: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["currentReleaseDate", "id", "initialReleaseDate", "revisionHistory", "status", "version"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in revision_history (list) - _items = [] - if self.revision_history: - for _item_revision_history in self.revision_history: - if _item_revision_history: - _items.append(_item_revision_history.to_dict()) - _dict['revisionHistory'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "currentReleaseDate": obj.get("currentReleaseDate"), - "id": obj.get("id"), - "initialReleaseDate": obj.get("initialReleaseDate"), - "revisionHistory": [AdvisoryRevision.from_dict(_item) for _item in obj["revisionHistory"]] if obj.get("revisionHistory") is not None else None, - "status": obj.get("status"), - "version": obj.get("version") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_dot_cms.py b/vulncheck_sdk/aio/models/advisory_dot_cms.py index 97e2618d..8a406711 100644 --- a/vulncheck_sdk/aio/models/advisory_dot_cms.py +++ b/vulncheck_sdk/aio/models/advisory_dot_cms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDotCMS(BaseModel): """ - AdvisoryDotCMS + advisory.DotCMS """ # noqa: E501 credit: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_dragos_advisory.py b/vulncheck_sdk/aio/models/advisory_dragos_advisory.py index 9a9c17c4..9bc38512 100644 --- a/vulncheck_sdk/aio/models/advisory_dragos_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_dragos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDragosAdvisory(BaseModel): """ - AdvisoryDragosAdvisory + advisory.DragosAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_draytek.py b/vulncheck_sdk/aio/models/advisory_draytek.py index be174b15..3658c4f7 100644 --- a/vulncheck_sdk/aio/models/advisory_draytek.py +++ b/vulncheck_sdk/aio/models/advisory_draytek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDraytek(BaseModel): """ - AdvisoryDraytek + advisory.Draytek """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_drupal.py b/vulncheck_sdk/aio/models/advisory_drupal.py index 7c4d3932..e3d23401 100644 --- a/vulncheck_sdk/aio/models/advisory_drupal.py +++ b/vulncheck_sdk/aio/models/advisory_drupal.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDrupal(BaseModel): """ - AdvisoryDrupal + advisory.Drupal """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_eaton_advisory.py b/vulncheck_sdk/aio/models/advisory_eaton_advisory.py index b0fbcffb..e1fad07f 100644 --- a/vulncheck_sdk/aio/models/advisory_eaton_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_eaton_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEatonAdvisory(BaseModel): """ - AdvisoryEatonAdvisory + advisory.EatonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_eco_system.py b/vulncheck_sdk/aio/models/advisory_eco_system.py index af016ec2..027b4ade 100644 --- a/vulncheck_sdk/aio/models/advisory_eco_system.py +++ b/vulncheck_sdk/aio/models/advisory_eco_system.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEcoSystem(BaseModel): """ - AdvisoryEcoSystem + advisory.EcoSystem """ # noqa: E501 severity: Optional[StrictStr] = None spl: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_elastic.py b/vulncheck_sdk/aio/models/advisory_elastic.py index 234ebf37..14e17bf8 100644 --- a/vulncheck_sdk/aio/models/advisory_elastic.py +++ b/vulncheck_sdk/aio/models/advisory_elastic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryElastic(BaseModel): """ - AdvisoryElastic + advisory.Elastic """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_elspec.py b/vulncheck_sdk/aio/models/advisory_elspec.py index a714f3e9..46ec6d4c 100644 --- a/vulncheck_sdk/aio/models/advisory_elspec.py +++ b/vulncheck_sdk/aio/models/advisory_elspec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryElspec(BaseModel): """ - AdvisoryElspec + advisory.Elspec """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_emerging_threats_snort.py b/vulncheck_sdk/aio/models/advisory_emerging_threats_snort.py index cc47b249..ba66f259 100644 --- a/vulncheck_sdk/aio/models/advisory_emerging_threats_snort.py +++ b/vulncheck_sdk/aio/models/advisory_emerging_threats_snort.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEmergingThreatsSnort(BaseModel): """ - AdvisoryEmergingThreatsSnort + advisory.EmergingThreatsSnort """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_emerson_advisory.py b/vulncheck_sdk/aio/models/advisory_emerson_advisory.py index b2dde065..dfaf81aa 100644 --- a/vulncheck_sdk/aio/models/advisory_emerson_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_emerson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEmersonAdvisory(BaseModel): """ - AdvisoryEmersonAdvisory + advisory.EmersonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_end_of_life.py b/vulncheck_sdk/aio/models/advisory_end_of_life.py index da2d1e01..88618766 100644 --- a/vulncheck_sdk/aio/models/advisory_end_of_life.py +++ b/vulncheck_sdk/aio/models/advisory_end_of_life.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryEndOfLife(BaseModel): """ - AdvisoryEndOfLife + advisory.EndOfLife """ # noqa: E501 cve: Optional[List[StrictStr]] = None cycles: Optional[List[AdvisoryCycle]] = None diff --git a/vulncheck_sdk/aio/models/advisory_endress.py b/vulncheck_sdk/aio/models/advisory_endress.py index 87feb39b..a1d675a5 100644 --- a/vulncheck_sdk/aio/models/advisory_endress.py +++ b/vulncheck_sdk/aio/models/advisory_endress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEndress(BaseModel): """ - AdvisoryEndress + advisory.Endress """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_enisa_id_product.py b/vulncheck_sdk/aio/models/advisory_enisa_id_product.py index f9f18dff..a3cd1a12 100644 --- a/vulncheck_sdk/aio/models/advisory_enisa_id_product.py +++ b/vulncheck_sdk/aio/models/advisory_enisa_id_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEnisaIDProduct(BaseModel): """ - AdvisoryEnisaIDProduct + advisory.EnisaIDProduct """ # noqa: E501 id: Optional[StrictStr] = None product_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_enisa_id_vendor.py b/vulncheck_sdk/aio/models/advisory_enisa_id_vendor.py index c2c93583..40590457 100644 --- a/vulncheck_sdk/aio/models/advisory_enisa_id_vendor.py +++ b/vulncheck_sdk/aio/models/advisory_enisa_id_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEnisaIDVendor(BaseModel): """ - AdvisoryEnisaIDVendor + advisory.EnisaIDVendor """ # noqa: E501 id: Optional[StrictStr] = None vendor_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_eol_alibaba.py b/vulncheck_sdk/aio/models/advisory_eol_alibaba.py index b4dc4803..3dea209d 100644 --- a/vulncheck_sdk/aio/models/advisory_eol_alibaba.py +++ b/vulncheck_sdk/aio/models/advisory_eol_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLAlibaba(BaseModel): """ - AdvisoryEOLAlibaba + advisory.EOLAlibaba """ # noqa: E501 cve: Optional[List[StrictStr]] = None eol_date: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_eol_microsoft.py b/vulncheck_sdk/aio/models/advisory_eol_microsoft.py index 4f467c94..9bd2efba 100644 --- a/vulncheck_sdk/aio/models/advisory_eol_microsoft.py +++ b/vulncheck_sdk/aio/models/advisory_eol_microsoft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLMicrosoft(BaseModel): """ - AdvisoryEOLMicrosoft + advisory.EOLMicrosoft """ # noqa: E501 cve: Optional[List[StrictStr]] = None edition: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_eol_release_data.py b/vulncheck_sdk/aio/models/advisory_eol_release_data.py index 774e6c39..722fc13e 100644 --- a/vulncheck_sdk/aio/models/advisory_eol_release_data.py +++ b/vulncheck_sdk/aio/models/advisory_eol_release_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLReleaseData(BaseModel): """ - AdvisoryEOLReleaseData + advisory.EOLReleaseData """ # noqa: E501 already_eol: Optional[StrictBool] = None branch: Optional[StrictStr] = Field(default=None, description="Alpine Linux") diff --git a/vulncheck_sdk/aio/models/advisory_euvd.py b/vulncheck_sdk/aio/models/advisory_euvd.py index 3d67c8fe..d06b3016 100644 --- a/vulncheck_sdk/aio/models/advisory_euvd.py +++ b/vulncheck_sdk/aio/models/advisory_euvd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryEUVD(BaseModel): """ - AdvisoryEUVD + advisory.EUVD """ # noqa: E501 aliases: Optional[List[StrictStr]] = None assigner: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_event.py b/vulncheck_sdk/aio/models/advisory_event.py index c9c4aa0d..c5f250d1 100644 --- a/vulncheck_sdk/aio/models/advisory_event.py +++ b/vulncheck_sdk/aio/models/advisory_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEvent(BaseModel): """ - AdvisoryEvent + advisory.Event """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_exodus_intel.py b/vulncheck_sdk/aio/models/advisory_exodus_intel.py index cbff2674..cf9c1e24 100644 --- a/vulncheck_sdk/aio/models/advisory_exodus_intel.py +++ b/vulncheck_sdk/aio/models/advisory_exodus_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExodusIntel(BaseModel): """ - AdvisoryExodusIntel + advisory.ExodusIntel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_exploit_db_exploitv2.py b/vulncheck_sdk/aio/models/advisory_exploit_db_exploitv2.py index 088ec089..9d16b734 100644 --- a/vulncheck_sdk/aio/models/advisory_exploit_db_exploitv2.py +++ b/vulncheck_sdk/aio/models/advisory_exploit_db_exploitv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExploitDBExploitv2(BaseModel): """ - AdvisoryExploitDBExploitv2 + advisory.ExploitDBExploitv2 """ # noqa: E501 author: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_external_references.py b/vulncheck_sdk/aio/models/advisory_external_references.py index ad50c131..d346c4b3 100644 --- a/vulncheck_sdk/aio/models/advisory_external_references.py +++ b/vulncheck_sdk/aio/models/advisory_external_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExternalReferences(BaseModel): """ - AdvisoryExternalReferences + advisory.ExternalReferences """ # noqa: E501 description: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_f5.py b/vulncheck_sdk/aio/models/advisory_f5.py index 9339a3d6..c3ee8092 100644 --- a/vulncheck_sdk/aio/models/advisory_f5.py +++ b/vulncheck_sdk/aio/models/advisory_f5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryF5(BaseModel): """ - AdvisoryF5 + advisory.F5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_f_secure.py b/vulncheck_sdk/aio/models/advisory_f_secure.py index dfa04cc5..02717689 100644 --- a/vulncheck_sdk/aio/models/advisory_f_secure.py +++ b/vulncheck_sdk/aio/models/advisory_f_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFSecure(BaseModel): """ - AdvisoryFSecure + advisory.FSecure """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_fanuc.py b/vulncheck_sdk/aio/models/advisory_fanuc.py index 33d9641b..22c73779 100644 --- a/vulncheck_sdk/aio/models/advisory_fanuc.py +++ b/vulncheck_sdk/aio/models/advisory_fanuc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFanuc(BaseModel): """ - AdvisoryFanuc + advisory.Fanuc """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_fastly.py b/vulncheck_sdk/aio/models/advisory_fastly.py index 983369ba..0ee25881 100644 --- a/vulncheck_sdk/aio/models/advisory_fastly.py +++ b/vulncheck_sdk/aio/models/advisory_fastly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFastly(BaseModel): """ - AdvisoryFastly + advisory.Fastly """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_festo.py b/vulncheck_sdk/aio/models/advisory_festo.py index eca057f2..8136acf5 100644 --- a/vulncheck_sdk/aio/models/advisory_festo.py +++ b/vulncheck_sdk/aio/models/advisory_festo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFesto(BaseModel): """ - AdvisoryFesto + advisory.Festo """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_file_cloud.py b/vulncheck_sdk/aio/models/advisory_file_cloud.py index 9f119ada..863ec8ee 100644 --- a/vulncheck_sdk/aio/models/advisory_file_cloud.py +++ b/vulncheck_sdk/aio/models/advisory_file_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFileCloud(BaseModel): """ - AdvisoryFileCloud + advisory.FileCloud """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_file_zilla.py b/vulncheck_sdk/aio/models/advisory_file_zilla.py index 340102b3..04f599a6 100644 --- a/vulncheck_sdk/aio/models/advisory_file_zilla.py +++ b/vulncheck_sdk/aio/models/advisory_file_zilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFileZilla(BaseModel): """ - AdvisoryFileZilla + advisory.FileZilla """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_fix_aff.py b/vulncheck_sdk/aio/models/advisory_fix_aff.py index 59b3d4f2..1940d267 100644 --- a/vulncheck_sdk/aio/models/advisory_fix_aff.py +++ b/vulncheck_sdk/aio/models/advisory_fix_aff.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFixAff(BaseModel): """ - AdvisoryFixAff + advisory.FixAff """ # noqa: E501 affected_since: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_flag.py b/vulncheck_sdk/aio/models/advisory_flag.py index b93f5c74..fad3e4a1 100644 --- a/vulncheck_sdk/aio/models/advisory_flag.py +++ b/vulncheck_sdk/aio/models/advisory_flag.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryFlag(BaseModel): """ - AdvisoryFlag + advisory.Flag """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") group_ids: Optional[List[StrictStr]] = None label: Optional[StrictStr] = None product_ids: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_flatt_security.py b/vulncheck_sdk/aio/models/advisory_flatt_security.py index c6a3688c..8d477fe3 100644 --- a/vulncheck_sdk/aio/models/advisory_flatt_security.py +++ b/vulncheck_sdk/aio/models/advisory_flatt_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFlattSecurity(BaseModel): """ - AdvisoryFlattSecurity + advisory.FlattSecurity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_forge_rock.py b/vulncheck_sdk/aio/models/advisory_forge_rock.py index 16a9d93c..7fd494b6 100644 --- a/vulncheck_sdk/aio/models/advisory_forge_rock.py +++ b/vulncheck_sdk/aio/models/advisory_forge_rock.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryForgeRock(BaseModel): """ - AdvisoryForgeRock + advisory.ForgeRock """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_fortinet_advisory.py b/vulncheck_sdk/aio/models/advisory_fortinet_advisory.py index ff1256cb..0f152d2c 100644 --- a/vulncheck_sdk/aio/models/advisory_fortinet_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_fortinet_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFortinetAdvisory(BaseModel): """ - AdvisoryFortinetAdvisory + advisory.FortinetAdvisory """ # noqa: E501 acknowledgement: Optional[StrictStr] = None affected_products: Optional[List[StrictStr]] = Field(default=None, alias="affectedProducts") diff --git a/vulncheck_sdk/aio/models/advisory_fortinet_ips.py b/vulncheck_sdk/aio/models/advisory_fortinet_ips.py index aeaf5ccd..ed1a9313 100644 --- a/vulncheck_sdk/aio/models/advisory_fortinet_ips.py +++ b/vulncheck_sdk/aio/models/advisory_fortinet_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFortinetIPS(BaseModel): """ - AdvisoryFortinetIPS + advisory.FortinetIPS """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_foxit.py b/vulncheck_sdk/aio/models/advisory_foxit.py index aa2a67b6..896ac989 100644 --- a/vulncheck_sdk/aio/models/advisory_foxit.py +++ b/vulncheck_sdk/aio/models/advisory_foxit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryFoxit(BaseModel): """ - AdvisoryFoxit + advisory.Foxit """ # noqa: E501 affected: Optional[List[AdvisoryFoxitAffected]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_foxit_affected.py b/vulncheck_sdk/aio/models/advisory_foxit_affected.py index 83e4b3af..61d37561 100644 --- a/vulncheck_sdk/aio/models/advisory_foxit_affected.py +++ b/vulncheck_sdk/aio/models/advisory_foxit_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFoxitAffected(BaseModel): """ - AdvisoryFoxitAffected + advisory.FoxitAffected """ # noqa: E501 product: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_fresenius.py b/vulncheck_sdk/aio/models/advisory_fresenius.py index 4aa1b097..00de2adb 100644 --- a/vulncheck_sdk/aio/models/advisory_fresenius.py +++ b/vulncheck_sdk/aio/models/advisory_fresenius.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFresenius(BaseModel): """ - AdvisoryFresenius + advisory.Fresenius """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gallagher.py b/vulncheck_sdk/aio/models/advisory_gallagher.py index 9c69b7a2..353e5e35 100644 --- a/vulncheck_sdk/aio/models/advisory_gallagher.py +++ b/vulncheck_sdk/aio/models/advisory_gallagher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGallagher(BaseModel): """ - AdvisoryGallagher + advisory.Gallagher """ # noqa: E501 active_exploitation: Optional[StrictBool] = Field(default=None, alias="activeExploitation") affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gcp.py b/vulncheck_sdk/aio/models/advisory_gcp.py index c0d28f04..4fa8cb6e 100644 --- a/vulncheck_sdk/aio/models/advisory_gcp.py +++ b/vulncheck_sdk/aio/models/advisory_gcp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGCP(BaseModel): """ - AdvisoryGCP + advisory.GCP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ge_gas.py b/vulncheck_sdk/aio/models/advisory_ge_gas.py index 5ed8411a..214f73d4 100644 --- a/vulncheck_sdk/aio/models/advisory_ge_gas.py +++ b/vulncheck_sdk/aio/models/advisory_ge_gas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGEGas(BaseModel): """ - AdvisoryGEGas + advisory.GEGas """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ge_healthcare_advisory.py b/vulncheck_sdk/aio/models/advisory_ge_healthcare_advisory.py index e49cf833..6dda242d 100644 --- a/vulncheck_sdk/aio/models/advisory_ge_healthcare_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_ge_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGEHealthcareAdvisory(BaseModel): """ - AdvisoryGEHealthcareAdvisory + advisory.GEHealthcareAdvisory """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_gen.py b/vulncheck_sdk/aio/models/advisory_gen.py index fe71ae21..fb4f2dc8 100644 --- a/vulncheck_sdk/aio/models/advisory_gen.py +++ b/vulncheck_sdk/aio/models/advisory_gen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGen(BaseModel): """ - AdvisoryGen + advisory.Gen """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_genetec.py b/vulncheck_sdk/aio/models/advisory_genetec.py index 3269ee2f..3a0afb6f 100644 --- a/vulncheck_sdk/aio/models/advisory_genetec.py +++ b/vulncheck_sdk/aio/models/advisory_genetec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGenetec(BaseModel): """ - AdvisoryGenetec + advisory.Genetec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gh_advisory_json_lean.py b/vulncheck_sdk/aio/models/advisory_gh_advisory_json_lean.py index b2eedeb5..d1544386 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_advisory_json_lean.py +++ b/vulncheck_sdk/aio/models/advisory_gh_advisory_json_lean.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryGHAdvisoryJSONLean(BaseModel): """ - AdvisoryGHAdvisoryJSONLean + advisory.GHAdvisoryJSONLean """ # noqa: E501 classification: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_gh_cvss.py b/vulncheck_sdk/aio/models/advisory_gh_cvss.py index b5d4af4e..e398d368 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_cvss.py +++ b/vulncheck_sdk/aio/models/advisory_gh_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHCvss(BaseModel): """ - AdvisoryGHCvss + advisory.GHCvss """ # noqa: E501 score: Optional[Union[StrictFloat, StrictInt]] = None vector_string: Optional[StrictStr] = Field(default=None, alias="vectorString") diff --git a/vulncheck_sdk/aio/models/advisory_gh_identifier.py b/vulncheck_sdk/aio/models/advisory_gh_identifier.py index 3eec14a4..ab32374d 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_identifier.py +++ b/vulncheck_sdk/aio/models/advisory_gh_identifier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHIdentifier(BaseModel): """ - AdvisoryGHIdentifier + advisory.GHIdentifier """ # noqa: E501 type: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gh_node.py b/vulncheck_sdk/aio/models/advisory_gh_node.py index cd138e01..b276fba1 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_node.py +++ b/vulncheck_sdk/aio/models/advisory_gh_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHNode(BaseModel): """ - AdvisoryGHNode + advisory.GHNode """ # noqa: E501 package: Optional[AdvisoryGHPackage] = None severity: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gh_package.py b/vulncheck_sdk/aio/models/advisory_gh_package.py index b491a48d..3a68c0c8 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_package.py +++ b/vulncheck_sdk/aio/models/advisory_gh_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHPackage(BaseModel): """ - AdvisoryGHPackage + advisory.GHPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gh_reference.py b/vulncheck_sdk/aio/models/advisory_gh_reference.py index bcba2156..30fb64a0 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_reference.py +++ b/vulncheck_sdk/aio/models/advisory_gh_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHReference(BaseModel): """ - AdvisoryGHReference + advisory.GHReference """ # noqa: E501 url: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["url"] diff --git a/vulncheck_sdk/aio/models/advisory_gh_vulnerabilities.py b/vulncheck_sdk/aio/models/advisory_gh_vulnerabilities.py index 5145aafb..57d6f164 100644 --- a/vulncheck_sdk/aio/models/advisory_gh_vulnerabilities.py +++ b/vulncheck_sdk/aio/models/advisory_gh_vulnerabilities.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHVulnerabilities(BaseModel): """ - AdvisoryGHVulnerabilities + advisory.GHVulnerabilities """ # noqa: E501 nodes: Optional[List[AdvisoryGHNode]] = None total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") diff --git a/vulncheck_sdk/aio/models/advisory_ghsa.py b/vulncheck_sdk/aio/models/advisory_ghsa.py index 445c5378..4a2f8c80 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHSA(BaseModel): """ - AdvisoryGHSA + advisory.GHSA """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_affected.py b/vulncheck_sdk/aio/models/advisory_ghsa_affected.py index 46891951..164a3620 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_affected.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryGHSAAffected(BaseModel): """ - AdvisoryGHSAAffected + advisory.GHSAAffected """ # noqa: E501 ecosystem_specific: Optional[AdvisoryGHSAEcoSystemSpecific] = None package: Optional[AdvisoryGHSAPackage] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_database_specific.py b/vulncheck_sdk/aio/models/advisory_ghsa_database_specific.py index 04973beb..b474eceb 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_database_specific.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSADatabaseSpecific(BaseModel): """ - AdvisoryGHSADatabaseSpecific + advisory.GHSADatabaseSpecific """ # noqa: E501 cwe_ids: Optional[List[StrictStr]] = None github_reviewed: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_eco_system_specific.py b/vulncheck_sdk/aio/models/advisory_ghsa_eco_system_specific.py index 6f3d5954..e08d3aae 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_eco_system_specific.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_eco_system_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAEcoSystemSpecific(BaseModel): """ - AdvisoryGHSAEcoSystemSpecific + advisory.GHSAEcoSystemSpecific """ # noqa: E501 affected_functions: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["affected_functions"] diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_event.py b/vulncheck_sdk/aio/models/advisory_ghsa_event.py index 6977cbab..f4188a08 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_event.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAEvent(BaseModel): """ - AdvisoryGHSAEvent + advisory.GHSAEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_package.py b/vulncheck_sdk/aio/models/advisory_ghsa_package.py index 55b41de6..663d197e 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_package.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAPackage(BaseModel): """ - AdvisoryGHSAPackage + advisory.GHSAPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_range.py b/vulncheck_sdk/aio/models/advisory_ghsa_range.py index bf272c8c..4b64aa69 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_range.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHSARange(BaseModel): """ - AdvisoryGHSARange + advisory.GHSARange """ # noqa: E501 events: Optional[List[AdvisoryGHSAEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_reference.py b/vulncheck_sdk/aio/models/advisory_ghsa_reference.py index 08b26fbb..60decfcf 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_reference.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAReference(BaseModel): """ - AdvisoryGHSAReference + advisory.GHSAReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ghsa_severity.py b/vulncheck_sdk/aio/models/advisory_ghsa_severity.py index 500e4342..f3255b05 100644 --- a/vulncheck_sdk/aio/models/advisory_ghsa_severity.py +++ b/vulncheck_sdk/aio/models/advisory_ghsa_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSASeverity(BaseModel): """ - AdvisoryGHSASeverity + advisory.GHSASeverity """ # noqa: E501 score: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gigabyte.py b/vulncheck_sdk/aio/models/advisory_gigabyte.py index fcb78765..425f2a12 100644 --- a/vulncheck_sdk/aio/models/advisory_gigabyte.py +++ b/vulncheck_sdk/aio/models/advisory_gigabyte.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGigabyte(BaseModel): """ - AdvisoryGigabyte + advisory.Gigabyte """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_git_hub_exploit.py b/vulncheck_sdk/aio/models/advisory_git_hub_exploit.py index efa55cf5..d5845dbb 100644 --- a/vulncheck_sdk/aio/models/advisory_git_hub_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_git_hub_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitHubExploit(BaseModel): """ - AdvisoryGitHubExploit + advisory.GitHubExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_git_lab_exploit.py b/vulncheck_sdk/aio/models/advisory_git_lab_exploit.py index c4de6b9f..098953a5 100644 --- a/vulncheck_sdk/aio/models/advisory_git_lab_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_git_lab_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitLabExploit(BaseModel): """ - AdvisoryGitLabExploit + advisory.GitLabExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gitee_exploit.py b/vulncheck_sdk/aio/models/advisory_gitee_exploit.py index 1ae4e8e3..9d396d37 100644 --- a/vulncheck_sdk/aio/models/advisory_gitee_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_gitee_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGiteeExploit(BaseModel): """ - AdvisoryGiteeExploit + advisory.GiteeExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_gitlab_advisory.py b/vulncheck_sdk/aio/models/advisory_gitlab_advisory.py index a3216175..2a4e6034 100644 --- a/vulncheck_sdk/aio/models/advisory_gitlab_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_gitlab_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitlabAdvisory(BaseModel): """ - AdvisoryGitlabAdvisory + advisory.GitlabAdvisory """ # noqa: E501 affected_range: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None @@ -33,7 +33,7 @@ class AdvisoryGitlabAdvisory(BaseModel): cvss_v2: Optional[StrictStr] = None cvss_v3: Optional[StrictStr] = None cwe: Optional[List[StrictStr]] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None filename: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_glibc.py b/vulncheck_sdk/aio/models/advisory_glibc.py index 8a13c5b4..89760f0f 100644 --- a/vulncheck_sdk/aio/models/advisory_glibc.py +++ b/vulncheck_sdk/aio/models/advisory_glibc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGlibc(BaseModel): """ - AdvisoryGlibc + advisory.Glibc """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_gmo_cyber_security.py b/vulncheck_sdk/aio/models/advisory_gmo_cyber_security.py index 57a7789e..b94660ff 100644 --- a/vulncheck_sdk/aio/models/advisory_gmo_cyber_security.py +++ b/vulncheck_sdk/aio/models/advisory_gmo_cyber_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGMOCyberSecurity(BaseModel): """ - AdvisoryGMOCyberSecurity + advisory.GMOCyberSecurity """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_gnu_tls.py b/vulncheck_sdk/aio/models/advisory_gnu_tls.py index a2686f55..40a895fb 100644 --- a/vulncheck_sdk/aio/models/advisory_gnu_tls.py +++ b/vulncheck_sdk/aio/models/advisory_gnu_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGnuTLS(BaseModel): """ - AdvisoryGnuTLS + advisory.GnuTLS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_credits.py b/vulncheck_sdk/aio/models/advisory_go_credits.py index 57ce9e97..e697cca1 100644 --- a/vulncheck_sdk/aio/models/advisory_go_credits.py +++ b/vulncheck_sdk/aio/models/advisory_go_credits.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoCredits(BaseModel): """ - AdvisoryGoCredits + advisory.GoCredits """ # noqa: E501 name: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["name"] diff --git a/vulncheck_sdk/aio/models/advisory_go_event.py b/vulncheck_sdk/aio/models/advisory_go_event.py index 4b8c3d31..4c28ced8 100644 --- a/vulncheck_sdk/aio/models/advisory_go_event.py +++ b/vulncheck_sdk/aio/models/advisory_go_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoEvent(BaseModel): """ - AdvisoryGoEvent + advisory.GoEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_affected.py b/vulncheck_sdk/aio/models/advisory_go_vuln_affected.py index dcd1ead4..4bfd3a91 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_affected.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryGoVulnAffected(BaseModel): """ - AdvisoryGoVulnAffected + advisory.GoVulnAffected """ # noqa: E501 database_specific: Optional[AdvisoryGoVulnDatabaseSpecific] = None ecosystem_specific: Optional[AdvisoryGoVulnEcosystemSpecific] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_database_specific.py b/vulncheck_sdk/aio/models/advisory_go_vuln_database_specific.py index d8e93ac2..e365e90a 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_database_specific.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnDatabaseSpecific(BaseModel): """ - AdvisoryGoVulnDatabaseSpecific + advisory.GoVulnDatabaseSpecific """ # noqa: E501 url: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["url"] diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_ecosystem_specific.py b/vulncheck_sdk/aio/models/advisory_go_vuln_ecosystem_specific.py index a11a4c8d..72708f2a 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_ecosystem_specific.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_ecosystem_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGoVulnEcosystemSpecific(BaseModel): """ - AdvisoryGoVulnEcosystemSpecific + advisory.GoVulnEcosystemSpecific """ # noqa: E501 imports: Optional[List[AdvisoryGoVulnImport]] = None __properties: ClassVar[List[str]] = ["imports"] diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_import.py b/vulncheck_sdk/aio/models/advisory_go_vuln_import.py index ebb925e8..f958aafc 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_import.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_import.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnImport(BaseModel): """ - AdvisoryGoVulnImport + advisory.GoVulnImport """ # noqa: E501 path: Optional[StrictStr] = None symbols: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_json.py b/vulncheck_sdk/aio/models/advisory_go_vuln_json.py index 78454e08..55a956bf 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_json.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryGoVulnJSON(BaseModel): """ - AdvisoryGoVulnJSON + advisory.GoVulnJSON """ # noqa: E501 advisory_url: Optional[StrictStr] = None affected: Optional[List[AdvisoryGoVulnAffected]] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_package.py b/vulncheck_sdk/aio/models/advisory_go_vuln_package.py index ba33b8f7..0c2e16e9 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_package.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnPackage(BaseModel): """ - AdvisoryGoVulnPackage + advisory.GoVulnPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_ranges.py b/vulncheck_sdk/aio/models/advisory_go_vuln_ranges.py index 84864e8c..d4fb8e60 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_ranges.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_ranges.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGoVulnRanges(BaseModel): """ - AdvisoryGoVulnRanges + advisory.GoVulnRanges """ # noqa: E501 events: Optional[List[AdvisoryGoEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_go_vuln_reference.py b/vulncheck_sdk/aio/models/advisory_go_vuln_reference.py index 4ff91d8e..8f333156 100644 --- a/vulncheck_sdk/aio/models/advisory_go_vuln_reference.py +++ b/vulncheck_sdk/aio/models/advisory_go_vuln_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnReference(BaseModel): """ - AdvisoryGoVulnReference + advisory.GoVulnReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_grafana.py b/vulncheck_sdk/aio/models/advisory_grafana.py index 525e6220..fe041d5a 100644 --- a/vulncheck_sdk/aio/models/advisory_grafana.py +++ b/vulncheck_sdk/aio/models/advisory_grafana.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGrafana(BaseModel): """ - AdvisoryGrafana + advisory.Grafana """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_grey_noise_detection.py b/vulncheck_sdk/aio/models/advisory_grey_noise_detection.py index 1046fa13..be1995e6 100644 --- a/vulncheck_sdk/aio/models/advisory_grey_noise_detection.py +++ b/vulncheck_sdk/aio/models/advisory_grey_noise_detection.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGreyNoiseDetection(BaseModel): """ - AdvisoryGreyNoiseDetection + advisory.GreyNoiseDetection """ # noqa: E501 category: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_grey_noise_tags.py b/vulncheck_sdk/aio/models/advisory_grey_noise_tags.py index 9014ce03..0defaf17 100644 --- a/vulncheck_sdk/aio/models/advisory_grey_noise_tags.py +++ b/vulncheck_sdk/aio/models/advisory_grey_noise_tags.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGreyNoiseTags(BaseModel): """ - AdvisoryGreyNoiseTags + advisory.GreyNoiseTags """ # noqa: E501 category: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hacktivity.py b/vulncheck_sdk/aio/models/advisory_hacktivity.py index 2c3422d4..5458fc46 100644 --- a/vulncheck_sdk/aio/models/advisory_hacktivity.py +++ b/vulncheck_sdk/aio/models/advisory_hacktivity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHacktivity(BaseModel): """ - AdvisoryHacktivity + advisory.Hacktivity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hardware_update.py b/vulncheck_sdk/aio/models/advisory_hardware_update.py index 139bb918..aad397aa 100644 --- a/vulncheck_sdk/aio/models/advisory_hardware_update.py +++ b/vulncheck_sdk/aio/models/advisory_hardware_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHardwareUpdate(BaseModel): """ - AdvisoryHardwareUpdate + advisory.HardwareUpdate """ # noqa: E501 affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_harmony_os.py b/vulncheck_sdk/aio/models/advisory_harmony_os.py index 83390d53..f6ac834d 100644 --- a/vulncheck_sdk/aio/models/advisory_harmony_os.py +++ b/vulncheck_sdk/aio/models/advisory_harmony_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHarmonyOS(BaseModel): """ - AdvisoryHarmonyOS + advisory.HarmonyOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hashi_corp.py b/vulncheck_sdk/aio/models/advisory_hashi_corp.py index 2247ab13..38109e99 100644 --- a/vulncheck_sdk/aio/models/advisory_hashi_corp.py +++ b/vulncheck_sdk/aio/models/advisory_hashi_corp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHashiCorp(BaseModel): """ - AdvisoryHashiCorp + advisory.HashiCorp """ # noqa: E501 affected_products: Optional[StrictStr] = None background: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_haskell_affected.py b/vulncheck_sdk/aio/models/advisory_haskell_affected.py index 57fb15c3..6e071768 100644 --- a/vulncheck_sdk/aio/models/advisory_haskell_affected.py +++ b/vulncheck_sdk/aio/models/advisory_haskell_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryHaskellAffected(BaseModel): """ - AdvisoryHaskellAffected + advisory.HaskellAffected """ # noqa: E501 affected_constraint: Optional[StrictStr] = None affected_versions: Optional[List[AdvisoryHaskellVersion]] = None diff --git a/vulncheck_sdk/aio/models/advisory_haskell_sadb_advisory.py b/vulncheck_sdk/aio/models/advisory_haskell_sadb_advisory.py index 58b902f2..aff3687a 100644 --- a/vulncheck_sdk/aio/models/advisory_haskell_sadb_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_haskell_sadb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryHaskellSADBAdvisory(BaseModel): """ - AdvisoryHaskellSADBAdvisory + advisory.HaskellSADBAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_packages: Optional[List[AdvisoryHaskellAffected]] = None diff --git a/vulncheck_sdk/aio/models/advisory_haskell_version.py b/vulncheck_sdk/aio/models/advisory_haskell_version.py index 8fc12bc5..bd9ea93b 100644 --- a/vulncheck_sdk/aio/models/advisory_haskell_version.py +++ b/vulncheck_sdk/aio/models/advisory_haskell_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHaskellVersion(BaseModel): """ - AdvisoryHaskellVersion + advisory.HaskellVersion """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hcl.py b/vulncheck_sdk/aio/models/advisory_hcl.py index 0ef412c6..d90c838d 100644 --- a/vulncheck_sdk/aio/models/advisory_hcl.py +++ b/vulncheck_sdk/aio/models/advisory_hcl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHCL(BaseModel): """ - AdvisoryHCL + advisory.HCL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hik_vision.py b/vulncheck_sdk/aio/models/advisory_hik_vision.py index a6a2a2e2..c67d99f6 100644 --- a/vulncheck_sdk/aio/models/advisory_hik_vision.py +++ b/vulncheck_sdk/aio/models/advisory_hik_vision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHIKVision(BaseModel): """ - AdvisoryHIKVision + advisory.HIKVision """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_hillrom_advisory.py b/vulncheck_sdk/aio/models/advisory_hillrom_advisory.py index 7137d068..1c9b5f40 100644 --- a/vulncheck_sdk/aio/models/advisory_hillrom_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_hillrom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHillromAdvisory(BaseModel): """ - AdvisoryHillromAdvisory + advisory.HillromAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_hitachi.py b/vulncheck_sdk/aio/models/advisory_hitachi.py index 9b4202b1..35b43d00 100644 --- a/vulncheck_sdk/aio/models/advisory_hitachi.py +++ b/vulncheck_sdk/aio/models/advisory_hitachi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHitachi(BaseModel): """ - AdvisoryHitachi + advisory.Hitachi """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_hitachi_energy.py b/vulncheck_sdk/aio/models/advisory_hitachi_energy.py index d59c6fa0..4865a8e6 100644 --- a/vulncheck_sdk/aio/models/advisory_hitachi_energy.py +++ b/vulncheck_sdk/aio/models/advisory_hitachi_energy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHitachiEnergy(BaseModel): """ - AdvisoryHitachiEnergy + advisory.HitachiEnergy """ # noqa: E501 advisory_id: Optional[StrictStr] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hk_cert.py b/vulncheck_sdk/aio/models/advisory_hk_cert.py index 67a86de0..5d428435 100644 --- a/vulncheck_sdk/aio/models/advisory_hk_cert.py +++ b/vulncheck_sdk/aio/models/advisory_hk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHKCert(BaseModel): """ - AdvisoryHKCert + advisory.HKCert """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_hms.py b/vulncheck_sdk/aio/models/advisory_hms.py index 099d6659..2ab8b030 100644 --- a/vulncheck_sdk/aio/models/advisory_hms.py +++ b/vulncheck_sdk/aio/models/advisory_hms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHMS(BaseModel): """ - AdvisoryHMS + advisory.HMS """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_honeywell.py b/vulncheck_sdk/aio/models/advisory_honeywell.py index 9f56e04e..bfa9528c 100644 --- a/vulncheck_sdk/aio/models/advisory_honeywell.py +++ b/vulncheck_sdk/aio/models/advisory_honeywell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHoneywell(BaseModel): """ - AdvisoryHoneywell + advisory.Honeywell """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hp.py b/vulncheck_sdk/aio/models/advisory_hp.py index 51857400..41cc8cad 100644 --- a/vulncheck_sdk/aio/models/advisory_hp.py +++ b/vulncheck_sdk/aio/models/advisory_hp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHP(BaseModel): """ - AdvisoryHP + advisory.HP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_hpe.py b/vulncheck_sdk/aio/models/advisory_hpe.py index 97a307a2..d9b1e1d0 100644 --- a/vulncheck_sdk/aio/models/advisory_hpe.py +++ b/vulncheck_sdk/aio/models/advisory_hpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHPE(BaseModel): """ - AdvisoryHPE + advisory.HPE """ # noqa: E501 csaf: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_huawei.py b/vulncheck_sdk/aio/models/advisory_huawei.py index b78655bb..3d3a3554 100644 --- a/vulncheck_sdk/aio/models/advisory_huawei.py +++ b/vulncheck_sdk/aio/models/advisory_huawei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuawei(BaseModel): """ - AdvisoryHuawei + advisory.Huawei """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_huawei_euler_os.py b/vulncheck_sdk/aio/models/advisory_huawei_euler_os.py index 91f2a608..37ecc211 100644 --- a/vulncheck_sdk/aio/models/advisory_huawei_euler_os.py +++ b/vulncheck_sdk/aio/models/advisory_huawei_euler_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuaweiEulerOS(BaseModel): """ - AdvisoryHuaweiEulerOS + advisory.HuaweiEulerOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_huawei_ips.py b/vulncheck_sdk/aio/models/advisory_huawei_ips.py index 003c50fe..b727eb96 100644 --- a/vulncheck_sdk/aio/models/advisory_huawei_ips.py +++ b/vulncheck_sdk/aio/models/advisory_huawei_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuaweiIPS(BaseModel): """ - AdvisoryHuaweiIPS + advisory.HuaweiIPS """ # noqa: E501 cnnvd: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_i_val.py b/vulncheck_sdk/aio/models/advisory_i_val.py index 48694de2..659ba04c 100644 --- a/vulncheck_sdk/aio/models/advisory_i_val.py +++ b/vulncheck_sdk/aio/models/advisory_i_val.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIVal(BaseModel): """ - AdvisoryIVal + advisory.IVal """ # noqa: E501 value: Optional[StrictStr] = Field(default=None, alias="Value") __properties: ClassVar[List[str]] = ["Value"] diff --git a/vulncheck_sdk/aio/models/advisory_iava.py b/vulncheck_sdk/aio/models/advisory_iava.py index f3fff991..c22eb817 100644 --- a/vulncheck_sdk/aio/models/advisory_iava.py +++ b/vulncheck_sdk/aio/models/advisory_iava.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIAVA(BaseModel): """ - AdvisoryIAVA + advisory.IAVA """ # noqa: E501 iava: Optional[StrictStr] = Field(default=None, alias="IAVA") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ibm.py b/vulncheck_sdk/aio/models/advisory_ibm.py index e460a43f..5ded7f4c 100644 --- a/vulncheck_sdk/aio/models/advisory_ibm.py +++ b/vulncheck_sdk/aio/models/advisory_ibm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIBM(BaseModel): """ - AdvisoryIBM + advisory.IBM """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_idemia.py b/vulncheck_sdk/aio/models/advisory_idemia.py index 09102042..944a229d 100644 --- a/vulncheck_sdk/aio/models/advisory_idemia.py +++ b/vulncheck_sdk/aio/models/advisory_idemia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIdemia(BaseModel): """ - AdvisoryIdemia + advisory.Idemia """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_igel.py b/vulncheck_sdk/aio/models/advisory_igel.py index 9d06653e..1d34ea2e 100644 --- a/vulncheck_sdk/aio/models/advisory_igel.py +++ b/vulncheck_sdk/aio/models/advisory_igel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIgel(BaseModel): """ - AdvisoryIgel + advisory.Igel """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_impact.py b/vulncheck_sdk/aio/models/advisory_impact.py index 24f3cd37..dd713884 100644 --- a/vulncheck_sdk/aio/models/advisory_impact.py +++ b/vulncheck_sdk/aio/models/advisory_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryImpact(BaseModel): """ - AdvisoryImpact + advisory.Impact """ # noqa: E501 capec_id: Optional[StrictStr] = Field(default=None, alias="capecId") descriptions: Optional[List[AdvisoryMDescriptions]] = None diff --git a/vulncheck_sdk/aio/models/advisory_incibe_advisory.py b/vulncheck_sdk/aio/models/advisory_incibe_advisory.py index efb724ab..8f9fcd4d 100644 --- a/vulncheck_sdk/aio/models/advisory_incibe_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_incibe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIncibeAdvisory(BaseModel): """ - AdvisoryIncibeAdvisory + advisory.IncibeAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_intel.py b/vulncheck_sdk/aio/models/advisory_intel.py index 7612d313..84bf7d87 100644 --- a/vulncheck_sdk/aio/models/advisory_intel.py +++ b/vulncheck_sdk/aio/models/advisory_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIntel(BaseModel): """ - AdvisoryIntel + advisory.Intel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ip_intel_record.py b/vulncheck_sdk/aio/models/advisory_ip_intel_record.py index 19b71aff..21f7464e 100644 --- a/vulncheck_sdk/aio/models/advisory_ip_intel_record.py +++ b/vulncheck_sdk/aio/models/advisory_ip_intel_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryIpIntelRecord(BaseModel): """ - AdvisoryIpIntelRecord + advisory.IpIntelRecord """ # noqa: E501 asn: Optional[StrictStr] = None city: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_israeli_alert.py b/vulncheck_sdk/aio/models/advisory_israeli_alert.py index dd71b3e6..678772be 100644 --- a/vulncheck_sdk/aio/models/advisory_israeli_alert.py +++ b/vulncheck_sdk/aio/models/advisory_israeli_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIsraeliAlert(BaseModel): """ - AdvisoryIsraeliAlert + advisory.IsraeliAlert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_israeli_vulnerability.py b/vulncheck_sdk/aio/models/advisory_israeli_vulnerability.py index 43dd71e2..473101da 100644 --- a/vulncheck_sdk/aio/models/advisory_israeli_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_israeli_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIsraeliVulnerability(BaseModel): """ - AdvisoryIsraeliVulnerability + advisory.IsraeliVulnerability """ # noqa: E501 ilvnid: Optional[StrictStr] = Field(default=None, alias="ILVNId") affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_istio.py b/vulncheck_sdk/aio/models/advisory_istio.py index af1cf211..ce351762 100644 --- a/vulncheck_sdk/aio/models/advisory_istio.py +++ b/vulncheck_sdk/aio/models/advisory_istio.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIstio(BaseModel): """ - AdvisoryIstio + advisory.Istio """ # noqa: E501 affected_version: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_itw.py b/vulncheck_sdk/aio/models/advisory_itw.py index 63760634..cddb61a5 100644 --- a/vulncheck_sdk/aio/models/advisory_itw.py +++ b/vulncheck_sdk/aio/models/advisory_itw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryITW(BaseModel): """ - AdvisoryITW + advisory.ITW """ # noqa: E501 cve: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_itw_exploit.py b/vulncheck_sdk/aio/models/advisory_itw_exploit.py index 31265cd6..dfe0d6d6 100644 --- a/vulncheck_sdk/aio/models/advisory_itw_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_itw_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryITWExploit(BaseModel): """ - AdvisoryITWExploit + advisory.ITWExploit """ # noqa: E501 advisory: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ivanti.py b/vulncheck_sdk/aio/models/advisory_ivanti.py index 1771642c..2bc05076 100644 --- a/vulncheck_sdk/aio/models/advisory_ivanti.py +++ b/vulncheck_sdk/aio/models/advisory_ivanti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIvanti(BaseModel): """ - AdvisoryIvanti + advisory.Ivanti """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ivanti_rss.py b/vulncheck_sdk/aio/models/advisory_ivanti_rss.py index 42530021..6dd7184c 100644 --- a/vulncheck_sdk/aio/models/advisory_ivanti_rss.py +++ b/vulncheck_sdk/aio/models/advisory_ivanti_rss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIvantiRSS(BaseModel): """ - AdvisoryIvantiRSS + advisory.IvantiRSS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_j_frog.py b/vulncheck_sdk/aio/models/advisory_j_frog.py index 8e346742..40393862 100644 --- a/vulncheck_sdk/aio/models/advisory_j_frog.py +++ b/vulncheck_sdk/aio/models/advisory_j_frog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryJFrog(BaseModel): """ - AdvisoryJFrog + advisory.JFrog """ # noqa: E501 cpes: Optional[List[AdvisoryNVD20CVECPEMatch]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_jenkins.py b/vulncheck_sdk/aio/models/advisory_jenkins.py index bad0969f..253f9983 100644 --- a/vulncheck_sdk/aio/models/advisory_jenkins.py +++ b/vulncheck_sdk/aio/models/advisory_jenkins.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJenkins(BaseModel): """ - AdvisoryJenkins + advisory.Jenkins """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_jet_brains.py b/vulncheck_sdk/aio/models/advisory_jet_brains.py index 672ab6bb..9466b28f 100644 --- a/vulncheck_sdk/aio/models/advisory_jet_brains.py +++ b/vulncheck_sdk/aio/models/advisory_jet_brains.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJetBrains(BaseModel): """ - AdvisoryJetBrains + advisory.JetBrains """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_jnj_advisory.py b/vulncheck_sdk/aio/models/advisory_jnj_advisory.py index 49e78200..9c9ecaee 100644 --- a/vulncheck_sdk/aio/models/advisory_jnj_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_jnj_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJNJAdvisory(BaseModel): """ - AdvisoryJNJAdvisory + advisory.JNJAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_johnson_controls.py b/vulncheck_sdk/aio/models/advisory_johnson_controls.py index b432bfbd..78e8dcb3 100644 --- a/vulncheck_sdk/aio/models/advisory_johnson_controls.py +++ b/vulncheck_sdk/aio/models/advisory_johnson_controls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJohnsonControls(BaseModel): """ - AdvisoryJohnsonControls + advisory.JohnsonControls """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_juniper.py b/vulncheck_sdk/aio/models/advisory_juniper.py index 5709f5c1..fd68ead0 100644 --- a/vulncheck_sdk/aio/models/advisory_juniper.py +++ b/vulncheck_sdk/aio/models/advisory_juniper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJuniper(BaseModel): """ - AdvisoryJuniper + advisory.Juniper """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_jvn.py b/vulncheck_sdk/aio/models/advisory_jvn.py index 6780e152..818f790c 100644 --- a/vulncheck_sdk/aio/models/advisory_jvn.py +++ b/vulncheck_sdk/aio/models/advisory_jvn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVN(BaseModel): """ - AdvisoryJVN + advisory.JVN """ # noqa: E501 affected_en: Optional[StrictStr] = None affected_ja: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_jvn_advisory_item.py b/vulncheck_sdk/aio/models/advisory_jvn_advisory_item.py index 8cf0b753..9c01865d 100644 --- a/vulncheck_sdk/aio/models/advisory_jvn_advisory_item.py +++ b/vulncheck_sdk/aio/models/advisory_jvn_advisory_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryJVNAdvisoryItem(BaseModel): """ - AdvisoryJVNAdvisoryItem + advisory.JVNAdvisoryItem """ # noqa: E501 cpe: Optional[List[AdvisoryJVNCPE]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_jvn_reference.py b/vulncheck_sdk/aio/models/advisory_jvn_reference.py index e9c3929b..6ef362cb 100644 --- a/vulncheck_sdk/aio/models/advisory_jvn_reference.py +++ b/vulncheck_sdk/aio/models/advisory_jvn_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVNReference(BaseModel): """ - AdvisoryJVNReference + advisory.JVNReference """ # noqa: E501 id: Optional[StrictStr] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_jvncpe.py b/vulncheck_sdk/aio/models/advisory_jvncpe.py index 39705f7f..2bcf8b5f 100644 --- a/vulncheck_sdk/aio/models/advisory_jvncpe.py +++ b/vulncheck_sdk/aio/models/advisory_jvncpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVNCPE(BaseModel): """ - AdvisoryJVNCPE + advisory.JVNCPE """ # noqa: E501 cpe: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_k8_s.py b/vulncheck_sdk/aio/models/advisory_k8_s.py index d4ee7573..42a86ca9 100644 --- a/vulncheck_sdk/aio/models/advisory_k8_s.py +++ b/vulncheck_sdk/aio/models/advisory_k8_s.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryK8S(BaseModel): """ - AdvisoryK8S + advisory.K8S """ # noqa: E501 content: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_kaspersky_icscert_advisory.py b/vulncheck_sdk/aio/models/advisory_kaspersky_icscert_advisory.py index e58e1f09..78e09eda 100644 --- a/vulncheck_sdk/aio/models/advisory_kaspersky_icscert_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_kaspersky_icscert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKasperskyICSCERTAdvisory(BaseModel): """ - AdvisoryKasperskyICSCERTAdvisory + advisory.KasperskyICSCERTAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_kb.py b/vulncheck_sdk/aio/models/advisory_kb.py index 73ed6f3c..cc790f3f 100644 --- a/vulncheck_sdk/aio/models/advisory_kb.py +++ b/vulncheck_sdk/aio/models/advisory_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKb(BaseModel): """ - AdvisoryKb + advisory.Kb """ # noqa: E501 kb_url: Optional[StrictStr] = None ms_date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_kb_threat_description.py b/vulncheck_sdk/aio/models/advisory_kb_threat_description.py index cb723947..5ec393c0 100644 --- a/vulncheck_sdk/aio/models/advisory_kb_threat_description.py +++ b/vulncheck_sdk/aio/models/advisory_kb_threat_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKbThreatDescription(BaseModel): """ - AdvisoryKbThreatDescription + advisory.KbThreatDescription """ # noqa: E501 dos: Optional[StrictStr] = None exploited: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_kev_catalog_vulnerability.py b/vulncheck_sdk/aio/models/advisory_kev_catalog_vulnerability.py index 5bddd31e..7304d1cc 100644 --- a/vulncheck_sdk/aio/models/advisory_kev_catalog_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_kev_catalog_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKEVCatalogVulnerability(BaseModel): """ - AdvisoryKEVCatalogVulnerability + advisory.KEVCatalogVulnerability """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwes: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_kore_logic.py b/vulncheck_sdk/aio/models/advisory_kore_logic.py index 14b7b8fa..4890f72d 100644 --- a/vulncheck_sdk/aio/models/advisory_kore_logic.py +++ b/vulncheck_sdk/aio/models/advisory_kore_logic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKoreLogic(BaseModel): """ - AdvisoryKoreLogic + advisory.KoreLogic """ # noqa: E501 affected_product: Optional[StrictStr] = None affected_vendor: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_kr_cert_advisory.py b/vulncheck_sdk/aio/models/advisory_kr_cert_advisory.py index 9dd89932..39103df1 100644 --- a/vulncheck_sdk/aio/models/advisory_kr_cert_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_kr_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKRCertAdvisory(BaseModel): """ - AdvisoryKRCertAdvisory + advisory.KRCertAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_kunbus.py b/vulncheck_sdk/aio/models/advisory_kunbus.py index 5614b0d2..e844fedf 100644 --- a/vulncheck_sdk/aio/models/advisory_kunbus.py +++ b/vulncheck_sdk/aio/models/advisory_kunbus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKunbus(BaseModel): """ - AdvisoryKunbus + advisory.Kunbus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_lantronix.py b/vulncheck_sdk/aio/models/advisory_lantronix.py index 38b26395..13c103df 100644 --- a/vulncheck_sdk/aio/models/advisory_lantronix.py +++ b/vulncheck_sdk/aio/models/advisory_lantronix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLantronix(BaseModel): """ - AdvisoryLantronix + advisory.Lantronix """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_lenovo.py b/vulncheck_sdk/aio/models/advisory_lenovo.py index ed1a65de..8d89c8f3 100644 --- a/vulncheck_sdk/aio/models/advisory_lenovo.py +++ b/vulncheck_sdk/aio/models/advisory_lenovo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLenovo(BaseModel): """ - AdvisoryLenovo + advisory.Lenovo """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_lexmark_advisory.py b/vulncheck_sdk/aio/models/advisory_lexmark_advisory.py index 8308eec3..5aff9496 100644 --- a/vulncheck_sdk/aio/models/advisory_lexmark_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_lexmark_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryLexmarkAdvisory(BaseModel): """ - AdvisoryLexmarkAdvisory + advisory.LexmarkAdvisory """ # noqa: E501 affected_products: Optional[List[AdvisoryAffectedProduct]] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_lg.py b/vulncheck_sdk/aio/models/advisory_lg.py index 053d568f..5c9df1fa 100644 --- a/vulncheck_sdk/aio/models/advisory_lg.py +++ b/vulncheck_sdk/aio/models/advisory_lg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLG(BaseModel): """ - AdvisoryLG + advisory.LG """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_libre_office.py b/vulncheck_sdk/aio/models/advisory_libre_office.py index 6c556dd8..cbf41670 100644 --- a/vulncheck_sdk/aio/models/advisory_libre_office.py +++ b/vulncheck_sdk/aio/models/advisory_libre_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLibreOffice(BaseModel): """ - AdvisoryLibreOffice + advisory.LibreOffice """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_linux.py b/vulncheck_sdk/aio/models/advisory_linux.py index a224ff7e..c53b5075 100644 --- a/vulncheck_sdk/aio/models/advisory_linux.py +++ b/vulncheck_sdk/aio/models/advisory_linux.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLinux(BaseModel): """ - AdvisoryLinux + advisory.Linux """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_log_source.py b/vulncheck_sdk/aio/models/advisory_log_source.py index 5b6db587..1b0fd43b 100644 --- a/vulncheck_sdk/aio/models/advisory_log_source.py +++ b/vulncheck_sdk/aio/models/advisory_log_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLogSource(BaseModel): """ - AdvisoryLogSource + advisory.LogSource """ # noqa: E501 category: Optional[StrictStr] = None definition: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_lol_advs.py b/vulncheck_sdk/aio/models/advisory_lol_advs.py index a32b6eb9..28fb0513 100644 --- a/vulncheck_sdk/aio/models/advisory_lol_advs.py +++ b/vulncheck_sdk/aio/models/advisory_lol_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,13 +25,13 @@ class AdvisoryLolAdvs(BaseModel): """ - AdvisoryLolAdvs + advisory.LolAdvs """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None - lol_json: Optional[Dict[str, Dict[str, Any]]] = None + lol_json: Optional[Dict[str, Any]] = None mitre_id: Optional[StrictStr] = None references: Optional[List[StrictStr]] = None updated_at: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_affected.py b/vulncheck_sdk/aio/models/advisory_m_affected.py index ee939772..7ba13441 100644 --- a/vulncheck_sdk/aio/models/advisory_m_affected.py +++ b/vulncheck_sdk/aio/models/advisory_m_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMAffected(BaseModel): """ - AdvisoryMAffected + advisory.MAffected """ # noqa: E501 collection_url: Optional[StrictStr] = Field(default=None, alias="collectionURL") cpes: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_branch.py b/vulncheck_sdk/aio/models/advisory_m_branch.py index f586db65..51a2b68c 100644 --- a/vulncheck_sdk/aio/models/advisory_m_branch.py +++ b/vulncheck_sdk/aio/models/advisory_m_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMBranch(BaseModel): """ - AdvisoryMBranch + advisory.MBranch """ # noqa: E501 branch: Optional[List[AdvisoryMBranch]] = Field(default=None, alias="Branch") full_product_name: Optional[List[AdvisoryMFullProductName]] = Field(default=None, alias="FullProductName") diff --git a/vulncheck_sdk/aio/models/advisory_m_cna.py b/vulncheck_sdk/aio/models/advisory_m_cna.py index d7269b6b..f8b56fdd 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cna.py +++ b/vulncheck_sdk/aio/models/advisory_m_cna.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -35,7 +35,7 @@ class AdvisoryMCna(BaseModel): """ - AdvisoryMCna + advisory.MCna """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None cpe_applicability: Optional[List[AdvisoryMCPEApplicability]] = Field(default=None, alias="cpeApplicability") diff --git a/vulncheck_sdk/aio/models/advisory_m_containers.py b/vulncheck_sdk/aio/models/advisory_m_containers.py index dadb57f0..b4055aeb 100644 --- a/vulncheck_sdk/aio/models/advisory_m_containers.py +++ b/vulncheck_sdk/aio/models/advisory_m_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMContainers(BaseModel): """ - AdvisoryMContainers + advisory.MContainers """ # noqa: E501 adp: Optional[List[AdvisoryADPContainer]] = None cna: Optional[AdvisoryMCna] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_cve_metadata.py b/vulncheck_sdk/aio/models/advisory_m_cve_metadata.py index 6fff1111..4d5b902e 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cve_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_m_cve_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCveMetadata(BaseModel): """ - AdvisoryMCveMetadata + advisory.MCveMetadata """ # noqa: E501 assigner_org_id: Optional[StrictStr] = Field(default=None, alias="assignerOrgId") assigner_short_name: Optional[StrictStr] = Field(default=None, alias="assignerShortName") diff --git a/vulncheck_sdk/aio/models/advisory_m_cvss_v20.py b/vulncheck_sdk/aio/models/advisory_m_cvss_v20.py index b900566f..ecd982ab 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cvss_v20.py +++ b/vulncheck_sdk/aio/models/advisory_m_cvss_v20.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV20(BaseModel): """ - AdvisoryMCvssV20 + advisory.MCvssV20 """ # noqa: E501 access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") diff --git a/vulncheck_sdk/aio/models/advisory_m_cvss_v30.py b/vulncheck_sdk/aio/models/advisory_m_cvss_v30.py index e3b3a204..10654828 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cvss_v30.py +++ b/vulncheck_sdk/aio/models/advisory_m_cvss_v30.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV30(BaseModel): """ - AdvisoryMCvssV30 + advisory.MCvssV30 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/aio/models/advisory_m_cvss_v31.py b/vulncheck_sdk/aio/models/advisory_m_cvss_v31.py index 6dfa1c7a..c21df0ca 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cvss_v31.py +++ b/vulncheck_sdk/aio/models/advisory_m_cvss_v31.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV31(BaseModel): """ - AdvisoryMCvssV31 + advisory.MCvssV31 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/aio/models/advisory_m_cvss_v40.py b/vulncheck_sdk/aio/models/advisory_m_cvss_v40.py index 467409f2..35b7cffe 100644 --- a/vulncheck_sdk/aio/models/advisory_m_cvss_v40.py +++ b/vulncheck_sdk/aio/models/advisory_m_cvss_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV40(BaseModel): """ - AdvisoryMCvssV40 + advisory.MCvssV40 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_requirements: Optional[StrictStr] = Field(default=None, alias="attackRequirements") diff --git a/vulncheck_sdk/aio/models/advisory_m_descriptions.py b/vulncheck_sdk/aio/models/advisory_m_descriptions.py index 6594d4ff..56367415 100644 --- a/vulncheck_sdk/aio/models/advisory_m_descriptions.py +++ b/vulncheck_sdk/aio/models/advisory_m_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMDescriptions(BaseModel): """ - AdvisoryMDescriptions + advisory.MDescriptions """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_document_tracking.py b/vulncheck_sdk/aio/models/advisory_m_document_tracking.py index 9bbbe4b8..6741ebe5 100644 --- a/vulncheck_sdk/aio/models/advisory_m_document_tracking.py +++ b/vulncheck_sdk/aio/models/advisory_m_document_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMDocumentTracking(BaseModel): """ - AdvisoryMDocumentTracking + advisory.MDocumentTracking """ # noqa: E501 current_release_date: Optional[StrictStr] = Field(default=None, alias="CurrentReleaseDate") initial_release_date: Optional[StrictStr] = Field(default=None, alias="InitialReleaseDate") diff --git a/vulncheck_sdk/aio/models/advisory_m_files.py b/vulncheck_sdk/aio/models/advisory_m_files.py index 21bf7f5d..a71b144b 100644 --- a/vulncheck_sdk/aio/models/advisory_m_files.py +++ b/vulncheck_sdk/aio/models/advisory_m_files.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMFiles(BaseModel): """ - AdvisoryMFiles + advisory.MFiles """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_full_product_name.py b/vulncheck_sdk/aio/models/advisory_m_full_product_name.py index 99ecf91d..53d7ae14 100644 --- a/vulncheck_sdk/aio/models/advisory_m_full_product_name.py +++ b/vulncheck_sdk/aio/models/advisory_m_full_product_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMFullProductName(BaseModel): """ - AdvisoryMFullProductName + advisory.MFullProductName """ # noqa: E501 cpe: Optional[StrictStr] = Field(default=None, alias="CPE") product_id: Optional[StrictStr] = Field(default=None, alias="ProductID") diff --git a/vulncheck_sdk/aio/models/advisory_m_identification.py b/vulncheck_sdk/aio/models/advisory_m_identification.py index 5e64e410..793a82e9 100644 --- a/vulncheck_sdk/aio/models/advisory_m_identification.py +++ b/vulncheck_sdk/aio/models/advisory_m_identification.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMIdentification(BaseModel): """ - AdvisoryMIdentification + advisory.MIdentification """ # noqa: E501 alias: Optional[AdvisoryIVal] = None id: Optional[AdvisoryIVal] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_item.py b/vulncheck_sdk/aio/models/advisory_m_item.py index 8029888f..d02d098b 100644 --- a/vulncheck_sdk/aio/models/advisory_m_item.py +++ b/vulncheck_sdk/aio/models/advisory_m_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMItem(BaseModel): """ - AdvisoryMItem + advisory.MItem """ # noqa: E501 items: Optional[List[AdvisoryMItem]] = Field(default=None, alias="Items") name: Optional[StrictStr] = Field(default=None, alias="Name") diff --git a/vulncheck_sdk/aio/models/advisory_m_nodes.py b/vulncheck_sdk/aio/models/advisory_m_nodes.py index 64bc2ba0..fcff7a0a 100644 --- a/vulncheck_sdk/aio/models/advisory_m_nodes.py +++ b/vulncheck_sdk/aio/models/advisory_m_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMNodes(BaseModel): """ - AdvisoryMNodes + advisory.MNodes """ # noqa: E501 cpe_match: Optional[List[AdvisoryMCPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_problem_types.py b/vulncheck_sdk/aio/models/advisory_m_problem_types.py index 71071b7b..a0a6342c 100644 --- a/vulncheck_sdk/aio/models/advisory_m_problem_types.py +++ b/vulncheck_sdk/aio/models/advisory_m_problem_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMProblemTypes(BaseModel): """ - AdvisoryMProblemTypes + advisory.MProblemTypes """ # noqa: E501 descriptions: Optional[List[AdvisoryPTMDescriptions]] = None __properties: ClassVar[List[str]] = ["descriptions"] diff --git a/vulncheck_sdk/aio/models/advisory_m_product_status.py b/vulncheck_sdk/aio/models/advisory_m_product_status.py index 2941dc98..d0a328cb 100644 --- a/vulncheck_sdk/aio/models/advisory_m_product_status.py +++ b/vulncheck_sdk/aio/models/advisory_m_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMProductStatus(BaseModel): """ - AdvisoryMProductStatus + advisory.MProductStatus """ # noqa: E501 product_id: Optional[List[StrictStr]] = Field(default=None, alias="ProductID") type: Optional[StrictInt] = Field(default=None, description="diff") diff --git a/vulncheck_sdk/aio/models/advisory_m_product_tree.py b/vulncheck_sdk/aio/models/advisory_m_product_tree.py index 087f277c..57a52ace 100644 --- a/vulncheck_sdk/aio/models/advisory_m_product_tree.py +++ b/vulncheck_sdk/aio/models/advisory_m_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMProductTree(BaseModel): """ - AdvisoryMProductTree + advisory.MProductTree """ # noqa: E501 branch: Optional[List[AdvisoryMBranch]] = Field(default=None, alias="Branch") full_product_name: Optional[List[AdvisoryMFullProductName]] = Field(default=None, alias="FullProductName") diff --git a/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py b/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py index 4db58079..33947bd5 100644 --- a/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMProviderMetadata(BaseModel): """ - AdvisoryMProviderMetadata + OK """ # noqa: E501 date_updated: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time", alias="dateUpdated") org_id: Optional[StrictStr] = Field(default=None, alias="orgId") diff --git a/vulncheck_sdk/aio/models/advisory_m_reference.py b/vulncheck_sdk/aio/models/advisory_m_reference.py index edff1bae..055d168e 100644 --- a/vulncheck_sdk/aio/models/advisory_m_reference.py +++ b/vulncheck_sdk/aio/models/advisory_m_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMReference(BaseModel): """ - AdvisoryMReference + advisory.MReference """ # noqa: E501 name: Optional[StrictStr] = None tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_remediation.py b/vulncheck_sdk/aio/models/advisory_m_remediation.py index 0a60b7a3..205cff02 100644 --- a/vulncheck_sdk/aio/models/advisory_m_remediation.py +++ b/vulncheck_sdk/aio/models/advisory_m_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,10 +27,10 @@ class AdvisoryMRemediation(BaseModel): """ - AdvisoryMRemediation + advisory.MRemediation """ # noqa: E501 affected_files: Optional[List[AdvisoryAffectedFile]] = Field(default=None, alias="AffectedFiles") - var_date: Optional[StrictStr] = Field(default=None, alias="Date") + date: Optional[StrictStr] = Field(default=None, alias="Date") date_specified: Optional[StrictBool] = Field(default=None, alias="DateSpecified") description: Optional[AdvisoryIVal] = Field(default=None, alias="Description") fixed_build: Optional[StrictStr] = Field(default=None, alias="FixedBuild") diff --git a/vulncheck_sdk/aio/models/advisory_m_version.py b/vulncheck_sdk/aio/models/advisory_m_version.py index e85b3099..b4fcc5f1 100644 --- a/vulncheck_sdk/aio/models/advisory_m_version.py +++ b/vulncheck_sdk/aio/models/advisory_m_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMVersion(BaseModel): """ - AdvisoryMVersion + advisory.MVersion """ # noqa: E501 less_than: Optional[StrictStr] = Field(default=None, alias="lessThan") less_than_or_equal: Optional[StrictStr] = Field(default=None, alias="lessThanOrEqual") diff --git a/vulncheck_sdk/aio/models/advisory_m_vulnerability.py b/vulncheck_sdk/aio/models/advisory_m_vulnerability.py index 81ecfd78..2470509b 100644 --- a/vulncheck_sdk/aio/models/advisory_m_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_m_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class AdvisoryMVulnerability(BaseModel): """ - AdvisoryMVulnerability + advisory.MVulnerability """ # noqa: E501 product_statuses: Optional[List[AdvisoryMProductStatus]] = Field(default=None, alias="ProductStatuses") remediations: Optional[List[AdvisoryMRemediation]] = Field(default=None, alias="Remediations") diff --git a/vulncheck_sdk/aio/models/advisory_ma_cert.py b/vulncheck_sdk/aio/models/advisory_ma_cert.py index 727c76be..1aa2e8aa 100644 --- a/vulncheck_sdk/aio/models/advisory_ma_cert.py +++ b/vulncheck_sdk/aio/models/advisory_ma_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMACert(BaseModel): """ - AdvisoryMACert + advisory.MACert """ # noqa: E501 affected_systems_fr: Optional[StrictStr] = None assessment_fr: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_malicious_package.py b/vulncheck_sdk/aio/models/advisory_malicious_package.py index 2ae08f5e..56a49a9d 100644 --- a/vulncheck_sdk/aio/models/advisory_malicious_package.py +++ b/vulncheck_sdk/aio/models/advisory_malicious_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMaliciousPackage(BaseModel): """ - AdvisoryMaliciousPackage + advisory.MaliciousPackage """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_manage_engine.py b/vulncheck_sdk/aio/models/advisory_manage_engine.py index 830bd3f6..5edc8954 100644 --- a/vulncheck_sdk/aio/models/advisory_manage_engine.py +++ b/vulncheck_sdk/aio/models/advisory_manage_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryManageEngine(BaseModel): """ - AdvisoryManageEngine + advisory.ManageEngine """ # noqa: E501 advisory: Optional[StrictStr] = Field(default=None, alias="ADVISORY") added_time: Optional[StrictStr] = Field(default=None, alias="Added_Time") diff --git a/vulncheck_sdk/aio/models/advisory_manage_engine_advisory.py b/vulncheck_sdk/aio/models/advisory_manage_engine_advisory.py index 59cd8af0..8b481076 100644 --- a/vulncheck_sdk/aio/models/advisory_manage_engine_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_manage_engine_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryManageEngineAdvisory(BaseModel): """ - AdvisoryManageEngineAdvisory + advisory.ManageEngineAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mbed_tls.py b/vulncheck_sdk/aio/models/advisory_mbed_tls.py index 76cf1f3b..f0bad92b 100644 --- a/vulncheck_sdk/aio/models/advisory_mbed_tls.py +++ b/vulncheck_sdk/aio/models/advisory_mbed_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMbedTLS(BaseModel): """ - AdvisoryMbedTLS + advisory.MbedTLS """ # noqa: E501 affects: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mc_afee.py b/vulncheck_sdk/aio/models/advisory_mc_afee.py index c4f25ff7..da9bf4b2 100644 --- a/vulncheck_sdk/aio/models/advisory_mc_afee.py +++ b/vulncheck_sdk/aio/models/advisory_mc_afee.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMcAfee(BaseModel): """ - AdvisoryMcAfee + advisory.McAfee """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mc_afee_score.py b/vulncheck_sdk/aio/models/advisory_mc_afee_score.py index 3b5b7df2..7d57bd25 100644 --- a/vulncheck_sdk/aio/models/advisory_mc_afee_score.py +++ b/vulncheck_sdk/aio/models/advisory_mc_afee_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMcAfeeScore(BaseModel): """ - AdvisoryMcAfeeScore + advisory.McAfeeScore """ # noqa: E501 base: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mcpe_applicability.py b/vulncheck_sdk/aio/models/advisory_mcpe_applicability.py index 3335227e..045b7b3c 100644 --- a/vulncheck_sdk/aio/models/advisory_mcpe_applicability.py +++ b/vulncheck_sdk/aio/models/advisory_mcpe_applicability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMCPEApplicability(BaseModel): """ - AdvisoryMCPEApplicability + advisory.MCPEApplicability """ # noqa: E501 negate: Optional[StrictBool] = None nodes: Optional[List[AdvisoryMNodes]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mcpe_match.py b/vulncheck_sdk/aio/models/advisory_mcpe_match.py index e5a6d814..0f6a14d1 100644 --- a/vulncheck_sdk/aio/models/advisory_mcpe_match.py +++ b/vulncheck_sdk/aio/models/advisory_mcpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCPEMatch(BaseModel): """ - AdvisoryMCPEMatch + advisory.MCPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/aio/models/advisory_me_product.py b/vulncheck_sdk/aio/models/advisory_me_product.py index d8f5f366..bfee4ed3 100644 --- a/vulncheck_sdk/aio/models/advisory_me_product.py +++ b/vulncheck_sdk/aio/models/advisory_me_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMEProduct(BaseModel): """ - AdvisoryMEProduct + advisory.MEProduct """ # noqa: E501 id: Optional[StrictStr] = Field(default=None, alias="ID") display_value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mediatek.py b/vulncheck_sdk/aio/models/advisory_mediatek.py index f831dd9f..ddb39277 100644 --- a/vulncheck_sdk/aio/models/advisory_mediatek.py +++ b/vulncheck_sdk/aio/models/advisory_mediatek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMediatek(BaseModel): """ - AdvisoryMediatek + advisory.Mediatek """ # noqa: E501 affected_chipsets: Optional[List[StrictStr]] = None affected_software: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_medtronic_advisory.py b/vulncheck_sdk/aio/models/advisory_medtronic_advisory.py index 5cc8ffaa..f4e12246 100644 --- a/vulncheck_sdk/aio/models/advisory_medtronic_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_medtronic_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMedtronicAdvisory(BaseModel): """ - AdvisoryMedtronicAdvisory + advisory.MedtronicAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mendix.py b/vulncheck_sdk/aio/models/advisory_mendix.py index d0e3d3e6..99f7df99 100644 --- a/vulncheck_sdk/aio/models/advisory_mendix.py +++ b/vulncheck_sdk/aio/models/advisory_mendix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMendix(BaseModel): """ - AdvisoryMendix + advisory.Mendix """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_meta_advisories.py b/vulncheck_sdk/aio/models/advisory_meta_advisories.py index 1a5f5761..d501ba8b 100644 --- a/vulncheck_sdk/aio/models/advisory_meta_advisories.py +++ b/vulncheck_sdk/aio/models/advisory_meta_advisories.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMetaAdvisories(BaseModel): """ - AdvisoryMetaAdvisories + advisory.MetaAdvisories """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_meta_data.py b/vulncheck_sdk/aio/models/advisory_meta_data.py index f7d4cff7..996d825e 100644 --- a/vulncheck_sdk/aio/models/advisory_meta_data.py +++ b/vulncheck_sdk/aio/models/advisory_meta_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryMetaData(BaseModel): """ - AdvisoryMetaData + advisory.MetaData """ # noqa: E501 advisory: Optional[AdvisoryAdvisoryDetails] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_metasploit_exploit.py b/vulncheck_sdk/aio/models/advisory_metasploit_exploit.py index 22fbfd46..92c50e8d 100644 --- a/vulncheck_sdk/aio/models/advisory_metasploit_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_metasploit_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetasploitExploit(BaseModel): """ - AdvisoryMetasploitExploit + advisory.MetasploitExploit """ # noqa: E501 author: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_metric.py b/vulncheck_sdk/aio/models/advisory_metric.py index 6b33d1f2..509fa858 100644 --- a/vulncheck_sdk/aio/models/advisory_metric.py +++ b/vulncheck_sdk/aio/models/advisory_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisoryMetric(BaseModel): """ - AdvisoryMetric + advisory.Metric """ # noqa: E501 cvss_v2_0: Optional[AdvisoryMCvssV20] = Field(default=None, alias="cvssV2_0") cvss_v3_0: Optional[AdvisoryMCvssV30] = Field(default=None, alias="cvssV3_0") diff --git a/vulncheck_sdk/aio/models/advisory_metric_scenario.py b/vulncheck_sdk/aio/models/advisory_metric_scenario.py index 0fcacb3c..d0712ef1 100644 --- a/vulncheck_sdk/aio/models/advisory_metric_scenario.py +++ b/vulncheck_sdk/aio/models/advisory_metric_scenario.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetricScenario(BaseModel): """ - AdvisoryMetricScenario + advisory.MetricScenario """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_metrics_other.py b/vulncheck_sdk/aio/models/advisory_metrics_other.py index 51845306..b8cc222b 100644 --- a/vulncheck_sdk/aio/models/advisory_metrics_other.py +++ b/vulncheck_sdk/aio/models/advisory_metrics_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetricsOther(BaseModel): """ - AdvisoryMetricsOther + advisory.MetricsOther """ # noqa: E501 content: Optional[Dict[str, Any]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_csaf.py b/vulncheck_sdk/aio/models/advisory_microsoft_csaf.py index c887eb0f..4e48f22a 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_csaf.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMicrosoftCSAF(BaseModel): """ - AdvisoryMicrosoftCSAF + advisory.MicrosoftCSAF """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_cvrf.py b/vulncheck_sdk/aio/models/advisory_microsoft_cvrf.py index d7e74842..c7980105 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_cvrf.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMicrosoftCVRF(BaseModel): """ - AdvisoryMicrosoftCVRF + advisory.MicrosoftCVRF """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvrf: Optional[AdvisoryMSCVRF] = None diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py b/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py index ac4d3de7..327330e5 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,11 +26,11 @@ class AdvisoryMicrosoftDriverBlockList(BaseModel): """ - AdvisoryMicrosoftDriverBlockList + advisory.MicrosoftDriverBlockList """ # noqa: E501 date_added: Optional[StrictStr] = None file_id: Optional[StrictStr] = Field(default=None, description="From FileAttrib or Deny") - file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = Field(default=None, description="File-level metadata") + file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = None __properties: ClassVar[List[str]] = ["date_added", "file_id", "file_metadata"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py b/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py index 6bd15b5a..cc4f551a 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMicrosoftFileMetadata(BaseModel): """ - AdvisoryMicrosoftFileMetadata + File-level metadata """ # noqa: E501 file_name: Optional[StrictStr] = Field(default=None, description="Full path (FilePath + FileName or FriendlyName)") maximum_file_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_kb.py b/vulncheck_sdk/aio/models/advisory_microsoft_kb.py index 86e514b3..768e082a 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_kb.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMicrosoftKb(BaseModel): """ - AdvisoryMicrosoftKb + advisory.MicrosoftKb """ # noqa: E501 cve: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mikrotik.py b/vulncheck_sdk/aio/models/advisory_mikrotik.py index 792547ce..6973a0f5 100644 --- a/vulncheck_sdk/aio/models/advisory_mikrotik.py +++ b/vulncheck_sdk/aio/models/advisory_mikrotik.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMikrotik(BaseModel): """ - AdvisoryMikrotik + advisory.Mikrotik """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mindray.py b/vulncheck_sdk/aio/models/advisory_mindray.py index 8ab1fea9..c2f8366e 100644 --- a/vulncheck_sdk/aio/models/advisory_mindray.py +++ b/vulncheck_sdk/aio/models/advisory_mindray.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMindray(BaseModel): """ - AdvisoryMindray + advisory.Mindray """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_misp_meta.py b/vulncheck_sdk/aio/models/advisory_misp_meta.py index f6a5acd1..eda85e5c 100644 --- a/vulncheck_sdk/aio/models/advisory_misp_meta.py +++ b/vulncheck_sdk/aio/models/advisory_misp_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMispMeta(BaseModel): """ - AdvisoryMispMeta + advisory.MispMeta """ # noqa: E501 attribution_confidence: Optional[StrictStr] = Field(default=None, alias="attribution-confidence") cfr_suspected_state_sponsor: Optional[StrictStr] = Field(default=None, alias="cfr-suspected-state-sponsor") diff --git a/vulncheck_sdk/aio/models/advisory_misp_related_item.py b/vulncheck_sdk/aio/models/advisory_misp_related_item.py index 1d4cd2cc..5b4ebcf2 100644 --- a/vulncheck_sdk/aio/models/advisory_misp_related_item.py +++ b/vulncheck_sdk/aio/models/advisory_misp_related_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMispRelatedItem(BaseModel): """ - AdvisoryMispRelatedItem + advisory.MispRelatedItem """ # noqa: E501 dest_uuid: Optional[StrictStr] = Field(default=None, alias="dest-uuid") tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_misp_value.py b/vulncheck_sdk/aio/models/advisory_misp_value.py index 39ab89f8..a3f329eb 100644 --- a/vulncheck_sdk/aio/models/advisory_misp_value.py +++ b/vulncheck_sdk/aio/models/advisory_misp_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMispValue(BaseModel): """ - AdvisoryMispValue + advisory.MispValue """ # noqa: E501 description: Optional[StrictStr] = None meta: Optional[AdvisoryMispMeta] = None diff --git a/vulncheck_sdk/aio/models/advisory_misp_value_no_id.py b/vulncheck_sdk/aio/models/advisory_misp_value_no_id.py index fe3c07a1..9f49f77c 100644 --- a/vulncheck_sdk/aio/models/advisory_misp_value_no_id.py +++ b/vulncheck_sdk/aio/models/advisory_misp_value_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMISPValueNoID(BaseModel): """ - AdvisoryMISPValueNoID + advisory.MISPValueNoID """ # noqa: E501 description: Optional[StrictStr] = None meta: Optional[AdvisoryMispMeta] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitel.py b/vulncheck_sdk/aio/models/advisory_mitel.py index 6d0d81a4..eda77374 100644 --- a/vulncheck_sdk/aio/models/advisory_mitel.py +++ b/vulncheck_sdk/aio/models/advisory_mitel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitel(BaseModel): """ - AdvisoryMitel + advisory.Mitel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_attack_group_no_id.py b/vulncheck_sdk/aio/models/advisory_mitre_attack_group_no_id.py index 1afe6173..d9ec92bc 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_attack_group_no_id.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_attack_group_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMITREAttackGroupNoID(BaseModel): """ - AdvisoryMITREAttackGroupNoID + advisory.MITREAttackGroupNoID """ # noqa: E501 aliases: Optional[List[StrictStr]] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_attack_ref.py b/vulncheck_sdk/aio/models/advisory_mitre_attack_ref.py index db4227b5..0939ad87 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_attack_ref.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_attack_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitreAttackRef(BaseModel): """ - AdvisoryMitreAttackRef + advisory.MitreAttackRef """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_attack_tech_with_refs.py b/vulncheck_sdk/aio/models/advisory_mitre_attack_tech_with_refs.py index 3053e6fd..537339ec 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_attack_tech_with_refs.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_attack_tech_with_refs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMitreAttackTechWithRefs(BaseModel): """ - AdvisoryMitreAttackTechWithRefs + advisory.MitreAttackTechWithRefs """ # noqa: E501 domain: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_attack_technique.py b/vulncheck_sdk/aio/models/advisory_mitre_attack_technique.py index a8b14a49..ebf2024b 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_attack_technique.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_attack_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitreAttackTechnique(BaseModel): """ - AdvisoryMitreAttackTechnique + advisory.MitreAttackTechnique """ # noqa: E501 sub_technique: Optional[StrictStr] = None sub_technique_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5.py b/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5.py index 8f852224..5f5ffb96 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMitreCVEListV5(BaseModel): """ - AdvisoryMitreCVEListV5 + advisory.MitreCVEListV5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5_ref.py b/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5_ref.py index 775cf68c..5648d54f 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5_ref.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_cve_list_v5_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMitreCVEListV5Ref(BaseModel): """ - AdvisoryMitreCVEListV5Ref + advisory.MitreCVEListV5Ref """ # noqa: E501 containers: Optional[AdvisoryMContainers] = None cve_metadata: Optional[AdvisoryMCveMetadata] = Field(default=None, alias="cveMetadata") diff --git a/vulncheck_sdk/aio/models/advisory_mitre_group_cti.py b/vulncheck_sdk/aio/models/advisory_mitre_group_cti.py index e2e81368..f597accd 100644 --- a/vulncheck_sdk/aio/models/advisory_mitre_group_cti.py +++ b/vulncheck_sdk/aio/models/advisory_mitre_group_cti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMitreGroupCTI(BaseModel): """ - AdvisoryMitreGroupCTI + advisory.MitreGroupCTI """ # noqa: E501 aliases: Optional[List[StrictStr]] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_mitsubishi_electric_advisory.py b/vulncheck_sdk/aio/models/advisory_mitsubishi_electric_advisory.py index f622df39..9975ed6e 100644 --- a/vulncheck_sdk/aio/models/advisory_mitsubishi_electric_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_mitsubishi_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitsubishiElectricAdvisory(BaseModel): """ - AdvisoryMitsubishiElectricAdvisory + advisory.MitsubishiElectricAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mongo_db.py b/vulncheck_sdk/aio/models/advisory_mongo_db.py index 3562343b..5d3b0974 100644 --- a/vulncheck_sdk/aio/models/advisory_mongo_db.py +++ b/vulncheck_sdk/aio/models/advisory_mongo_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMongoDB(BaseModel): """ - AdvisoryMongoDB + advisory.MongoDB """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_moxa_advisory.py b/vulncheck_sdk/aio/models/advisory_moxa_advisory.py index c0f2fdef..0a7a4d17 100644 --- a/vulncheck_sdk/aio/models/advisory_moxa_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_moxa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMoxaAdvisory(BaseModel): """ - AdvisoryMoxaAdvisory + advisory.MoxaAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mozilla_advisory.py b/vulncheck_sdk/aio/models/advisory_mozilla_advisory.py index 87a8d48d..628e67c5 100644 --- a/vulncheck_sdk/aio/models/advisory_mozilla_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_mozilla_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMozillaAdvisory(BaseModel): """ - AdvisoryMozillaAdvisory + advisory.MozillaAdvisory """ # noqa: E501 affected_components: Optional[List[AdvisoryMozillaComponent]] = None bugzilla: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_mozilla_component.py b/vulncheck_sdk/aio/models/advisory_mozilla_component.py index 5e0797a7..d5df0e3a 100644 --- a/vulncheck_sdk/aio/models/advisory_mozilla_component.py +++ b/vulncheck_sdk/aio/models/advisory_mozilla_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMozillaComponent(BaseModel): """ - AdvisoryMozillaComponent + advisory.MozillaComponent """ # noqa: E501 bugzilla: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ms_document_title.py b/vulncheck_sdk/aio/models/advisory_ms_document_title.py index 68d5e3f1..867b63a2 100644 --- a/vulncheck_sdk/aio/models/advisory_ms_document_title.py +++ b/vulncheck_sdk/aio/models/advisory_ms_document_title.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMSDocumentTitle(BaseModel): """ - AdvisoryMSDocumentTitle + advisory.MSDocumentTitle """ # noqa: E501 value: Optional[StrictStr] = Field(default=None, alias="Value") __properties: ClassVar[List[str]] = ["Value"] diff --git a/vulncheck_sdk/aio/models/advisory_mscvrf.py b/vulncheck_sdk/aio/models/advisory_mscvrf.py index d3cd9c20..83355d85 100644 --- a/vulncheck_sdk/aio/models/advisory_mscvrf.py +++ b/vulncheck_sdk/aio/models/advisory_mscvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisoryMSCVRF(BaseModel): """ - AdvisoryMSCVRF + advisory.MSCVRF """ # noqa: E501 document_title: Optional[AdvisoryMSDocumentTitle] = Field(default=None, alias="DocumentTitle") document_tracking: Optional[AdvisoryMDocumentTracking] = Field(default=None, alias="DocumentTracking") diff --git a/vulncheck_sdk/aio/models/advisory_naver.py b/vulncheck_sdk/aio/models/advisory_naver.py index 67884704..b6a54ea9 100644 --- a/vulncheck_sdk/aio/models/advisory_naver.py +++ b/vulncheck_sdk/aio/models/advisory_naver.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNaver(BaseModel): """ - AdvisoryNaver + advisory.Naver """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ncsc.py b/vulncheck_sdk/aio/models/advisory_ncsc.py index 5ba883b5..e19dd031 100644 --- a/vulncheck_sdk/aio/models/advisory_ncsc.py +++ b/vulncheck_sdk/aio/models/advisory_ncsc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNCSC(BaseModel): """ - AdvisoryNCSC + advisory.NCSC """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ncsccve.py b/vulncheck_sdk/aio/models/advisory_ncsccve.py index d34a68e9..cbdebb15 100644 --- a/vulncheck_sdk/aio/models/advisory_ncsccve.py +++ b/vulncheck_sdk/aio/models/advisory_ncsccve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNCSCCVE(BaseModel): """ - AdvisoryNCSCCVE + advisory.NCSCCVE """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_nec.py b/vulncheck_sdk/aio/models/advisory_nec.py index 0553c55c..6fd3ca45 100644 --- a/vulncheck_sdk/aio/models/advisory_nec.py +++ b/vulncheck_sdk/aio/models/advisory_nec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNEC(BaseModel): """ - AdvisoryNEC + advisory.NEC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nessus.py b/vulncheck_sdk/aio/models/advisory_nessus.py index 7317b36b..e6e16152 100644 --- a/vulncheck_sdk/aio/models/advisory_nessus.py +++ b/vulncheck_sdk/aio/models/advisory_nessus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNessus(BaseModel): """ - AdvisoryNessus + advisory.Nessus """ # noqa: E501 cpe: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_net_app.py b/vulncheck_sdk/aio/models/advisory_net_app.py index e3a93168..0bd9543c 100644 --- a/vulncheck_sdk/aio/models/advisory_net_app.py +++ b/vulncheck_sdk/aio/models/advisory_net_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetApp(BaseModel): """ - AdvisoryNetApp + advisory.NetApp """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_netatalk.py b/vulncheck_sdk/aio/models/advisory_netatalk.py index fdcfe407..17463865 100644 --- a/vulncheck_sdk/aio/models/advisory_netatalk.py +++ b/vulncheck_sdk/aio/models/advisory_netatalk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetatalk(BaseModel): """ - AdvisoryNetatalk + advisory.Netatalk """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_netgate.py b/vulncheck_sdk/aio/models/advisory_netgate.py index 418b6097..6c021deb 100644 --- a/vulncheck_sdk/aio/models/advisory_netgate.py +++ b/vulncheck_sdk/aio/models/advisory_netgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetgate(BaseModel): """ - AdvisoryNetgate + advisory.Netgate """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_netgear.py b/vulncheck_sdk/aio/models/advisory_netgear.py index a0d163a0..fa508725 100644 --- a/vulncheck_sdk/aio/models/advisory_netgear.py +++ b/vulncheck_sdk/aio/models/advisory_netgear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetgear(BaseModel): """ - AdvisoryNetgear + advisory.Netgear """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_netskope.py b/vulncheck_sdk/aio/models/advisory_netskope.py index a1ad1e22..64b45d80 100644 --- a/vulncheck_sdk/aio/models/advisory_netskope.py +++ b/vulncheck_sdk/aio/models/advisory_netskope.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetskope(BaseModel): """ - AdvisoryNetskope + advisory.Netskope """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_nexpose.py b/vulncheck_sdk/aio/models/advisory_nexpose.py index eee3bd96..e39f5177 100644 --- a/vulncheck_sdk/aio/models/advisory_nexpose.py +++ b/vulncheck_sdk/aio/models/advisory_nexpose.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNexpose(BaseModel): """ - AdvisoryNexpose + advisory.Nexpose """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nginx_advisory.py b/vulncheck_sdk/aio/models/advisory_nginx_advisory.py index 7a2bd131..0e9160d5 100644 --- a/vulncheck_sdk/aio/models/advisory_nginx_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_nginx_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNginxAdvisory(BaseModel): """ - AdvisoryNginxAdvisory + advisory.NginxAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nhs.py b/vulncheck_sdk/aio/models/advisory_nhs.py index 9681fd4b..3198d276 100644 --- a/vulncheck_sdk/aio/models/advisory_nhs.py +++ b/vulncheck_sdk/aio/models/advisory_nhs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNHS(BaseModel): """ - AdvisoryNHS + advisory.NHS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ni.py b/vulncheck_sdk/aio/models/advisory_ni.py index 31ac72f6..8124f688 100644 --- a/vulncheck_sdk/aio/models/advisory_ni.py +++ b/vulncheck_sdk/aio/models/advisory_ni.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNI(BaseModel): """ - AdvisoryNI + advisory.NI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nist_control.py b/vulncheck_sdk/aio/models/advisory_nist_control.py index a9c0d4ea..b09850c4 100644 --- a/vulncheck_sdk/aio/models/advisory_nist_control.py +++ b/vulncheck_sdk/aio/models/advisory_nist_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNISTControl(BaseModel): """ - AdvisoryNISTControl + advisory.NISTControl """ # noqa: E501 cis_controls: Optional[List[AdvisoryCISControl]] = None nist_control_family: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_node_author.py b/vulncheck_sdk/aio/models/advisory_node_author.py index 677c4864..904aee40 100644 --- a/vulncheck_sdk/aio/models/advisory_node_author.py +++ b/vulncheck_sdk/aio/models/advisory_node_author.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNodeAuthor(BaseModel): """ - AdvisoryNodeAuthor + advisory.NodeAuthor """ # noqa: E501 author: Optional[StrictStr] = None username: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_node_js.py b/vulncheck_sdk/aio/models/advisory_node_js.py index 2e3bf124..3847d94c 100644 --- a/vulncheck_sdk/aio/models/advisory_node_js.py +++ b/vulncheck_sdk/aio/models/advisory_node_js.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNodeJS(BaseModel): """ - AdvisoryNodeJS + advisory.NodeJS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_node_security.py b/vulncheck_sdk/aio/models/advisory_node_security.py index 0f46db73..41325e1a 100644 --- a/vulncheck_sdk/aio/models/advisory_node_security.py +++ b/vulncheck_sdk/aio/models/advisory_node_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNodeSecurity(BaseModel): """ - AdvisoryNodeSecurity + advisory.NodeSecurity """ # noqa: E501 affected_environments: Optional[List[StrictStr]] = None author: Optional[AdvisoryNodeAuthor] = None diff --git a/vulncheck_sdk/aio/models/advisory_nokia.py b/vulncheck_sdk/aio/models/advisory_nokia.py index 14dca9e1..e2490a0f 100644 --- a/vulncheck_sdk/aio/models/advisory_nokia.py +++ b/vulncheck_sdk/aio/models/advisory_nokia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNokia(BaseModel): """ - AdvisoryNokia + advisory.Nokia """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_note.py b/vulncheck_sdk/aio/models/advisory_note.py index 994e8672..5e133204 100644 --- a/vulncheck_sdk/aio/models/advisory_note.py +++ b/vulncheck_sdk/aio/models/advisory_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNote(BaseModel): """ - AdvisoryNote + advisory.Note """ # noqa: E501 ordinal: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_note_pad_plus_plus.py b/vulncheck_sdk/aio/models/advisory_note_pad_plus_plus.py index a30ad19d..43ad561d 100644 --- a/vulncheck_sdk/aio/models/advisory_note_pad_plus_plus.py +++ b/vulncheck_sdk/aio/models/advisory_note_pad_plus_plus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNotePadPlusPlus(BaseModel): """ - AdvisoryNotePadPlusPlus + advisory.NotePadPlusPlus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nozomi.py b/vulncheck_sdk/aio/models/advisory_nozomi.py index 806a7143..95282ee8 100644 --- a/vulncheck_sdk/aio/models/advisory_nozomi.py +++ b/vulncheck_sdk/aio/models/advisory_nozomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNozomi(BaseModel): """ - AdvisoryNozomi + advisory.Nozomi """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ntp.py b/vulncheck_sdk/aio/models/advisory_ntp.py index 4f34e1fa..7f790602 100644 --- a/vulncheck_sdk/aio/models/advisory_ntp.py +++ b/vulncheck_sdk/aio/models/advisory_ntp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNTP(BaseModel): """ - AdvisoryNTP + advisory.NTP """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_nuclei.py b/vulncheck_sdk/aio/models/advisory_nuclei.py index 9fc962e1..1aa66138 100644 --- a/vulncheck_sdk/aio/models/advisory_nuclei.py +++ b/vulncheck_sdk/aio/models/advisory_nuclei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNuclei(BaseModel): """ - AdvisoryNuclei + advisory.Nuclei """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nvd20_configuration.py b/vulncheck_sdk/aio/models/advisory_nvd20_configuration.py index 5910f952..21e25261 100644 --- a/vulncheck_sdk/aio/models/advisory_nvd20_configuration.py +++ b/vulncheck_sdk/aio/models/advisory_nvd20_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNVD20Configuration(BaseModel): """ - AdvisoryNVD20Configuration + advisory.NVD20Configuration """ # noqa: E501 negate: Optional[StrictBool] = None nodes: Optional[List[AdvisoryNVD20Node]] = None diff --git a/vulncheck_sdk/aio/models/advisory_nvd20_cvecpe_match.py b/vulncheck_sdk/aio/models/advisory_nvd20_cvecpe_match.py index 9fc43781..851e87d4 100644 --- a/vulncheck_sdk/aio/models/advisory_nvd20_cvecpe_match.py +++ b/vulncheck_sdk/aio/models/advisory_nvd20_cvecpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNVD20CVECPEMatch(BaseModel): """ - AdvisoryNVD20CVECPEMatch + advisory.NVD20CVECPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/aio/models/advisory_nvd20_node.py b/vulncheck_sdk/aio/models/advisory_nvd20_node.py index 3d7cf1ee..e68bdc28 100644 --- a/vulncheck_sdk/aio/models/advisory_nvd20_node.py +++ b/vulncheck_sdk/aio/models/advisory_nvd20_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNVD20Node(BaseModel): """ - AdvisoryNVD20Node + advisory.NVD20Node """ # noqa: E501 cpe_match: Optional[List[AdvisoryNVD20CVECPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/advisory_nvd20_source.py b/vulncheck_sdk/aio/models/advisory_nvd20_source.py index 9194b3e4..1402168f 100644 --- a/vulncheck_sdk/aio/models/advisory_nvd20_source.py +++ b/vulncheck_sdk/aio/models/advisory_nvd20_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryNVD20Source(BaseModel): """ - AdvisoryNVD20Source + advisory.NVD20Source """ # noqa: E501 contact_email: Optional[StrictStr] = Field(default=None, alias="contactEmail") created: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_nvdcpe_dictionary.py b/vulncheck_sdk/aio/models/advisory_nvdcpe_dictionary.py index 81459832..735ae846 100644 --- a/vulncheck_sdk/aio/models/advisory_nvdcpe_dictionary.py +++ b/vulncheck_sdk/aio/models/advisory_nvdcpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNVDCPEDictionary(BaseModel): """ - AdvisoryNVDCPEDictionary + advisory.NVDCPEDictionary """ # noqa: E501 backup_only: Optional[StrictStr] = Field(default=None, alias="backupOnly") __properties: ClassVar[List[str]] = ["backupOnly"] diff --git a/vulncheck_sdk/aio/models/advisory_nvidia_revision.py b/vulncheck_sdk/aio/models/advisory_nvidia_revision.py index c32b4b8b..f4171ab6 100644 --- a/vulncheck_sdk/aio/models/advisory_nvidia_revision.py +++ b/vulncheck_sdk/aio/models/advisory_nvidia_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryNvidiaRevision(BaseModel): """ - AdvisoryNvidiaRevision + advisory.NvidiaRevision """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[StrictStr] = None revision: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "description", "revision"] diff --git a/vulncheck_sdk/aio/models/advisory_nz_advisory.py b/vulncheck_sdk/aio/models/advisory_nz_advisory.py index f655be64..6fb66f76 100644 --- a/vulncheck_sdk/aio/models/advisory_nz_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_nz_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNZAdvisory(BaseModel): """ - AdvisoryNZAdvisory + advisory.NZAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_o_curl.py b/vulncheck_sdk/aio/models/advisory_o_curl.py index cbca176c..352b2767 100644 --- a/vulncheck_sdk/aio/models/advisory_o_curl.py +++ b/vulncheck_sdk/aio/models/advisory_o_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryOCurl(BaseModel): """ - AdvisoryOCurl + advisory.OCurl """ # noqa: E501 affected: Optional[List[AdvisoryCurlAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_octopus_deploy.py b/vulncheck_sdk/aio/models/advisory_octopus_deploy.py index 628823db..016cb652 100644 --- a/vulncheck_sdk/aio/models/advisory_octopus_deploy.py +++ b/vulncheck_sdk/aio/models/advisory_octopus_deploy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOctopusDeploy(BaseModel): """ - AdvisoryOctopusDeploy + advisory.OctopusDeploy """ # noqa: E501 advisory_number: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_okta.py b/vulncheck_sdk/aio/models/advisory_okta.py index 47329626..65e843f7 100644 --- a/vulncheck_sdk/aio/models/advisory_okta.py +++ b/vulncheck_sdk/aio/models/advisory_okta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOkta(BaseModel): """ - AdvisoryOkta + advisory.Okta """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_omron.py b/vulncheck_sdk/aio/models/advisory_omron.py index af048682..e786c116 100644 --- a/vulncheck_sdk/aio/models/advisory_omron.py +++ b/vulncheck_sdk/aio/models/advisory_omron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOmron(BaseModel): """ - AdvisoryOmron + advisory.Omron """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_one_e.py b/vulncheck_sdk/aio/models/advisory_one_e.py index 83976ed6..4445c38a 100644 --- a/vulncheck_sdk/aio/models/advisory_one_e.py +++ b/vulncheck_sdk/aio/models/advisory_one_e.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOneE(BaseModel): """ - AdvisoryOneE + advisory.OneE """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_bsd.py b/vulncheck_sdk/aio/models/advisory_open_bsd.py index 1cb1f606..3198dfe1 100644 --- a/vulncheck_sdk/aio/models/advisory_open_bsd.py +++ b/vulncheck_sdk/aio/models/advisory_open_bsd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenBSD(BaseModel): """ - AdvisoryOpenBSD + advisory.OpenBSD """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_cvdb.py b/vulncheck_sdk/aio/models/advisory_open_cvdb.py index 58f9c5db..ae58e07f 100644 --- a/vulncheck_sdk/aio/models/advisory_open_cvdb.py +++ b/vulncheck_sdk/aio/models/advisory_open_cvdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenCVDB(BaseModel): """ - AdvisoryOpenCVDB + advisory.OpenCVDB """ # noqa: E501 affected_platforms: Optional[List[StrictStr]] = None affected_services: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_jdk.py b/vulncheck_sdk/aio/models/advisory_open_jdk.py index ef593865..1e8fb443 100644 --- a/vulncheck_sdk/aio/models/advisory_open_jdk.py +++ b/vulncheck_sdk/aio/models/advisory_open_jdk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenJDK(BaseModel): """ - AdvisoryOpenJDK + advisory.OpenJDK """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_jdkcve.py b/vulncheck_sdk/aio/models/advisory_open_jdkcve.py index 84317d4e..966efcf0 100644 --- a/vulncheck_sdk/aio/models/advisory_open_jdkcve.py +++ b/vulncheck_sdk/aio/models/advisory_open_jdkcve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenJDKCVE(BaseModel): """ - AdvisoryOpenJDKCVE + advisory.OpenJDKCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_ssh.py b/vulncheck_sdk/aio/models/advisory_open_ssh.py index c46e992e..c719f2a1 100644 --- a/vulncheck_sdk/aio/models/advisory_open_ssh.py +++ b/vulncheck_sdk/aio/models/advisory_open_ssh.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenSSH(BaseModel): """ - AdvisoryOpenSSH + advisory.OpenSSH """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_ssl_sec_adv.py b/vulncheck_sdk/aio/models/advisory_open_ssl_sec_adv.py index 3d014a38..2031e2ca 100644 --- a/vulncheck_sdk/aio/models/advisory_open_ssl_sec_adv.py +++ b/vulncheck_sdk/aio/models/advisory_open_ssl_sec_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenSSLSecAdv(BaseModel): """ - AdvisoryOpenSSLSecAdv + advisory.OpenSSLSecAdv """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_ssl_vulnerability.py b/vulncheck_sdk/aio/models/advisory_open_ssl_vulnerability.py index 9b8957a3..41b49226 100644 --- a/vulncheck_sdk/aio/models/advisory_open_ssl_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_open_ssl_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenSSLVulnerability(BaseModel): """ - AdvisoryOpenSSLVulnerability + advisory.OpenSSLVulnerability """ # noqa: E501 cve: Optional[List[StrictStr]] = None fixed: Optional[List[AdvisoryFixAff]] = None diff --git a/vulncheck_sdk/aio/models/advisory_open_stack.py b/vulncheck_sdk/aio/models/advisory_open_stack.py index b651d34d..4448094d 100644 --- a/vulncheck_sdk/aio/models/advisory_open_stack.py +++ b/vulncheck_sdk/aio/models/advisory_open_stack.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenStack(BaseModel): """ - AdvisoryOpenStack + advisory.OpenStack """ # noqa: E501 affects: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_opengear.py b/vulncheck_sdk/aio/models/advisory_opengear.py index 6162e82b..db455ef9 100644 --- a/vulncheck_sdk/aio/models/advisory_opengear.py +++ b/vulncheck_sdk/aio/models/advisory_opengear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpengear(BaseModel): """ - AdvisoryOpengear + advisory.Opengear """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_oracle_cpu.py b/vulncheck_sdk/aio/models/advisory_oracle_cpu.py index 94edbd24..39084215 100644 --- a/vulncheck_sdk/aio/models/advisory_oracle_cpu.py +++ b/vulncheck_sdk/aio/models/advisory_oracle_cpu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOracleCPU(BaseModel): """ - AdvisoryOracleCPU + advisory.OracleCPU """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_oracle_cpucsaf.py b/vulncheck_sdk/aio/models/advisory_oracle_cpucsaf.py index e2694f78..8d335639 100644 --- a/vulncheck_sdk/aio/models/advisory_oracle_cpucsaf.py +++ b/vulncheck_sdk/aio/models/advisory_oracle_cpucsaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOracleCPUCSAF(BaseModel): """ - AdvisoryOracleCPUCSAF + advisory.OracleCPUCSAF """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_original_ghsa.py b/vulncheck_sdk/aio/models/advisory_original_ghsa.py index 346fda2d..a8feecba 100644 --- a/vulncheck_sdk/aio/models/advisory_original_ghsa.py +++ b/vulncheck_sdk/aio/models/advisory_original_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryOriginalGHSA(BaseModel): """ - AdvisoryOriginalGHSA + advisory.OriginalGHSA """ # noqa: E501 affected: Optional[List[AdvisoryGHSAAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_osv.py b/vulncheck_sdk/aio/models/advisory_osv.py index a67fc2dc..60ea0dfa 100644 --- a/vulncheck_sdk/aio/models/advisory_osv.py +++ b/vulncheck_sdk/aio/models/advisory_osv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOSV(BaseModel): """ - AdvisoryOSV + advisory.OSV """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_osv_obj.py b/vulncheck_sdk/aio/models/advisory_osv_obj.py index 384d3d29..22da7ee5 100644 --- a/vulncheck_sdk/aio/models/advisory_osv_obj.py +++ b/vulncheck_sdk/aio/models/advisory_osv_obj.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryOSVObj(BaseModel): """ - AdvisoryOSVObj + advisory.OSVObj """ # noqa: E501 affected: Optional[List[AdvisoryAffected]] = Field(default=None, description="collection based on https://ossf.github.io/osv-schema/") aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_osv_package.py b/vulncheck_sdk/aio/models/advisory_osv_package.py index 9f99f578..d5a3bb47 100644 --- a/vulncheck_sdk/aio/models/advisory_osv_package.py +++ b/vulncheck_sdk/aio/models/advisory_osv_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOSVPackage(BaseModel): """ - AdvisoryOSVPackage + advisory.OSVPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_osv_reference.py b/vulncheck_sdk/aio/models/advisory_osv_reference.py index b1b0b1b5..14c1f64e 100644 --- a/vulncheck_sdk/aio/models/advisory_osv_reference.py +++ b/vulncheck_sdk/aio/models/advisory_osv_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOSVReference(BaseModel): """ - AdvisoryOSVReference + advisory.OSVReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_otrs.py b/vulncheck_sdk/aio/models/advisory_otrs.py index 3d58df0c..39047f58 100644 --- a/vulncheck_sdk/aio/models/advisory_otrs.py +++ b/vulncheck_sdk/aio/models/advisory_otrs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOTRS(BaseModel): """ - AdvisoryOTRS + advisory.OTRS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_oval_cve.py b/vulncheck_sdk/aio/models/advisory_oval_cve.py index 265dbb8b..95ac3be2 100644 --- a/vulncheck_sdk/aio/models/advisory_oval_cve.py +++ b/vulncheck_sdk/aio/models/advisory_oval_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOvalCVE(BaseModel): """ - AdvisoryOvalCVE + advisory.OvalCVE """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_oval_reference.py b/vulncheck_sdk/aio/models/advisory_oval_reference.py index 12c9bb76..f4a1fd81 100644 --- a/vulncheck_sdk/aio/models/advisory_oval_reference.py +++ b/vulncheck_sdk/aio/models/advisory_oval_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOvalReference(BaseModel): """ - AdvisoryOvalReference + advisory.OvalReference """ # noqa: E501 ref_id: Optional[StrictStr] = None ref_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_override.py b/vulncheck_sdk/aio/models/advisory_override.py index 453ad930..408f11dd 100644 --- a/vulncheck_sdk/aio/models/advisory_override.py +++ b/vulncheck_sdk/aio/models/advisory_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryOverride(BaseModel): """ - AdvisoryOverride + advisory.Override """ # noqa: E501 annotation: Optional[AdvisoryOverrideAnnotation] = Field(default=None, alias="_annotation") cve: Optional[AdvisoryOverrideCVE] = None diff --git a/vulncheck_sdk/aio/models/advisory_override_annotation.py b/vulncheck_sdk/aio/models/advisory_override_annotation.py index facdd77b..1517c450 100644 --- a/vulncheck_sdk/aio/models/advisory_override_annotation.py +++ b/vulncheck_sdk/aio/models/advisory_override_annotation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideAnnotation(BaseModel): """ - AdvisoryOverrideAnnotation + advisory.OverrideAnnotation """ # noqa: E501 cve_id: Optional[StrictStr] = None modified: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_override_configuration.py b/vulncheck_sdk/aio/models/advisory_override_configuration.py index 2a98f702..6b32ddec 100644 --- a/vulncheck_sdk/aio/models/advisory_override_configuration.py +++ b/vulncheck_sdk/aio/models/advisory_override_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideConfiguration(BaseModel): """ - AdvisoryOverrideConfiguration + advisory.OverrideConfiguration """ # noqa: E501 nodes: Optional[List[AdvisoryCPENode]] = None __properties: ClassVar[List[str]] = ["nodes"] diff --git a/vulncheck_sdk/aio/models/advisory_override_cve.py b/vulncheck_sdk/aio/models/advisory_override_cve.py index 627c255e..d9cbe711 100644 --- a/vulncheck_sdk/aio/models/advisory_override_cve.py +++ b/vulncheck_sdk/aio/models/advisory_override_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideCVE(BaseModel): """ - AdvisoryOverrideCVE + advisory.OverrideCVE """ # noqa: E501 configurations: Optional[List[AdvisoryOverrideConfiguration]] = None __properties: ClassVar[List[str]] = ["configurations"] diff --git a/vulncheck_sdk/aio/models/advisory_own_cloud.py b/vulncheck_sdk/aio/models/advisory_own_cloud.py index ee5c62a7..d31259f0 100644 --- a/vulncheck_sdk/aio/models/advisory_own_cloud.py +++ b/vulncheck_sdk/aio/models/advisory_own_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOwnCloud(BaseModel): """ - AdvisoryOwnCloud + advisory.OwnCloud """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_package.py b/vulncheck_sdk/aio/models/advisory_package.py index 129fe045..d3a12b1f 100644 --- a/vulncheck_sdk/aio/models/advisory_package.py +++ b/vulncheck_sdk/aio/models/advisory_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPackage(BaseModel): """ - AdvisoryPackage + advisory.Package """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = Field(default=None, description="sort") diff --git a/vulncheck_sdk/aio/models/advisory_package_stat.py b/vulncheck_sdk/aio/models/advisory_package_stat.py index 25d7ce60..2adb0568 100644 --- a/vulncheck_sdk/aio/models/advisory_package_stat.py +++ b/vulncheck_sdk/aio/models/advisory_package_stat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPackageStat(BaseModel): """ - AdvisoryPackageStat + advisory.PackageStat """ # noqa: E501 cpe: Optional[StrictStr] = None fix_state: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_packetstorm_exploit.py b/vulncheck_sdk/aio/models/advisory_packetstorm_exploit.py index 4cbcb7f5..74bf8c6a 100644 --- a/vulncheck_sdk/aio/models/advisory_packetstorm_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_packetstorm_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPacketstormExploit(BaseModel): """ - AdvisoryPacketstormExploit + advisory.PacketstormExploit """ # noqa: E501 author: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_palantir.py b/vulncheck_sdk/aio/models/advisory_palantir.py index abc2d4f9..d6c98fe6 100644 --- a/vulncheck_sdk/aio/models/advisory_palantir.py +++ b/vulncheck_sdk/aio/models/advisory_palantir.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPalantir(BaseModel): """ - AdvisoryPalantir + advisory.Palantir """ # noqa: E501 affected_products: Optional[StrictStr] = None background: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_palo_alto_advisory.py b/vulncheck_sdk/aio/models/advisory_palo_alto_advisory.py index 81d8146f..e0acdcfd 100644 --- a/vulncheck_sdk/aio/models/advisory_palo_alto_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_palo_alto_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPaloAltoAdvisory(BaseModel): """ - AdvisoryPaloAltoAdvisory + advisory.PaloAltoAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None applicable_versions: Optional[StrictStr] = Field(default=None, alias="applicableVersions") diff --git a/vulncheck_sdk/aio/models/advisory_panasonic.py b/vulncheck_sdk/aio/models/advisory_panasonic.py index 76d22a23..65ceb55c 100644 --- a/vulncheck_sdk/aio/models/advisory_panasonic.py +++ b/vulncheck_sdk/aio/models/advisory_panasonic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPanasonic(BaseModel): """ - AdvisoryPanasonic + advisory.Panasonic """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_paper_cut.py b/vulncheck_sdk/aio/models/advisory_paper_cut.py index 01aa137a..d40b61f8 100644 --- a/vulncheck_sdk/aio/models/advisory_paper_cut.py +++ b/vulncheck_sdk/aio/models/advisory_paper_cut.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPaperCut(BaseModel): """ - AdvisoryPaperCut + advisory.PaperCut """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_patch.py b/vulncheck_sdk/aio/models/advisory_patch.py index 5c6a3893..ee436bdd 100644 --- a/vulncheck_sdk/aio/models/advisory_patch.py +++ b/vulncheck_sdk/aio/models/advisory_patch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPatch(BaseModel): """ - AdvisoryPatch + advisory.Patch """ # noqa: E501 advisory_id: Optional[StrictStr] = None component: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_pega.py b/vulncheck_sdk/aio/models/advisory_pega.py index c5678bfd..31c845cb 100644 --- a/vulncheck_sdk/aio/models/advisory_pega.py +++ b/vulncheck_sdk/aio/models/advisory_pega.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPega(BaseModel): """ - AdvisoryPega + advisory.Pega """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_pg_fix.py b/vulncheck_sdk/aio/models/advisory_pg_fix.py index 1f7e6d5c..945d1fa5 100644 --- a/vulncheck_sdk/aio/models/advisory_pg_fix.py +++ b/vulncheck_sdk/aio/models/advisory_pg_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPGFix(BaseModel): """ - AdvisoryPGFix + advisory.PGFix """ # noqa: E501 affected: Optional[StrictStr] = None fixed: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_philips_advisory.py b/vulncheck_sdk/aio/models/advisory_philips_advisory.py index e93b118f..e334c669 100644 --- a/vulncheck_sdk/aio/models/advisory_philips_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_philips_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPhilipsAdvisory(BaseModel): """ - AdvisoryPhilipsAdvisory + advisory.PhilipsAdvisory """ # noqa: E501 affected_products: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_phoenix_contact_advisory.py b/vulncheck_sdk/aio/models/advisory_phoenix_contact_advisory.py index 1dab01de..5d803792 100644 --- a/vulncheck_sdk/aio/models/advisory_phoenix_contact_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_phoenix_contact_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPhoenixContactAdvisory(BaseModel): """ - AdvisoryPhoenixContactAdvisory + advisory.PhoenixContactAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_phpmy_admin.py b/vulncheck_sdk/aio/models/advisory_phpmy_admin.py index 9ba8bb67..b9836ecb 100644 --- a/vulncheck_sdk/aio/models/advisory_phpmy_admin.py +++ b/vulncheck_sdk/aio/models/advisory_phpmy_admin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPHPMyAdmin(BaseModel): """ - AdvisoryPHPMyAdmin + advisory.PHPMyAdmin """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_pk_cert.py b/vulncheck_sdk/aio/models/advisory_pk_cert.py index e7752d49..8c9ba4b6 100644 --- a/vulncheck_sdk/aio/models/advisory_pk_cert.py +++ b/vulncheck_sdk/aio/models/advisory_pk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPKCert(BaseModel): """ - AdvisoryPKCert + advisory.PKCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_postgres_sql.py b/vulncheck_sdk/aio/models/advisory_postgres_sql.py index c270f584..0e7b505d 100644 --- a/vulncheck_sdk/aio/models/advisory_postgres_sql.py +++ b/vulncheck_sdk/aio/models/advisory_postgres_sql.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryPostgresSQL(BaseModel): """ - AdvisoryPostgresSQL + advisory.PostgresSQL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_power_dns.py b/vulncheck_sdk/aio/models/advisory_power_dns.py index 1168428c..1b8c1181 100644 --- a/vulncheck_sdk/aio/models/advisory_power_dns.py +++ b/vulncheck_sdk/aio/models/advisory_power_dns.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPowerDNS(BaseModel): """ - AdvisoryPowerDNS + advisory.PowerDNS """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_prime_version.py b/vulncheck_sdk/aio/models/advisory_prime_version.py index 020070fb..a5004ec2 100644 --- a/vulncheck_sdk/aio/models/advisory_prime_version.py +++ b/vulncheck_sdk/aio/models/advisory_prime_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPrimeVersion(BaseModel): """ - AdvisoryPrimeVersion + advisory.PrimeVersion """ # noqa: E501 jd_k: Optional[StrictStr] = Field(default=None, alias="jdK") prime: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_product.py b/vulncheck_sdk/aio/models/advisory_product.py index 471a7195..20a95ecb 100644 --- a/vulncheck_sdk/aio/models/advisory_product.py +++ b/vulncheck_sdk/aio/models/advisory_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,18 +18,18 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self class AdvisoryProduct(BaseModel): """ - AdvisoryProduct + advisory.Product """ # noqa: E501 name: Optional[StrictStr] = None product_id: Optional[StrictStr] = None - product_identification_helper: Optional[Dict[str, Any]] = None + product_identification_helper: Optional[Dict[str, Any]] = Field(default=None, description="advisory.IdentificationHelper") __properties: ClassVar[List[str]] = ["name", "product_id", "product_identification_helper"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/advisory_product_branch.py b/vulncheck_sdk/aio/models/advisory_product_branch.py index 502bacf4..e365f204 100644 --- a/vulncheck_sdk/aio/models/advisory_product_branch.py +++ b/vulncheck_sdk/aio/models/advisory_product_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryProductBranch(BaseModel): """ - AdvisoryProductBranch + ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property """ # noqa: E501 branches: Optional[List[AdvisoryProductBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_product_specific_detail.py b/vulncheck_sdk/aio/models/advisory_product_specific_detail.py index 927c9617..50085a9d 100644 --- a/vulncheck_sdk/aio/models/advisory_product_specific_detail.py +++ b/vulncheck_sdk/aio/models/advisory_product_specific_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProductSpecificDetail(BaseModel): """ - AdvisoryProductSpecificDetail + advisory.ProductSpecificDetail """ # noqa: E501 id: Optional[StrictStr] = Field(default=None, alias="ID") display_value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_products_affected.py b/vulncheck_sdk/aio/models/advisory_products_affected.py index 9588b2cc..9e009236 100644 --- a/vulncheck_sdk/aio/models/advisory_products_affected.py +++ b/vulncheck_sdk/aio/models/advisory_products_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProductsAffected(BaseModel): """ - AdvisoryProductsAffected + advisory.ProductsAffected """ # noqa: E501 cve: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_progress.py b/vulncheck_sdk/aio/models/advisory_progress.py index 071faf9a..3a3811d6 100644 --- a/vulncheck_sdk/aio/models/advisory_progress.py +++ b/vulncheck_sdk/aio/models/advisory_progress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProgress(BaseModel): """ - AdvisoryProgress + advisory.Progress """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_proofpoint.py b/vulncheck_sdk/aio/models/advisory_proofpoint.py index 41a83064..7fd19899 100644 --- a/vulncheck_sdk/aio/models/advisory_proofpoint.py +++ b/vulncheck_sdk/aio/models/advisory_proofpoint.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProofpoint(BaseModel): """ - AdvisoryProofpoint + advisory.Proofpoint """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_ptc.py b/vulncheck_sdk/aio/models/advisory_ptc.py index faba95d2..d93320d7 100644 --- a/vulncheck_sdk/aio/models/advisory_ptc.py +++ b/vulncheck_sdk/aio/models/advisory_ptc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPTC(BaseModel): """ - AdvisoryPTC + advisory.PTC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ptm_descriptions.py b/vulncheck_sdk/aio/models/advisory_ptm_descriptions.py index 0b04404e..ac7d5b91 100644 --- a/vulncheck_sdk/aio/models/advisory_ptm_descriptions.py +++ b/vulncheck_sdk/aio/models/advisory_ptm_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPTMDescriptions(BaseModel): """ - AdvisoryPTMDescriptions + advisory.PTMDescriptions """ # noqa: E501 cwe_id: Optional[StrictStr] = Field(default=None, alias="cweId") description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_publisher.py b/vulncheck_sdk/aio/models/advisory_publisher.py index 77e842a0..e3c7f090 100644 --- a/vulncheck_sdk/aio/models/advisory_publisher.py +++ b/vulncheck_sdk/aio/models/advisory_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPublisher(BaseModel): """ - AdvisoryPublisher + advisory.Publisher """ # noqa: E501 category: Optional[StrictStr] = None contact_details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_pure_storage.py b/vulncheck_sdk/aio/models/advisory_pure_storage.py index 1ee29da4..d7c2e49a 100644 --- a/vulncheck_sdk/aio/models/advisory_pure_storage.py +++ b/vulncheck_sdk/aio/models/advisory_pure_storage.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPureStorage(BaseModel): """ - AdvisoryPureStorage + advisory.PureStorage """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_advisory.py b/vulncheck_sdk/aio/models/advisory_py_pa_advisory.py index fc53d991..d49db2a7 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryPyPAAdvisory(BaseModel): """ - AdvisoryPyPAAdvisory + advisory.PyPAAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, description="ID is the PYSEC- identifier") affected: Optional[List[AdvisoryPyPAAffected]] = Field(default=None, description="Affected will list out the vulnerable versions.") diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_affected.py b/vulncheck_sdk/aio/models/advisory_py_pa_affected.py index 60936faf..6b4f65e7 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_affected.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryPyPAAffected(BaseModel): """ - AdvisoryPyPAAffected + advisory.PyPAAffected """ # noqa: E501 package: Optional[AdvisoryPyPAPackage] = None ranges: Optional[List[AdvisoryPyPARange]] = None diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_event.py b/vulncheck_sdk/aio/models/advisory_py_pa_event.py index 71a5eaa3..27a3e73b 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_event.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAEvent(BaseModel): """ - AdvisoryPyPAEvent + advisory.PyPAEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_package.py b/vulncheck_sdk/aio/models/advisory_py_pa_package.py index 8341d926..13bdeb85 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_package.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAPackage(BaseModel): """ - AdvisoryPyPAPackage + advisory.PyPAPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_range.py b/vulncheck_sdk/aio/models/advisory_py_pa_range.py index 962352c6..ac2e0d76 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_range.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryPyPARange(BaseModel): """ - AdvisoryPyPARange + advisory.PyPARange """ # noqa: E501 events: Optional[List[AdvisoryPyPAEvent]] = None ranges_type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_py_pa_reference.py b/vulncheck_sdk/aio/models/advisory_py_pa_reference.py index ea83bf19..3a77f400 100644 --- a/vulncheck_sdk/aio/models/advisory_py_pa_reference.py +++ b/vulncheck_sdk/aio/models/advisory_py_pa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAReference(BaseModel): """ - AdvisoryPyPAReference + advisory.PyPAReference """ # noqa: E501 refs_type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_qnap_advisory.py b/vulncheck_sdk/aio/models/advisory_qnap_advisory.py index b945d301..26633b36 100644 --- a/vulncheck_sdk/aio/models/advisory_qnap_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_qnap_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQNAPAdvisory(BaseModel): """ - AdvisoryQNAPAdvisory + advisory.QNAPAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_qqid.py b/vulncheck_sdk/aio/models/advisory_qqid.py index bacd276f..2a5a883b 100644 --- a/vulncheck_sdk/aio/models/advisory_qqid.py +++ b/vulncheck_sdk/aio/models/advisory_qqid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQQID(BaseModel): """ - AdvisoryQQID + advisory.QQID """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss3_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_qsb.py b/vulncheck_sdk/aio/models/advisory_qsb.py index b8f58b80..0d87320b 100644 --- a/vulncheck_sdk/aio/models/advisory_qsb.py +++ b/vulncheck_sdk/aio/models/advisory_qsb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQSB(BaseModel): """ - AdvisoryQSB + advisory.QSB """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_qualcomm.py b/vulncheck_sdk/aio/models/advisory_qualcomm.py index 01aa03c2..4f53df73 100644 --- a/vulncheck_sdk/aio/models/advisory_qualcomm.py +++ b/vulncheck_sdk/aio/models/advisory_qualcomm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQualcomm(BaseModel): """ - AdvisoryQualcomm + advisory.Qualcomm """ # noqa: E501 chipsets: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_qualys.py b/vulncheck_sdk/aio/models/advisory_qualys.py index 5f7d1459..2fa877eb 100644 --- a/vulncheck_sdk/aio/models/advisory_qualys.py +++ b/vulncheck_sdk/aio/models/advisory_qualys.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQualys(BaseModel): """ - AdvisoryQualys + advisory.Qualys """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_qualys_qid.py b/vulncheck_sdk/aio/models/advisory_qualys_qid.py index 37cab267..f6627c3d 100644 --- a/vulncheck_sdk/aio/models/advisory_qualys_qid.py +++ b/vulncheck_sdk/aio/models/advisory_qualys_qid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryQualysQID(BaseModel): """ - AdvisoryQualysQID + advisory.QualysQID """ # noqa: E501 consequence: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_r_description.py b/vulncheck_sdk/aio/models/advisory_r_description.py index cfb60fac..5c5b90fa 100644 --- a/vulncheck_sdk/aio/models/advisory_r_description.py +++ b/vulncheck_sdk/aio/models/advisory_r_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRDescription(BaseModel): """ - AdvisoryRDescription + advisory.RDescription """ # noqa: E501 value: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["value"] diff --git a/vulncheck_sdk/aio/models/advisory_r_note.py b/vulncheck_sdk/aio/models/advisory_r_note.py index a78226fe..a106b4e1 100644 --- a/vulncheck_sdk/aio/models/advisory_r_note.py +++ b/vulncheck_sdk/aio/models/advisory_r_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRNote(BaseModel): """ - AdvisoryRNote + advisory.RNote """ # noqa: E501 audience: Optional[StrictStr] = None ordinal: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_r_revision.py b/vulncheck_sdk/aio/models/advisory_r_revision.py index e99d2334..1178c65c 100644 --- a/vulncheck_sdk/aio/models/advisory_r_revision.py +++ b/vulncheck_sdk/aio/models/advisory_r_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class AdvisoryRRevision(BaseModel): """ - AdvisoryRRevision + advisory.RRevision """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[AdvisoryRDescription] = None number: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "description", "number"] diff --git a/vulncheck_sdk/aio/models/advisory_r_score_set.py b/vulncheck_sdk/aio/models/advisory_r_score_set.py index a4ca26d7..8433b2d3 100644 --- a/vulncheck_sdk/aio/models/advisory_r_score_set.py +++ b/vulncheck_sdk/aio/models/advisory_r_score_set.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRScoreSet(BaseModel): """ - AdvisoryRScoreSet + advisory.RScoreSet """ # noqa: E501 base_score: Optional[StrictStr] = None product_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_r_threat.py b/vulncheck_sdk/aio/models/advisory_r_threat.py index e8997f45..5d85117a 100644 --- a/vulncheck_sdk/aio/models/advisory_r_threat.py +++ b/vulncheck_sdk/aio/models/advisory_r_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class AdvisoryRThreat(BaseModel): """ - AdvisoryRThreat + advisory.RThreat """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="Date") + date: Optional[StrictStr] = Field(default=None, alias="Date") date_specified: Optional[StrictBool] = Field(default=None, alias="DateSpecified") description: Optional[AdvisoryIVal] = Field(default=None, alias="Description") product_id: Optional[List[StrictStr]] = Field(default=None, alias="ProductID") diff --git a/vulncheck_sdk/aio/models/advisory_range.py b/vulncheck_sdk/aio/models/advisory_range.py index 0c64dc90..9a81a850 100644 --- a/vulncheck_sdk/aio/models/advisory_range.py +++ b/vulncheck_sdk/aio/models/advisory_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRange(BaseModel): """ - AdvisoryRange + advisory.Range """ # noqa: E501 events: Optional[List[AdvisoryEvent]] = None repo: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ransomware_exploit.py b/vulncheck_sdk/aio/models/advisory_ransomware_exploit.py index 8dc0bfd7..dc187b13 100644 --- a/vulncheck_sdk/aio/models/advisory_ransomware_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_ransomware_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryRansomwareExploit(BaseModel): """ - AdvisoryRansomwareExploit + advisory.RansomwareExploit """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/aio/models/advisory_record_type.py b/vulncheck_sdk/aio/models/advisory_record_type.py index c61bd54f..384cd6cf 100644 --- a/vulncheck_sdk/aio/models/advisory_record_type.py +++ b/vulncheck_sdk/aio/models/advisory_record_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRecordType(BaseModel): """ - AdvisoryRecordType + advisory.RecordType """ # noqa: E501 finding: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_red_lion.py b/vulncheck_sdk/aio/models/advisory_red_lion.py index 99b2fec5..8dad4b73 100644 --- a/vulncheck_sdk/aio/models/advisory_red_lion.py +++ b/vulncheck_sdk/aio/models/advisory_red_lion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRedLion(BaseModel): """ - AdvisoryRedLion + advisory.RedLion """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_redhat_cve.py b/vulncheck_sdk/aio/models/advisory_redhat_cve.py index a6effeae..e881d69e 100644 --- a/vulncheck_sdk/aio/models/advisory_redhat_cve.py +++ b/vulncheck_sdk/aio/models/advisory_redhat_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRedhatCVE(BaseModel): """ - AdvisoryRedhatCVE + advisory.RedhatCVE """ # noqa: E501 advisories: Optional[List[StrictStr]] = None advisory_csaf_vex_url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_reference.py b/vulncheck_sdk/aio/models/advisory_reference.py index bb08bc80..c5a4f8d1 100644 --- a/vulncheck_sdk/aio/models/advisory_reference.py +++ b/vulncheck_sdk/aio/models/advisory_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryReference(BaseModel): """ - AdvisoryReference + advisory.Reference """ # noqa: E501 href: Optional[StrictStr] = Field(default=None, description="sort") id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_related_rule.py b/vulncheck_sdk/aio/models/advisory_related_rule.py index ce257caa..6ee97bfb 100644 --- a/vulncheck_sdk/aio/models/advisory_related_rule.py +++ b/vulncheck_sdk/aio/models/advisory_related_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRelatedRule(BaseModel): """ - AdvisoryRelatedRule + advisory.RelatedRule """ # noqa: E501 id: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_remediation_data.py b/vulncheck_sdk/aio/models/advisory_remediation_data.py index 420e7bfc..dd451151 100644 --- a/vulncheck_sdk/aio/models/advisory_remediation_data.py +++ b/vulncheck_sdk/aio/models/advisory_remediation_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,10 +26,10 @@ class AdvisoryRemediationData(BaseModel): """ - AdvisoryRemediationData + advisory.RemediationData """ # noqa: E501 category: Optional[StrictStr] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") details: Optional[StrictStr] = None entitlements: Optional[List[StrictStr]] = None group_ids: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_renesas.py b/vulncheck_sdk/aio/models/advisory_renesas.py index fd694561..42a660da 100644 --- a/vulncheck_sdk/aio/models/advisory_renesas.py +++ b/vulncheck_sdk/aio/models/advisory_renesas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRenesas(BaseModel): """ - AdvisoryRenesas + advisory.Renesas """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_reported_exploit.py b/vulncheck_sdk/aio/models/advisory_reported_exploit.py index c40c91b4..2b583e63 100644 --- a/vulncheck_sdk/aio/models/advisory_reported_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_reported_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryReportedExploit(BaseModel): """ - AdvisoryReportedExploit + advisory.ReportedExploit """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_restart_data.py b/vulncheck_sdk/aio/models/advisory_restart_data.py index 1d392b57..e390ad6e 100644 --- a/vulncheck_sdk/aio/models/advisory_restart_data.py +++ b/vulncheck_sdk/aio/models/advisory_restart_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRestartData(BaseModel): """ - AdvisoryRestartData + advisory.RestartData """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_revision.py b/vulncheck_sdk/aio/models/advisory_revision.py deleted file mode 100644 index 66a2d956..00000000 --- a/vulncheck_sdk/aio/models/advisory_revision.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRevision(BaseModel): - """ - AdvisoryRevision - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - description: Optional[StrictStr] = None - number: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["date", "description", "number"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date"), - "description": obj.get("description"), - "number": obj.get("number") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_revision_history.py b/vulncheck_sdk/aio/models/advisory_revision_history.py index 40bc4e29..b4c02296 100644 --- a/vulncheck_sdk/aio/models/advisory_revision_history.py +++ b/vulncheck_sdk/aio/models/advisory_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryRevisionHistory(BaseModel): """ - AdvisoryRevisionHistory + advisory.RevisionHistory """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") number: Optional[StrictStr] = None summary: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "number", "summary"] diff --git a/vulncheck_sdk/aio/models/advisory_revive.py b/vulncheck_sdk/aio/models/advisory_revive.py index 5c0774c4..25904fc9 100644 --- a/vulncheck_sdk/aio/models/advisory_revive.py +++ b/vulncheck_sdk/aio/models/advisory_revive.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRevive(BaseModel): """ - AdvisoryRevive + advisory.Revive """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_rhel_cve.py b/vulncheck_sdk/aio/models/advisory_rhel_cve.py index 2888bbad..2f485d6d 100644 --- a/vulncheck_sdk/aio/models/advisory_rhel_cve.py +++ b/vulncheck_sdk/aio/models/advisory_rhel_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRhelCVE(BaseModel): """ - AdvisoryRhelCVE + advisory.RhelCVE """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_roche.py b/vulncheck_sdk/aio/models/advisory_roche.py index 83ac2894..7d9ae21d 100644 --- a/vulncheck_sdk/aio/models/advisory_roche.py +++ b/vulncheck_sdk/aio/models/advisory_roche.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRoche(BaseModel): """ - AdvisoryRoche + advisory.Roche """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_roche_cve.py b/vulncheck_sdk/aio/models/advisory_roche_cve.py index ba21de88..ed787a55 100644 --- a/vulncheck_sdk/aio/models/advisory_roche_cve.py +++ b/vulncheck_sdk/aio/models/advisory_roche_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRocheCVE(BaseModel): """ - AdvisoryRocheCVE + advisory.RocheCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_rockwell.py b/vulncheck_sdk/aio/models/advisory_rockwell.py index d133e3c8..18e19794 100644 --- a/vulncheck_sdk/aio/models/advisory_rockwell.py +++ b/vulncheck_sdk/aio/models/advisory_rockwell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRockwell(BaseModel): """ - AdvisoryRockwell + advisory.Rockwell """ # noqa: E501 affected_products: Optional[List[AdvisoryRockwellAffectedProduct]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_rockwell_affected_product.py b/vulncheck_sdk/aio/models/advisory_rockwell_affected_product.py index e0acce7b..39646b12 100644 --- a/vulncheck_sdk/aio/models/advisory_rockwell_affected_product.py +++ b/vulncheck_sdk/aio/models/advisory_rockwell_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockwellAffectedProduct(BaseModel): """ - AdvisoryRockwellAffectedProduct + advisory.RockwellAffectedProduct """ # noqa: E501 affected_catalog_number: Optional[StrictStr] = Field(default=None, alias="affectedCatalogNumber") affected_version: Optional[StrictStr] = Field(default=None, alias="affectedVersion") diff --git a/vulncheck_sdk/aio/models/advisory_rocky_advisory.py b/vulncheck_sdk/aio/models/advisory_rocky_advisory.py index 7b72627d..c93346c5 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRockyAdvisory(BaseModel): """ - AdvisoryRockyAdvisory + advisory.RockyAdvisory """ # noqa: E501 affected_products: Optional[List[StrictStr]] = Field(default=None, alias="affectedProducts") build_references: Optional[List[StrictStr]] = Field(default=None, alias="buildReferences") @@ -39,7 +39,7 @@ class AdvisoryRockyAdvisory(BaseModel): published_at: Optional[StrictStr] = Field(default=None, alias="publishedAt") reboot_suggested: Optional[StrictBool] = Field(default=None, alias="rebootSuggested") references: Optional[List[StrictStr]] = None - rpms: Optional[Dict[str, AdvisoryRockyVersion]] = None + rpms: Optional[Dict[str, AdvisoryRockyVersion]] = Field(default=None, description="advisory.RockyRpms") severity: Optional[StrictStr] = None short_code: Optional[StrictStr] = Field(default=None, alias="shortCode") solution: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_rocky_cve.py b/vulncheck_sdk/aio/models/advisory_rocky_cve.py index 9b13966d..0394ef94 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_cve.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyCve(BaseModel): """ - AdvisoryRockyCve + advisory.RockyCve """ # noqa: E501 cvss3_base_score: Optional[StrictStr] = Field(default=None, alias="cvss3BaseScore") cvss3_scoring_vector: Optional[StrictStr] = Field(default=None, alias="cvss3ScoringVector") diff --git a/vulncheck_sdk/aio/models/advisory_rocky_errata.py b/vulncheck_sdk/aio/models/advisory_rocky_errata.py index 75c9e5ec..93c7c4b8 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_errata.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_errata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryRockyErrata(BaseModel): """ - AdvisoryRockyErrata + advisory.RockyErrata """ # noqa: E501 advisory: Optional[AdvisoryRockyAdvisory] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_rocky_fix.py b/vulncheck_sdk/aio/models/advisory_rocky_fix.py index 9a35ffea..7792dd8f 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_fix.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyFix(BaseModel): """ - AdvisoryRockyFix + advisory.RockyFix """ # noqa: E501 description: Optional[StrictStr] = None source_by: Optional[StrictStr] = Field(default=None, alias="sourceBy") diff --git a/vulncheck_sdk/aio/models/advisory_rocky_package.py b/vulncheck_sdk/aio/models/advisory_rocky_package.py index ee883c84..4c7c9893 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_package.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyPackage(BaseModel): """ - AdvisoryRockyPackage + advisory.RockyPackage """ # noqa: E501 distro: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_rocky_version.py b/vulncheck_sdk/aio/models/advisory_rocky_version.py index 3e8cc845..b7297b5f 100644 --- a/vulncheck_sdk/aio/models/advisory_rocky_version.py +++ b/vulncheck_sdk/aio/models/advisory_rocky_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyVersion(BaseModel): """ - AdvisoryRockyVersion + advisory.RockyVersion """ # noqa: E501 nvras: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["nvras"] diff --git a/vulncheck_sdk/aio/models/advisory_rsync.py b/vulncheck_sdk/aio/models/advisory_rsync.py index a6d78e9b..b88c80e2 100644 --- a/vulncheck_sdk/aio/models/advisory_rsync.py +++ b/vulncheck_sdk/aio/models/advisory_rsync.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRsync(BaseModel): """ - AdvisoryRsync + advisory.Rsync """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ruckus.py b/vulncheck_sdk/aio/models/advisory_ruckus.py index 19998c80..60227007 100644 --- a/vulncheck_sdk/aio/models/advisory_ruckus.py +++ b/vulncheck_sdk/aio/models/advisory_ruckus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRuckus(BaseModel): """ - AdvisoryRuckus + advisory.Ruckus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_rustsec_advisory.py b/vulncheck_sdk/aio/models/advisory_rustsec_advisory.py index 2e44d93d..2af31f11 100644 --- a/vulncheck_sdk/aio/models/advisory_rustsec_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_rustsec_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRustsecAdvisory(BaseModel): """ - AdvisoryRustsecAdvisory + advisory.RustsecAdvisory """ # noqa: E501 advisory: Optional[AdvisoryRustsecFrontMatterAdvisory] = None affected: Optional[AdvisoryRustsecAffected] = None diff --git a/vulncheck_sdk/aio/models/advisory_rustsec_affected.py b/vulncheck_sdk/aio/models/advisory_rustsec_affected.py index 39f56155..9ef7d8f8 100644 --- a/vulncheck_sdk/aio/models/advisory_rustsec_affected.py +++ b/vulncheck_sdk/aio/models/advisory_rustsec_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRustsecAffected(BaseModel): """ - AdvisoryRustsecAffected + advisory.RustsecAffected """ # noqa: E501 arch: Optional[List[StrictStr]] = None functions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_advisory.py b/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_advisory.py index c094efdb..fa873474 100644 --- a/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,12 +25,12 @@ class AdvisoryRustsecFrontMatterAdvisory(BaseModel): """ - AdvisoryRustsecFrontMatterAdvisory + advisory.RustsecFrontMatterAdvisory """ # noqa: E501 aliases: Optional[List[StrictStr]] = Field(default=None, description="Vulnerability aliases, e.g. CVE IDs (optional but recommended) Request a CVE for your RustSec vulns: https://iwantacve.org/") categories: Optional[List[StrictStr]] = Field(default=None, description="Optional: Categories this advisory falls under. Valid categories are: \"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\" \"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"") cvss: Optional[StrictStr] = Field(default=None, description="Optional: a Common Vulnerability Scoring System score. More information can be found on the CVSS website, https://www.first.org/cvss/.") - var_date: Optional[StrictStr] = Field(default=None, description="Disclosure date of the advisory as an RFC 3339 date (mandatory)", alias="date") + date: Optional[StrictStr] = Field(default=None, description="Disclosure date of the advisory as an RFC 3339 date (mandatory)", alias="date") informational: Optional[StrictStr] = Field(default=None, description="Optional: Indicates the type of informational security advisory - \"unsound\" for soundness issues - \"unmaintained\" for crates that are no longer maintained - \"notice\" for other informational notices") keywords: Optional[List[StrictStr]] = Field(default=None, description="Freeform keywords which describe this vulnerability, similar to Cargo (optional)") package: Optional[StrictStr] = Field(default=None, description="Name of the affected crate (mandatory)") diff --git a/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_versions.py b/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_versions.py index a51f3c0c..f945df10 100644 --- a/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_versions.py +++ b/vulncheck_sdk/aio/models/advisory_rustsec_front_matter_versions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRustsecFrontMatterVersions(BaseModel): """ - AdvisoryRustsecFrontMatterVersions + advisory.RustsecFrontMatterVersions """ # noqa: E501 patched: Optional[List[StrictStr]] = None unaffected: Optional[List[StrictStr]] = Field(default=None, description="Versions which were never vulnerable (optional)") diff --git a/vulncheck_sdk/aio/models/advisory_sa_advisory.py b/vulncheck_sdk/aio/models/advisory_sa_advisory.py index 59f2cba8..09766359 100644 --- a/vulncheck_sdk/aio/models/advisory_sa_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_sa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySAAdvisory(BaseModel): """ - AdvisorySAAdvisory + advisory.SAAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_safran.py b/vulncheck_sdk/aio/models/advisory_safran.py index fad05a25..8e838833 100644 --- a/vulncheck_sdk/aio/models/advisory_safran.py +++ b/vulncheck_sdk/aio/models/advisory_safran.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySafran(BaseModel): """ - AdvisorySafran + advisory.Safran """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_saint_exploit.py b/vulncheck_sdk/aio/models/advisory_saint_exploit.py index dc3b97e4..7b6a2f21 100644 --- a/vulncheck_sdk/aio/models/advisory_saint_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_saint_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySaintExploit(BaseModel): """ - AdvisorySaintExploit + advisory.SaintExploit """ # noqa: E501 bid: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sales_force.py b/vulncheck_sdk/aio/models/advisory_sales_force.py index fb5826b4..5a8d0690 100644 --- a/vulncheck_sdk/aio/models/advisory_sales_force.py +++ b/vulncheck_sdk/aio/models/advisory_sales_force.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySalesForce(BaseModel): """ - AdvisorySalesForce + advisory.SalesForce """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_samba.py b/vulncheck_sdk/aio/models/advisory_samba.py index 147f7ce6..1f6dacad 100644 --- a/vulncheck_sdk/aio/models/advisory_samba.py +++ b/vulncheck_sdk/aio/models/advisory_samba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySamba(BaseModel): """ - AdvisorySamba + advisory.Samba """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sandisk.py b/vulncheck_sdk/aio/models/advisory_sandisk.py index 02acb36f..065a361d 100644 --- a/vulncheck_sdk/aio/models/advisory_sandisk.py +++ b/vulncheck_sdk/aio/models/advisory_sandisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySandisk(BaseModel): """ - AdvisorySandisk + advisory.Sandisk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sans_dshield.py b/vulncheck_sdk/aio/models/advisory_sans_dshield.py index 41be0124..a2235cf8 100644 --- a/vulncheck_sdk/aio/models/advisory_sans_dshield.py +++ b/vulncheck_sdk/aio/models/advisory_sans_dshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySansDshield(BaseModel): """ - AdvisorySansDshield + advisory.SansDshield """ # noqa: E501 count: Optional[StrictInt] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sap.py b/vulncheck_sdk/aio/models/advisory_sap.py index 0548ceca..65229c48 100644 --- a/vulncheck_sdk/aio/models/advisory_sap.py +++ b/vulncheck_sdk/aio/models/advisory_sap.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySAP(BaseModel): """ - AdvisorySAP + advisory.SAP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_schneider_cve.py b/vulncheck_sdk/aio/models/advisory_schneider_cve.py index e458a346..dfe2069b 100644 --- a/vulncheck_sdk/aio/models/advisory_schneider_cve.py +++ b/vulncheck_sdk/aio/models/advisory_schneider_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySchneiderCVE(BaseModel): """ - AdvisorySchneiderCVE + advisory.SchneiderCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score3: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_schneider_electric_advisory.py b/vulncheck_sdk/aio/models/advisory_schneider_electric_advisory.py index b7b0452f..af8fbc7b 100644 --- a/vulncheck_sdk/aio/models/advisory_schneider_electric_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_schneider_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySchneiderElectricAdvisory(BaseModel): """ - AdvisorySchneiderElectricAdvisory + advisory.SchneiderElectricAdvisory """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_schutzwerk.py b/vulncheck_sdk/aio/models/advisory_schutzwerk.py index 072ee887..643b366f 100644 --- a/vulncheck_sdk/aio/models/advisory_schutzwerk.py +++ b/vulncheck_sdk/aio/models/advisory_schutzwerk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySchutzwerk(BaseModel): """ - AdvisorySchutzwerk + advisory.Schutzwerk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_score_set.py b/vulncheck_sdk/aio/models/advisory_score_set.py deleted file mode 100644 index 3de08b7f..00000000 --- a/vulncheck_sdk/aio/models/advisory_score_set.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryScoreSet(BaseModel): - """ - AdvisoryScoreSet - """ # noqa: E501 - base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") - vector: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["baseScore", "vector"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "baseScore": obj.get("baseScore"), - "vector": obj.get("vector") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_sec_consult.py b/vulncheck_sdk/aio/models/advisory_sec_consult.py index b7ace5cf..0de24ee1 100644 --- a/vulncheck_sdk/aio/models/advisory_sec_consult.py +++ b/vulncheck_sdk/aio/models/advisory_sec_consult.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySECConsult(BaseModel): """ - AdvisorySECConsult + advisory.SECConsult """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sec_fix.py b/vulncheck_sdk/aio/models/advisory_sec_fix.py index 1a74c2d6..283b7121 100644 --- a/vulncheck_sdk/aio/models/advisory_sec_fix.py +++ b/vulncheck_sdk/aio/models/advisory_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySecFix(BaseModel): """ - AdvisorySecFix + advisory.SecFix """ # noqa: E501 arch: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_security_bulletin.py b/vulncheck_sdk/aio/models/advisory_security_bulletin.py index 61ccc1c4..86247f34 100644 --- a/vulncheck_sdk/aio/models/advisory_security_bulletin.py +++ b/vulncheck_sdk/aio/models/advisory_security_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisorySecurityBulletin(BaseModel): """ - AdvisorySecurityBulletin + advisory.SecurityBulletin """ # noqa: E501 acknowledgement: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = Field(default=None, alias="bulletinId") diff --git a/vulncheck_sdk/aio/models/advisory_security_lab.py b/vulncheck_sdk/aio/models/advisory_security_lab.py index e04aea1a..06852b33 100644 --- a/vulncheck_sdk/aio/models/advisory_security_lab.py +++ b/vulncheck_sdk/aio/models/advisory_security_lab.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySecurityLab(BaseModel): """ - AdvisorySecurityLab + advisory.SecurityLab """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_seebug_exploit.py b/vulncheck_sdk/aio/models/advisory_seebug_exploit.py index 261b5c2c..ff73984f 100644 --- a/vulncheck_sdk/aio/models/advisory_seebug_exploit.py +++ b/vulncheck_sdk/aio/models/advisory_seebug_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySeebugExploit(BaseModel): """ - AdvisorySeebugExploit + advisory.SeebugExploit """ # noqa: E501 author: Optional[StrictStr] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sel.py b/vulncheck_sdk/aio/models/advisory_sel.py index 6137bac0..9cded315 100644 --- a/vulncheck_sdk/aio/models/advisory_sel.py +++ b/vulncheck_sdk/aio/models/advisory_sel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySel(BaseModel): """ - AdvisorySel + advisory.Sel """ # noqa: E501 acknowledgement: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sentinel_one.py b/vulncheck_sdk/aio/models/advisory_sentinel_one.py index 9b43944e..e8ab3f39 100644 --- a/vulncheck_sdk/aio/models/advisory_sentinel_one.py +++ b/vulncheck_sdk/aio/models/advisory_sentinel_one.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySentinelOne(BaseModel): """ - AdvisorySentinelOne + advisory.SentinelOne """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_service_now.py b/vulncheck_sdk/aio/models/advisory_service_now.py index f7899b68..925a9ca3 100644 --- a/vulncheck_sdk/aio/models/advisory_service_now.py +++ b/vulncheck_sdk/aio/models/advisory_service_now.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryServiceNow(BaseModel): """ - AdvisoryServiceNow + advisory.ServiceNow """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_seven_zip.py b/vulncheck_sdk/aio/models/advisory_seven_zip.py index a5f7ab25..1fc68a43 100644 --- a/vulncheck_sdk/aio/models/advisory_seven_zip.py +++ b/vulncheck_sdk/aio/models/advisory_seven_zip.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySevenZip(BaseModel): """ - AdvisorySevenZip + advisory.SevenZip """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_severity.py b/vulncheck_sdk/aio/models/advisory_severity.py index f32f1b5f..cb079a6a 100644 --- a/vulncheck_sdk/aio/models/advisory_severity.py +++ b/vulncheck_sdk/aio/models/advisory_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySeverity(BaseModel): """ - AdvisorySeverity + advisory.Severity """ # noqa: E501 score: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_shadow_server_exploited_vulnerability.py b/vulncheck_sdk/aio/models/advisory_shadow_server_exploited_vulnerability.py index 78157fa0..6dddd807 100644 --- a/vulncheck_sdk/aio/models/advisory_shadow_server_exploited_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_shadow_server_exploited_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryShadowServerExploitedVulnerability(BaseModel): """ - AdvisoryShadowServerExploitedVulnerability + advisory.ShadowServerExploitedVulnerability """ # noqa: E501 cnvd: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_shielder.py b/vulncheck_sdk/aio/models/advisory_shielder.py index 6307b2fb..36da7f96 100644 --- a/vulncheck_sdk/aio/models/advisory_shielder.py +++ b/vulncheck_sdk/aio/models/advisory_shielder.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryShielder(BaseModel): """ - AdvisoryShielder + advisory.Shielder """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sick.py b/vulncheck_sdk/aio/models/advisory_sick.py index fc036b9d..c1e4218d 100644 --- a/vulncheck_sdk/aio/models/advisory_sick.py +++ b/vulncheck_sdk/aio/models/advisory_sick.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySick(BaseModel): """ - AdvisorySick + advisory.Sick """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_acknowledgments.py b/vulncheck_sdk/aio/models/advisory_siemens_acknowledgments.py index 15879a7a..bc413b82 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_acknowledgments.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_acknowledgments.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensAcknowledgments(BaseModel): """ - AdvisorySiemensAcknowledgments + advisory.SiemensAcknowledgments """ # noqa: E501 names: Optional[List[StrictStr]] = None organization: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_advisory.py b/vulncheck_sdk/aio/models/advisory_siemens_advisory.py index 2eeed2c2..5587aa5b 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensAdvisory(BaseModel): """ - AdvisorySiemensAdvisory + advisory.SiemensAdvisory """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_branch.py b/vulncheck_sdk/aio/models/advisory_siemens_branch.py index 531c98e8..4c281bd2 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_branch.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensBranch(BaseModel): """ - AdvisorySiemensBranch + advisory.SiemensBranch """ # noqa: E501 branches: Optional[List[AdvisorySiemensSubBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_cvssv3.py b/vulncheck_sdk/aio/models/advisory_siemens_cvssv3.py index 8f11afc3..af4dbcda 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_cvssv3.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensCVSSV3(BaseModel): """ - AdvisorySiemensCVSSV3 + advisory.SiemensCVSSV3 """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") base_severity: Optional[StrictStr] = Field(default=None, alias="baseSeverity") diff --git a/vulncheck_sdk/aio/models/advisory_siemens_cwe.py b/vulncheck_sdk/aio/models/advisory_siemens_cwe.py index b4cdd721..76ed2a12 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_cwe.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensCWE(BaseModel): """ - AdvisorySiemensCWE + advisory.SiemensCWE """ # noqa: E501 id: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_distribution.py b/vulncheck_sdk/aio/models/advisory_siemens_distribution.py index 2b078a57..c343feda 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_distribution.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_distribution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensDistribution(BaseModel): """ - AdvisorySiemensDistribution + advisory.SiemensDistribution """ # noqa: E501 text: Optional[StrictStr] = None tlp: Optional[AdvisorySiemensTLP] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_document.py b/vulncheck_sdk/aio/models/advisory_siemens_document.py index 2e73662e..07e868c7 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_document.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_document.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisorySiemensDocument(BaseModel): """ - AdvisorySiemensDocument + advisory.SiemensDocument """ # noqa: E501 acknowledgments: Optional[List[AdvisorySiemensAcknowledgments]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_engine.py b/vulncheck_sdk/aio/models/advisory_siemens_engine.py index f2d6d12d..03df1519 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_engine.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensEngine(BaseModel): """ - AdvisorySiemensEngine + advisory.SiemensEngine """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_generator.py b/vulncheck_sdk/aio/models/advisory_siemens_generator.py index db5bc05c..3a90644c 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_generator.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_generator.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensGenerator(BaseModel): """ - AdvisorySiemensGenerator + advisory.SiemensGenerator """ # noqa: E501 engine: Optional[AdvisorySiemensEngine] = None __properties: ClassVar[List[str]] = ["engine"] diff --git a/vulncheck_sdk/aio/models/advisory_siemens_notes.py b/vulncheck_sdk/aio/models/advisory_siemens_notes.py index ad04f91d..5390229d 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_notes.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensNotes(BaseModel): """ - AdvisorySiemensNotes + advisory.SiemensNotes """ # noqa: E501 category: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_product.py b/vulncheck_sdk/aio/models/advisory_siemens_product.py index 7b55558e..576cc7bd 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_product.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensProduct(BaseModel): """ - AdvisorySiemensProduct + advisory.SiemensProduct """ # noqa: E501 name: Optional[StrictStr] = None product_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_product_identification_helper.py b/vulncheck_sdk/aio/models/advisory_siemens_product_identification_helper.py index 867c5e4d..8bcfa030 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_product_identification_helper.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_product_identification_helper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensProductIdentificationHelper(BaseModel): """ - AdvisorySiemensProductIdentificationHelper + advisory.SiemensProductIdentificationHelper """ # noqa: E501 model_numbers: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["model_numbers"] diff --git a/vulncheck_sdk/aio/models/advisory_siemens_product_status.py b/vulncheck_sdk/aio/models/advisory_siemens_product_status.py index 29563734..52bc96f4 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_product_status.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensProductStatus(BaseModel): """ - AdvisorySiemensProductStatus + advisory.SiemensProductStatus """ # noqa: E501 known_affected: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["known_affected"] diff --git a/vulncheck_sdk/aio/models/advisory_siemens_product_tree.py b/vulncheck_sdk/aio/models/advisory_siemens_product_tree.py index a7a8cffa..29fad8ff 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_product_tree.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensProductTree(BaseModel): """ - AdvisorySiemensProductTree + advisory.SiemensProductTree """ # noqa: E501 branches: Optional[List[AdvisorySiemensBranch]] = None __properties: ClassVar[List[str]] = ["branches"] diff --git a/vulncheck_sdk/aio/models/advisory_siemens_publisher.py b/vulncheck_sdk/aio/models/advisory_siemens_publisher.py index db99d09d..bc8b2f27 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_publisher.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensPublisher(BaseModel): """ - AdvisorySiemensPublisher + advisory.SiemensPublisher """ # noqa: E501 category: Optional[StrictStr] = None contact_details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_references.py b/vulncheck_sdk/aio/models/advisory_siemens_references.py index 04e5411d..1f61bf83 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_references.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensReferences(BaseModel): """ - AdvisorySiemensReferences + advisory.SiemensReferences """ # noqa: E501 category: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_remediation.py b/vulncheck_sdk/aio/models/advisory_siemens_remediation.py index 67247d2f..f369af9b 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_remediation.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensRemediation(BaseModel): """ - AdvisorySiemensRemediation + advisory.SiemensRemediation """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_revision_history.py b/vulncheck_sdk/aio/models/advisory_siemens_revision_history.py index 77a2dd0e..da8348b8 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_revision_history.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisorySiemensRevisionHistory(BaseModel): """ - AdvisorySiemensRevisionHistory + advisory.SiemensRevisionHistory """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") legacy_version: Optional[StrictStr] = None number: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_score.py b/vulncheck_sdk/aio/models/advisory_siemens_score.py index bf632328..bbaa2d25 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_score.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensScore(BaseModel): """ - AdvisorySiemensScore + advisory.SiemensScore """ # noqa: E501 cvss_v3: Optional[AdvisorySiemensCVSSV3] = None products: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_sub_branch.py b/vulncheck_sdk/aio/models/advisory_siemens_sub_branch.py index f05f0465..bd4f5ad3 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_sub_branch.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensSubBranch(BaseModel): """ - AdvisorySiemensSubBranch + advisory.SiemensSubBranch """ # noqa: E501 branches: Optional[List[AdvisorySiemensSubSubBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_sub_sub_branch.py b/vulncheck_sdk/aio/models/advisory_siemens_sub_sub_branch.py index ed4a3a12..4d6c612d 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_sub_sub_branch.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_sub_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensSubSubBranch(BaseModel): """ - AdvisorySiemensSubSubBranch + advisory.SiemensSubSubBranch """ # noqa: E501 category: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_tlp.py b/vulncheck_sdk/aio/models/advisory_siemens_tlp.py index f32dcba7..8a6238b5 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_tlp.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_tlp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensTLP(BaseModel): """ - AdvisorySiemensTLP + advisory.SiemensTLP """ # noqa: E501 label: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["label"] diff --git a/vulncheck_sdk/aio/models/advisory_siemens_tracking.py b/vulncheck_sdk/aio/models/advisory_siemens_tracking.py index 253e40b4..a0eec18c 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_tracking.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisorySiemensTracking(BaseModel): """ - AdvisorySiemensTracking + advisory.SiemensTracking """ # noqa: E501 current_release_date: Optional[StrictStr] = None generator: Optional[AdvisorySiemensGenerator] = None diff --git a/vulncheck_sdk/aio/models/advisory_siemens_vulnerability.py b/vulncheck_sdk/aio/models/advisory_siemens_vulnerability.py index 5e321257..805f6400 100644 --- a/vulncheck_sdk/aio/models/advisory_siemens_vulnerability.py +++ b/vulncheck_sdk/aio/models/advisory_siemens_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisorySiemensVulnerability(BaseModel): """ - AdvisorySiemensVulnerability + advisory.SiemensVulnerability """ # noqa: E501 cve: Optional[StrictStr] = None cwe: Optional[AdvisorySiemensCWE] = None diff --git a/vulncheck_sdk/aio/models/advisory_sierra_wireless.py b/vulncheck_sdk/aio/models/advisory_sierra_wireless.py index a4bb7dbf..af52ab75 100644 --- a/vulncheck_sdk/aio/models/advisory_sierra_wireless.py +++ b/vulncheck_sdk/aio/models/advisory_sierra_wireless.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySierraWireless(BaseModel): """ - AdvisorySierraWireless + advisory.SierraWireless """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sigma_rule.py b/vulncheck_sdk/aio/models/advisory_sigma_rule.py index 6e3274d1..49d6034a 100644 --- a/vulncheck_sdk/aio/models/advisory_sigma_rule.py +++ b/vulncheck_sdk/aio/models/advisory_sigma_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySigmaRule(BaseModel): """ - AdvisorySigmaRule + advisory.SigmaRule """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sigma_rule_rule.py b/vulncheck_sdk/aio/models/advisory_sigma_rule_rule.py index e5983b1b..65dc197a 100644 --- a/vulncheck_sdk/aio/models/advisory_sigma_rule_rule.py +++ b/vulncheck_sdk/aio/models/advisory_sigma_rule_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,10 +27,10 @@ class AdvisorySigmaRuleRule(BaseModel): """ - AdvisorySigmaRuleRule + advisory.SigmaRuleRule """ # noqa: E501 author: Optional[StrictStr] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[StrictStr] = None detection: Optional[Dict[str, Any]] = None false_positives: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sing_cert.py b/vulncheck_sdk/aio/models/advisory_sing_cert.py index 89ff35b9..c68b75b3 100644 --- a/vulncheck_sdk/aio/models/advisory_sing_cert.py +++ b/vulncheck_sdk/aio/models/advisory_sing_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySingCert(BaseModel): """ - AdvisorySingCert + advisory.SingCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sitecore.py b/vulncheck_sdk/aio/models/advisory_sitecore.py index 8e79e681..7bf688cd 100644 --- a/vulncheck_sdk/aio/models/advisory_sitecore.py +++ b/vulncheck_sdk/aio/models/advisory_sitecore.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySitecore(BaseModel): """ - AdvisorySitecore + advisory.Sitecore """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_slackware.py b/vulncheck_sdk/aio/models/advisory_slackware.py index dbe1cafa..84457745 100644 --- a/vulncheck_sdk/aio/models/advisory_slackware.py +++ b/vulncheck_sdk/aio/models/advisory_slackware.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySlackware(BaseModel): """ - AdvisorySlackware + advisory.Slackware """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_software_update.py b/vulncheck_sdk/aio/models/advisory_software_update.py index 4e7b4690..78427e47 100644 --- a/vulncheck_sdk/aio/models/advisory_software_update.py +++ b/vulncheck_sdk/aio/models/advisory_software_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySoftwareUpdate(BaseModel): """ - AdvisorySoftwareUpdate + advisory.SoftwareUpdate """ # noqa: E501 affected_version: Optional[StrictStr] = Field(default=None, alias="affectedVersion") cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_solar_winds_advisory.py b/vulncheck_sdk/aio/models/advisory_solar_winds_advisory.py index 42fa1f3f..34b0bf8c 100644 --- a/vulncheck_sdk/aio/models/advisory_solar_winds_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_solar_winds_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySolarWindsAdvisory(BaseModel): """ - AdvisorySolarWindsAdvisory + advisory.SolarWindsAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_solr.py b/vulncheck_sdk/aio/models/advisory_solr.py index 03107b11..4d5b17f0 100644 --- a/vulncheck_sdk/aio/models/advisory_solr.py +++ b/vulncheck_sdk/aio/models/advisory_solr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySolr(BaseModel): """ - AdvisorySolr + advisory.Solr """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sonatype.py b/vulncheck_sdk/aio/models/advisory_sonatype.py index 1705762e..99a96b33 100644 --- a/vulncheck_sdk/aio/models/advisory_sonatype.py +++ b/vulncheck_sdk/aio/models/advisory_sonatype.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySonatype(BaseModel): """ - AdvisorySonatype + advisory.Sonatype """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_sonic_wall_advisory.py b/vulncheck_sdk/aio/models/advisory_sonic_wall_advisory.py index 181d4103..c5a5606b 100644 --- a/vulncheck_sdk/aio/models/advisory_sonic_wall_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_sonic_wall_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySonicWallAdvisory(BaseModel): """ - AdvisorySonicWallAdvisory + advisory.SonicWallAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_products: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_spacelabs_healthcare_advisory.py b/vulncheck_sdk/aio/models/advisory_spacelabs_healthcare_advisory.py index 33a8ca65..5d5c0f34 100644 --- a/vulncheck_sdk/aio/models/advisory_spacelabs_healthcare_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_spacelabs_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySpacelabsHealthcareAdvisory(BaseModel): """ - AdvisorySpacelabsHealthcareAdvisory + advisory.SpacelabsHealthcareAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_splunk.py b/vulncheck_sdk/aio/models/advisory_splunk.py index 9c7ddf02..8fa1743f 100644 --- a/vulncheck_sdk/aio/models/advisory_splunk.py +++ b/vulncheck_sdk/aio/models/advisory_splunk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySplunk(BaseModel): """ - AdvisorySplunk + advisory.Splunk """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_products: Optional[List[AdvisorySplunkProduct]] = None diff --git a/vulncheck_sdk/aio/models/advisory_splunk_product.py b/vulncheck_sdk/aio/models/advisory_splunk_product.py index f3c4109c..72381881 100644 --- a/vulncheck_sdk/aio/models/advisory_splunk_product.py +++ b/vulncheck_sdk/aio/models/advisory_splunk_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySplunkProduct(BaseModel): """ - AdvisorySplunkProduct + advisory.SplunkProduct """ # noqa: E501 affected_version: Optional[StrictStr] = None component: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_spring.py b/vulncheck_sdk/aio/models/advisory_spring.py index 1ec206ac..8e9b9ef0 100644 --- a/vulncheck_sdk/aio/models/advisory_spring.py +++ b/vulncheck_sdk/aio/models/advisory_spring.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySpring(BaseModel): """ - AdvisorySpring + advisory.Spring """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ssa_source.py b/vulncheck_sdk/aio/models/advisory_ssa_source.py index 6789bedd..826bc512 100644 --- a/vulncheck_sdk/aio/models/advisory_ssa_source.py +++ b/vulncheck_sdk/aio/models/advisory_ssa_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisorySSASource(BaseModel): """ - AdvisorySSASource + advisory.SSASource """ # noqa: E501 document: Optional[AdvisorySiemensDocument] = None product_tree: Optional[AdvisorySiemensProductTree] = None diff --git a/vulncheck_sdk/aio/models/advisory_ssd_advisory.py b/vulncheck_sdk/aio/models/advisory_ssd_advisory.py index 00186b70..ae3e9eaf 100644 --- a/vulncheck_sdk/aio/models/advisory_ssd_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_ssd_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySSDAdvisory(BaseModel): """ - AdvisorySSDAdvisory + advisory.SSDAdvisory """ # noqa: E501 analysis: Optional[StrictStr] = None credit: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_status.py b/vulncheck_sdk/aio/models/advisory_status.py deleted file mode 100644 index 12b62e4a..00000000 --- a/vulncheck_sdk/aio/models/advisory_status.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryStatus(BaseModel): - """ - AdvisoryStatus - """ # noqa: E501 - product_id: Optional[List[StrictStr]] = Field(default=None, alias="productID") - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["productID", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productID": obj.get("productID"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_stormshield.py b/vulncheck_sdk/aio/models/advisory_stormshield.py index 61519e63..8ba86e90 100644 --- a/vulncheck_sdk/aio/models/advisory_stormshield.py +++ b/vulncheck_sdk/aio/models/advisory_stormshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryStormshield(BaseModel): """ - AdvisoryStormshield + advisory.Stormshield """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_stryker_advisory.py b/vulncheck_sdk/aio/models/advisory_stryker_advisory.py index 4a6c1aec..663a47e6 100644 --- a/vulncheck_sdk/aio/models/advisory_stryker_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_stryker_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryStrykerAdvisory(BaseModel): """ - AdvisoryStrykerAdvisory + advisory.StrykerAdvisory """ # noqa: E501 affected_components: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_sudo.py b/vulncheck_sdk/aio/models/advisory_sudo.py index ba1349f4..76f4c9f5 100644 --- a/vulncheck_sdk/aio/models/advisory_sudo.py +++ b/vulncheck_sdk/aio/models/advisory_sudo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySudo(BaseModel): """ - AdvisorySudo + advisory.Sudo """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_suse_security.py b/vulncheck_sdk/aio/models/advisory_suse_security.py index 9657885a..b504cc7a 100644 --- a/vulncheck_sdk/aio/models/advisory_suse_security.py +++ b/vulncheck_sdk/aio/models/advisory_suse_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySuseSecurity(BaseModel): """ - AdvisorySuseSecurity + advisory.SuseSecurity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_swisslog_healthcare_advisory.py b/vulncheck_sdk/aio/models/advisory_swisslog_healthcare_advisory.py index 72518504..7b3579d8 100644 --- a/vulncheck_sdk/aio/models/advisory_swisslog_healthcare_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_swisslog_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySwisslogHealthcareAdvisory(BaseModel): """ - AdvisorySwisslogHealthcareAdvisory + advisory.SwisslogHealthcareAdvisory """ # noqa: E501 affected_components: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_symfony.py b/vulncheck_sdk/aio/models/advisory_symfony.py index 9e96dcd0..a5ef47b4 100644 --- a/vulncheck_sdk/aio/models/advisory_symfony.py +++ b/vulncheck_sdk/aio/models/advisory_symfony.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySymfony(BaseModel): """ - AdvisorySymfony + advisory.Symfony """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_synacktiv.py b/vulncheck_sdk/aio/models/advisory_synacktiv.py index 921a5806..781c9e62 100644 --- a/vulncheck_sdk/aio/models/advisory_synacktiv.py +++ b/vulncheck_sdk/aio/models/advisory_synacktiv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySynacktiv(BaseModel): """ - AdvisorySynacktiv + advisory.Synacktiv """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_syncro_soft.py b/vulncheck_sdk/aio/models/advisory_syncro_soft.py index 49ef9fad..9d3f6bb1 100644 --- a/vulncheck_sdk/aio/models/advisory_syncro_soft.py +++ b/vulncheck_sdk/aio/models/advisory_syncro_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySyncroSoft(BaseModel): """ - AdvisorySyncroSoft + advisory.SyncroSoft """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_synology.py b/vulncheck_sdk/aio/models/advisory_synology.py index b0cefc44..2e66e392 100644 --- a/vulncheck_sdk/aio/models/advisory_synology.py +++ b/vulncheck_sdk/aio/models/advisory_synology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySynology(BaseModel): """ - AdvisorySynology + advisory.Synology """ # noqa: E501 affected_products: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_syss.py b/vulncheck_sdk/aio/models/advisory_syss.py index b5dc1037..5544480d 100644 --- a/vulncheck_sdk/aio/models/advisory_syss.py +++ b/vulncheck_sdk/aio/models/advisory_syss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySyss(BaseModel): """ - AdvisorySyss + advisory.Syss """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_tailscale.py b/vulncheck_sdk/aio/models/advisory_tailscale.py index 6e401667..91524dd0 100644 --- a/vulncheck_sdk/aio/models/advisory_tailscale.py +++ b/vulncheck_sdk/aio/models/advisory_tailscale.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTailscale(BaseModel): """ - AdvisoryTailscale + advisory.Tailscale """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_talos_advisory.py b/vulncheck_sdk/aio/models/advisory_talos_advisory.py index c63fc9ad..c1447366 100644 --- a/vulncheck_sdk/aio/models/advisory_talos_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_talos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTalosAdvisory(BaseModel): """ - AdvisoryTalosAdvisory + advisory.TalosAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_team_viewer.py b/vulncheck_sdk/aio/models/advisory_team_viewer.py index 75f47af2..ef5b5236 100644 --- a/vulncheck_sdk/aio/models/advisory_team_viewer.py +++ b/vulncheck_sdk/aio/models/advisory_team_viewer.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTeamViewer(BaseModel): """ - AdvisoryTeamViewer + advisory.TeamViewer """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_tenable_research_advisory.py b/vulncheck_sdk/aio/models/advisory_tenable_research_advisory.py index 562ca855..c9f5c15d 100644 --- a/vulncheck_sdk/aio/models/advisory_tenable_research_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_tenable_research_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTenableResearchAdvisory(BaseModel): """ - AdvisoryTenableResearchAdvisory + advisory.TenableResearchAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_tencent.py b/vulncheck_sdk/aio/models/advisory_tencent.py index 7620eebd..0e8f24ff 100644 --- a/vulncheck_sdk/aio/models/advisory_tencent.py +++ b/vulncheck_sdk/aio/models/advisory_tencent.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTencent(BaseModel): """ - AdvisoryTencent + advisory.Tencent """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_thales.py b/vulncheck_sdk/aio/models/advisory_thales.py index b2f8848b..d74817df 100644 --- a/vulncheck_sdk/aio/models/advisory_thales.py +++ b/vulncheck_sdk/aio/models/advisory_thales.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThales(BaseModel): """ - AdvisoryThales + advisory.Thales """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_the_missing_link.py b/vulncheck_sdk/aio/models/advisory_the_missing_link.py index 6c76e335..d8be1ec1 100644 --- a/vulncheck_sdk/aio/models/advisory_the_missing_link.py +++ b/vulncheck_sdk/aio/models/advisory_the_missing_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTheMissingLink(BaseModel): """ - AdvisoryTheMissingLink + advisory.TheMissingLink """ # noqa: E501 affected_versions: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_thermo_fisher.py b/vulncheck_sdk/aio/models/advisory_thermo_fisher.py index c2a98361..7bacd602 100644 --- a/vulncheck_sdk/aio/models/advisory_thermo_fisher.py +++ b/vulncheck_sdk/aio/models/advisory_thermo_fisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThermoFisher(BaseModel): """ - AdvisoryThermoFisher + advisory.ThermoFisher """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_threat.py b/vulncheck_sdk/aio/models/advisory_threat.py deleted file mode 100644 index dab6ea5e..00000000 --- a/vulncheck_sdk/aio/models/advisory_threat.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryThreat(BaseModel): - """ - AdvisoryThreat - """ # noqa: E501 - severity: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["severity", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "severity": obj.get("severity"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_threat_actor_with_external_objects.py b/vulncheck_sdk/aio/models/advisory_threat_actor_with_external_objects.py index 185ef5b3..cfb91412 100644 --- a/vulncheck_sdk/aio/models/advisory_threat_actor_with_external_objects.py +++ b/vulncheck_sdk/aio/models/advisory_threat_actor_with_external_objects.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -35,7 +35,7 @@ class AdvisoryThreatActorWithExternalObjects(BaseModel): """ - AdvisoryThreatActorWithExternalObjects + advisory.ThreatActorWithExternalObjects """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/aio/models/advisory_threat_data.py b/vulncheck_sdk/aio/models/advisory_threat_data.py index dc57b9b7..6aeb2334 100644 --- a/vulncheck_sdk/aio/models/advisory_threat_data.py +++ b/vulncheck_sdk/aio/models/advisory_threat_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThreatData(BaseModel): """ - AdvisoryThreatData + advisory.ThreatData """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ti.py b/vulncheck_sdk/aio/models/advisory_ti.py index 1a65cde4..74d33622 100644 --- a/vulncheck_sdk/aio/models/advisory_ti.py +++ b/vulncheck_sdk/aio/models/advisory_ti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTI(BaseModel): """ - AdvisoryTI + advisory.TI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_tibco.py b/vulncheck_sdk/aio/models/advisory_tibco.py index 3f9e1ae2..c9a5b1f5 100644 --- a/vulncheck_sdk/aio/models/advisory_tibco.py +++ b/vulncheck_sdk/aio/models/advisory_tibco.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTibco(BaseModel): """ - AdvisoryTibco + advisory.Tibco """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_timeline.py b/vulncheck_sdk/aio/models/advisory_timeline.py index 0183b081..7a9ca37e 100644 --- a/vulncheck_sdk/aio/models/advisory_timeline.py +++ b/vulncheck_sdk/aio/models/advisory_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTimeline(BaseModel): """ - AdvisoryTimeline + advisory.Timeline """ # noqa: E501 lang: Optional[StrictStr] = None time: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time") diff --git a/vulncheck_sdk/aio/models/advisory_tool.py b/vulncheck_sdk/aio/models/advisory_tool.py index 8e4302a8..52525075 100644 --- a/vulncheck_sdk/aio/models/advisory_tool.py +++ b/vulncheck_sdk/aio/models/advisory_tool.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryTool(BaseModel): """ - AdvisoryTool + advisory.Tool """ # noqa: E501 name: Optional[StrictStr] = None references: Optional[List[AdvisoryToolRef]] = None diff --git a/vulncheck_sdk/aio/models/advisory_tool_ref.py b/vulncheck_sdk/aio/models/advisory_tool_ref.py index 7c821aee..792e4995 100644 --- a/vulncheck_sdk/aio/models/advisory_tool_ref.py +++ b/vulncheck_sdk/aio/models/advisory_tool_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryToolRef(BaseModel): """ - AdvisoryToolRef + advisory.ToolRef """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_tp_link.py b/vulncheck_sdk/aio/models/advisory_tp_link.py index 9c4d2e86..dab0c2ed 100644 --- a/vulncheck_sdk/aio/models/advisory_tp_link.py +++ b/vulncheck_sdk/aio/models/advisory_tp_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTPLink(BaseModel): """ - AdvisoryTPLink + advisory.TPLink """ # noqa: E501 bulletin_id: Optional[StrictInt] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_tracking.py b/vulncheck_sdk/aio/models/advisory_tracking.py index 58f1d2a8..d5855cd8 100644 --- a/vulncheck_sdk/aio/models/advisory_tracking.py +++ b/vulncheck_sdk/aio/models/advisory_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryTracking(BaseModel): """ - AdvisoryTracking + advisory.Tracking """ # noqa: E501 current_release_date: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_tracking_id.py b/vulncheck_sdk/aio/models/advisory_tracking_id.py index 60f9937e..f377b3ec 100644 --- a/vulncheck_sdk/aio/models/advisory_tracking_id.py +++ b/vulncheck_sdk/aio/models/advisory_tracking_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrackingID(BaseModel): """ - AdvisoryTrackingID + advisory.TrackingID """ # noqa: E501 system_name: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_trane_technology.py b/vulncheck_sdk/aio/models/advisory_trane_technology.py index fff5f1fa..40d18488 100644 --- a/vulncheck_sdk/aio/models/advisory_trane_technology.py +++ b/vulncheck_sdk/aio/models/advisory_trane_technology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTraneTechnology(BaseModel): """ - AdvisoryTraneTechnology + advisory.TraneTechnology """ # noqa: E501 brand: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_trend_micro.py b/vulncheck_sdk/aio/models/advisory_trend_micro.py index eb8844c5..02d610c1 100644 --- a/vulncheck_sdk/aio/models/advisory_trend_micro.py +++ b/vulncheck_sdk/aio/models/advisory_trend_micro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrendMicro(BaseModel): """ - AdvisoryTrendMicro + advisory.TrendMicro """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_triage_notes.py b/vulncheck_sdk/aio/models/advisory_triage_notes.py index fd8638a0..5cf15117 100644 --- a/vulncheck_sdk/aio/models/advisory_triage_notes.py +++ b/vulncheck_sdk/aio/models/advisory_triage_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTriageNotes(BaseModel): """ - AdvisoryTriageNotes + advisory.TriageNotes """ # noqa: E501 references: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["references"] diff --git a/vulncheck_sdk/aio/models/advisory_trustwave.py b/vulncheck_sdk/aio/models/advisory_trustwave.py index 36430c59..7099a44f 100644 --- a/vulncheck_sdk/aio/models/advisory_trustwave.py +++ b/vulncheck_sdk/aio/models/advisory_trustwave.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrustwave(BaseModel): """ - AdvisoryTrustwave + advisory.Trustwave """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_tw_cert_advisory.py b/vulncheck_sdk/aio/models/advisory_tw_cert_advisory.py index 2e742b3d..7596f3dd 100644 --- a/vulncheck_sdk/aio/models/advisory_tw_cert_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_tw_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTWCertAdvisory(BaseModel): """ - AdvisoryTWCertAdvisory + advisory.TWCertAdvisory """ # noqa: E501 affected_cn: Optional[StrictStr] = None affected_en: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ubiquiti.py b/vulncheck_sdk/aio/models/advisory_ubiquiti.py index 5c4e1f2b..0db334e2 100644 --- a/vulncheck_sdk/aio/models/advisory_ubiquiti.py +++ b/vulncheck_sdk/aio/models/advisory_ubiquiti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUbiquiti(BaseModel): """ - AdvisoryUbiquiti + advisory.Ubiquiti """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_ubuntu_cve.py b/vulncheck_sdk/aio/models/advisory_ubuntu_cve.py index 6d14f57f..23c0f583 100644 --- a/vulncheck_sdk/aio/models/advisory_ubuntu_cve.py +++ b/vulncheck_sdk/aio/models/advisory_ubuntu_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryUbuntuCVE(BaseModel): """ - AdvisoryUbuntuCVE + advisory.UbuntuCVE """ # noqa: E501 affected_packages: Optional[List[AdvisoryAffectedUbuntuPackage]] = None cve: Optional[List[StrictStr]] = Field(default=None, description="Candidate") diff --git a/vulncheck_sdk/aio/models/advisory_ubuntu_package_release_status.py b/vulncheck_sdk/aio/models/advisory_ubuntu_package_release_status.py index 8b86f99f..905e7b5e 100644 --- a/vulncheck_sdk/aio/models/advisory_ubuntu_package_release_status.py +++ b/vulncheck_sdk/aio/models/advisory_ubuntu_package_release_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUbuntuPackageReleaseStatus(BaseModel): """ - AdvisoryUbuntuPackageReleaseStatus + advisory.UbuntuPackageReleaseStatus """ # noqa: E501 affected: Optional[StrictBool] = None fixed: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/advisory_unify.py b/vulncheck_sdk/aio/models/advisory_unify.py index 1450508f..b51b5f35 100644 --- a/vulncheck_sdk/aio/models/advisory_unify.py +++ b/vulncheck_sdk/aio/models/advisory_unify.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUnify(BaseModel): """ - AdvisoryUnify + advisory.Unify """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_unisoc.py b/vulncheck_sdk/aio/models/advisory_unisoc.py index 3ddc6213..dca799a8 100644 --- a/vulncheck_sdk/aio/models/advisory_unisoc.py +++ b/vulncheck_sdk/aio/models/advisory_unisoc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUnisoc(BaseModel): """ - AdvisoryUnisoc + advisory.Unisoc """ # noqa: E501 access_vector: Optional[StrictStr] = None affected_chipsets: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_update.py b/vulncheck_sdk/aio/models/advisory_update.py index 1ef80b6d..ba55b489 100644 --- a/vulncheck_sdk/aio/models/advisory_update.py +++ b/vulncheck_sdk/aio/models/advisory_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_package import AdvisoryPackage from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference from typing import Optional, Set @@ -28,13 +27,13 @@ class AdvisoryUpdate(BaseModel): """ - AdvisoryUpdate + advisory.Update """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[AdvisoryDateTime] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="advisory.DateTime") os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[AdvisoryPackage]] = None @@ -42,7 +41,7 @@ class AdvisoryUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[AdvisoryDateTime] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="advisory.DateTime") __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": AdvisoryDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [AdvisoryPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": AdvisoryDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_usd.py b/vulncheck_sdk/aio/models/advisory_usd.py index e8ab1ba1..3d0cdea1 100644 --- a/vulncheck_sdk/aio/models/advisory_usd.py +++ b/vulncheck_sdk/aio/models/advisory_usd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUSD(BaseModel): """ - AdvisoryUSD + advisory.USD """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_usom_advisory.py b/vulncheck_sdk/aio/models/advisory_usom_advisory.py index 2935b532..4a0eb22f 100644 --- a/vulncheck_sdk/aio/models/advisory_usom_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_usom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUSOMAdvisory(BaseModel): """ - AdvisoryUSOMAdvisory + advisory.USOMAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_v3_acceptance_level.py b/vulncheck_sdk/aio/models/advisory_v3_acceptance_level.py index be5c0b01..f711903c 100644 --- a/vulncheck_sdk/aio/models/advisory_v3_acceptance_level.py +++ b/vulncheck_sdk/aio/models/advisory_v3_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryV3AcceptanceLevel(BaseModel): """ - AdvisoryV3AcceptanceLevel + advisory.V3AcceptanceLevel """ # noqa: E501 description: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/aio/models/advisory_van_dyke.py b/vulncheck_sdk/aio/models/advisory_van_dyke.py index ef6aeef8..726cd466 100644 --- a/vulncheck_sdk/aio/models/advisory_van_dyke.py +++ b/vulncheck_sdk/aio/models/advisory_van_dyke.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVanDyke(BaseModel): """ - AdvisoryVanDyke + advisory.VanDyke """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vapid_labs_advisory.py b/vulncheck_sdk/aio/models/advisory_vapid_labs_advisory.py index 178342aa..b563a767 100644 --- a/vulncheck_sdk/aio/models/advisory_vapid_labs_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_vapid_labs_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVapidLabsAdvisory(BaseModel): """ - AdvisoryVapidLabsAdvisory + advisory.VapidLabsAdvisory """ # noqa: E501 author: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vc_vulnerable_cpes.py b/vulncheck_sdk/aio/models/advisory_vc_vulnerable_cpes.py index 09969b4d..7691f0a5 100644 --- a/vulncheck_sdk/aio/models/advisory_vc_vulnerable_cpes.py +++ b/vulncheck_sdk/aio/models/advisory_vc_vulnerable_cpes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVCVulnerableCPEs(BaseModel): """ - AdvisoryVCVulnerableCPEs + advisory.VCVulnerableCPEs """ # noqa: E501 cve: Optional[StrictStr] = None unrolled: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vccpe_dictionary.py b/vulncheck_sdk/aio/models/advisory_vccpe_dictionary.py index 9ebf0291..4192204b 100644 --- a/vulncheck_sdk/aio/models/advisory_vccpe_dictionary.py +++ b/vulncheck_sdk/aio/models/advisory_vccpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVCCPEDictionary(BaseModel): """ - AdvisoryVCCPEDictionary + advisory.VCCPEDictionary """ # noqa: E501 base_cpe: Optional[StrictStr] = Field(default=None, alias="baseCPE") versions: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vde_advisory.py b/vulncheck_sdk/aio/models/advisory_vde_advisory.py index c1d6a57d..fecd9f33 100644 --- a/vulncheck_sdk/aio/models/advisory_vde_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_vde_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVDEAdvisory(BaseModel): """ - AdvisoryVDEAdvisory + advisory.VDEAdvisory """ # noqa: E501 csaf_json: Optional[AdvisoryCSAF] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_veeam.py b/vulncheck_sdk/aio/models/advisory_veeam.py index 715ed747..1c2dbbbe 100644 --- a/vulncheck_sdk/aio/models/advisory_veeam.py +++ b/vulncheck_sdk/aio/models/advisory_veeam.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVeeam(BaseModel): """ - AdvisoryVeeam + advisory.Veeam """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vendor_name_for_threat_actor.py b/vulncheck_sdk/aio/models/advisory_vendor_name_for_threat_actor.py index a646f195..94a1d4c8 100644 --- a/vulncheck_sdk/aio/models/advisory_vendor_name_for_threat_actor.py +++ b/vulncheck_sdk/aio/models/advisory_vendor_name_for_threat_actor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorNameForThreatActor(BaseModel): """ - AdvisoryVendorNameForThreatActor + advisory.VendorNameForThreatActor """ # noqa: E501 threat_actor_name: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vendor_product.py b/vulncheck_sdk/aio/models/advisory_vendor_product.py index 02760f7f..e4567ca9 100644 --- a/vulncheck_sdk/aio/models/advisory_vendor_product.py +++ b/vulncheck_sdk/aio/models/advisory_vendor_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorProduct(BaseModel): """ - AdvisoryVendorProduct + advisory.VendorProduct """ # noqa: E501 product: Optional[StrictStr] = None vendor: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vendor_ref.py b/vulncheck_sdk/aio/models/advisory_vendor_ref.py index 5c3cb337..65184fc7 100644 --- a/vulncheck_sdk/aio/models/advisory_vendor_ref.py +++ b/vulncheck_sdk/aio/models/advisory_vendor_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorRef(BaseModel): """ - AdvisoryVendorRef + advisory.VendorRef """ # noqa: E501 vendor_ref: Optional[StrictStr] = None vendor_ref_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_veritas.py b/vulncheck_sdk/aio/models/advisory_veritas.py index 87ea191c..46c7c143 100644 --- a/vulncheck_sdk/aio/models/advisory_veritas.py +++ b/vulncheck_sdk/aio/models/advisory_veritas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVeritas(BaseModel): """ - AdvisoryVeritas + advisory.Veritas """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_virtuozzo.py b/vulncheck_sdk/aio/models/advisory_virtuozzo.py index 767f8620..f3c5221d 100644 --- a/vulncheck_sdk/aio/models/advisory_virtuozzo.py +++ b/vulncheck_sdk/aio/models/advisory_virtuozzo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVirtuozzo(BaseModel): """ - AdvisoryVirtuozzo + advisory.Virtuozzo """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vlc.py b/vulncheck_sdk/aio/models/advisory_vlc.py index b691cc11..adf83664 100644 --- a/vulncheck_sdk/aio/models/advisory_vlc.py +++ b/vulncheck_sdk/aio/models/advisory_vlc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVLC(BaseModel): """ - AdvisoryVLC + advisory.VLC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vm_ware_advisory.py b/vulncheck_sdk/aio/models/advisory_vm_ware_advisory.py index 159f192e..9699439d 100644 --- a/vulncheck_sdk/aio/models/advisory_vm_ware_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_vm_ware_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVMWareAdvisory(BaseModel): """ - AdvisoryVMWareAdvisory + advisory.VMWareAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="AdvisoryID") advisory_url: Optional[StrictStr] = Field(default=None, alias="AdvisoryURL") diff --git a/vulncheck_sdk/aio/models/advisory_void_sec.py b/vulncheck_sdk/aio/models/advisory_void_sec.py index 876bc1eb..168ad40d 100644 --- a/vulncheck_sdk/aio/models/advisory_void_sec.py +++ b/vulncheck_sdk/aio/models/advisory_void_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVoidSec(BaseModel): """ - AdvisoryVoidSec + advisory.VoidSec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vuln_check.py b/vulncheck_sdk/aio/models/advisory_vuln_check.py index 8df62392..a37d0566 100644 --- a/vulncheck_sdk/aio/models/advisory_vuln_check.py +++ b/vulncheck_sdk/aio/models/advisory_vuln_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnCheck(BaseModel): """ - AdvisoryVulnCheck + advisory.VulnCheck """ # noqa: E501 affecting: Optional[List[StrictStr]] = None credit: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vuln_check_config.py b/vulncheck_sdk/aio/models/advisory_vuln_check_config.py index da8bc2f1..88e76f61 100644 --- a/vulncheck_sdk/aio/models/advisory_vuln_check_config.py +++ b/vulncheck_sdk/aio/models/advisory_vuln_check_config.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnCheckConfig(BaseModel): """ - AdvisoryVulnCheckConfig + advisory.VulnCheckConfig """ # noqa: E501 config: Optional[List[AdvisoryNVD20Configuration]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vuln_check_cve_list_v5.py b/vulncheck_sdk/aio/models/advisory_vuln_check_cve_list_v5.py index d2b94595..a92f0a8a 100644 --- a/vulncheck_sdk/aio/models/advisory_vuln_check_cve_list_v5.py +++ b/vulncheck_sdk/aio/models/advisory_vuln_check_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnCheckCVEListV5(BaseModel): """ - AdvisoryVulnCheckCVEListV5 + advisory.VulnCheckCVEListV5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vuln_check_kev.py b/vulncheck_sdk/aio/models/advisory_vuln_check_kev.py index 4a2143ac..1ee2f535 100644 --- a/vulncheck_sdk/aio/models/advisory_vuln_check_kev.py +++ b/vulncheck_sdk/aio/models/advisory_vuln_check_kev.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnCheckKEV(BaseModel): """ - AdvisoryVulnCheckKEV + advisory.VulnCheckKEV """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") cisa_date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vuln_check_package.py b/vulncheck_sdk/aio/models/advisory_vuln_check_package.py index a2da057a..aaa1747e 100644 --- a/vulncheck_sdk/aio/models/advisory_vuln_check_package.py +++ b/vulncheck_sdk/aio/models/advisory_vuln_check_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnCheckPackage(BaseModel): """ - AdvisoryVulnCheckPackage + advisory.VulnCheckPackage """ # noqa: E501 arch: Optional[StrictStr] = None distro: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnerability.py b/vulncheck_sdk/aio/models/advisory_vulnerability.py deleted file mode 100644 index 8303990b..00000000 --- a/vulncheck_sdk/aio/models/advisory_vulnerability.py +++ /dev/null @@ -1,136 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat -from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryVulnerability(BaseModel): - """ - AdvisoryVulnerability - """ # noqa: E501 - cve: Optional[StrictStr] = None - cvssscore_sets: Optional[AdvisoryScoreSet] = Field(default=None, alias="cvssscoreSets") - description: Optional[StrictStr] = None - packages: Optional[List[AdvisoryVulnCheckPackage]] = Field(default=None, description="vulncheck addition") - product_statuses: Optional[List[AdvisoryStatus]] = Field(default=None, alias="productStatuses") - references: Optional[List[AdvisoryCVRFReference]] = None - threats: Optional[List[AdvisoryThreat]] = None - __properties: ClassVar[List[str]] = ["cve", "cvssscoreSets", "description", "packages", "productStatuses", "references", "threats"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of cvssscore_sets - if self.cvssscore_sets: - _dict['cvssscoreSets'] = self.cvssscore_sets.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in packages (list) - _items = [] - if self.packages: - for _item_packages in self.packages: - if _item_packages: - _items.append(_item_packages.to_dict()) - _dict['packages'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in product_statuses (list) - _items = [] - if self.product_statuses: - for _item_product_statuses in self.product_statuses: - if _item_product_statuses: - _items.append(_item_product_statuses.to_dict()) - _dict['productStatuses'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in threats (list) - _items = [] - if self.threats: - for _item_threats in self.threats: - if _item_threats: - _items.append(_item_threats.to_dict()) - _dict['threats'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cve": obj.get("cve"), - "cvssscoreSets": AdvisoryScoreSet.from_dict(obj["cvssscoreSets"]) if obj.get("cvssscoreSets") is not None else None, - "description": obj.get("description"), - "packages": [AdvisoryVulnCheckPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, - "productStatuses": [AdvisoryStatus.from_dict(_item) for _item in obj["productStatuses"]] if obj.get("productStatuses") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "threats": [AdvisoryThreat.from_dict(_item) for _item in obj["threats"]] if obj.get("threats") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_vulnerable_debian_package.py b/vulncheck_sdk/aio/models/advisory_vulnerable_debian_package.py index 61b8ab95..7649c568 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnerable_debian_package.py +++ b/vulncheck_sdk/aio/models/advisory_vulnerable_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnerableDebianPackage(BaseModel): """ - AdvisoryVulnerableDebianPackage + advisory.VulnerableDebianPackage """ # noqa: E501 associated_cves: Optional[List[AdvisoryDebianCVE]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnerable_product.py b/vulncheck_sdk/aio/models/advisory_vulnerable_product.py index 9f8cea7c..0a48b6b7 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnerable_product.py +++ b/vulncheck_sdk/aio/models/advisory_vulnerable_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnerableProduct(BaseModel): """ - AdvisoryVulnerableProduct + advisory.VulnerableProduct """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment.py b/vulncheck_sdk/aio/models/advisory_vulnrichment.py index 8dd45b94..a0883492 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichment(BaseModel): """ - AdvisoryVulnrichment + advisory.Vulnrichment """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_containers.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_containers.py index 6fa6e4e5..1d9b885b 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_containers.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnrichmentContainers(BaseModel): """ - AdvisoryVulnrichmentContainers + advisory.VulnrichmentContainers """ # noqa: E501 adp: Optional[List[AdvisoryADP]] = None cna: Optional[AdvisoryMCna] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_content.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_content.py index 156d1612..145ccf91 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_content.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_content.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentContent(BaseModel): """ - AdvisoryVulnrichmentContent + advisory.VulnrichmentContent """ # noqa: E501 id: Optional[StrictStr] = None options: Optional[List[AdvisoryVulnrichmentOption]] = None diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_cve_ref.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_cve_ref.py index 5a8f89f0..44cc84c7 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_cve_ref.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_cve_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnrichmentCVERef(BaseModel): """ - AdvisoryVulnrichmentCVERef + advisory.VulnrichmentCVERef """ # noqa: E501 containers: Optional[AdvisoryVulnrichmentContainers] = None cve_metadata: Optional[AdvisoryMCveMetadata] = Field(default=None, alias="cveMetadata") diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_metric.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_metric.py index 0dbf4137..2bd59998 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_metric.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentMetric(BaseModel): """ - AdvisoryVulnrichmentMetric + advisory.VulnrichmentMetric """ # noqa: E501 other: Optional[AdvisoryVulnrichmentOther] = None __properties: ClassVar[List[str]] = ["other"] diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_option.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_option.py index e3d9cc86..e60836c6 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_option.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_option.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnrichmentOption(BaseModel): """ - AdvisoryVulnrichmentOption + advisory.VulnrichmentOption """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") exploitation: Optional[StrictStr] = Field(default=None, alias="Exploitation") diff --git a/vulncheck_sdk/aio/models/advisory_vulnrichment_other.py b/vulncheck_sdk/aio/models/advisory_vulnrichment_other.py index 7163126c..11dc3561 100644 --- a/vulncheck_sdk/aio/models/advisory_vulnrichment_other.py +++ b/vulncheck_sdk/aio/models/advisory_vulnrichment_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentOther(BaseModel): """ - AdvisoryVulnrichmentOther + advisory.VulnrichmentOther """ # noqa: E501 content: Optional[AdvisoryVulnrichmentContent] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_vyaire_advisory.py b/vulncheck_sdk/aio/models/advisory_vyaire_advisory.py index 3dda7d70..8a372c96 100644 --- a/vulncheck_sdk/aio/models/advisory_vyaire_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_vyaire_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVYAIREAdvisory(BaseModel): """ - AdvisoryVYAIREAdvisory + advisory.VYAIREAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_watch_guard.py b/vulncheck_sdk/aio/models/advisory_watch_guard.py index 7bb40cca..e325c939 100644 --- a/vulncheck_sdk/aio/models/advisory_watch_guard.py +++ b/vulncheck_sdk/aio/models/advisory_watch_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWatchGuard(BaseModel): """ - AdvisoryWatchGuard + advisory.WatchGuard """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_whats_app.py b/vulncheck_sdk/aio/models/advisory_whats_app.py index f9afccb7..e8158373 100644 --- a/vulncheck_sdk/aio/models/advisory_whats_app.py +++ b/vulncheck_sdk/aio/models/advisory_whats_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWhatsApp(BaseModel): """ - AdvisoryWhatsApp + advisory.WhatsApp """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_wibu.py b/vulncheck_sdk/aio/models/advisory_wibu.py index 332e8448..cc37e74f 100644 --- a/vulncheck_sdk/aio/models/advisory_wibu.py +++ b/vulncheck_sdk/aio/models/advisory_wibu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWibu(BaseModel): """ - AdvisoryWibu + advisory.Wibu """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_wireshark.py b/vulncheck_sdk/aio/models/advisory_wireshark.py index 626387bf..ff538c70 100644 --- a/vulncheck_sdk/aio/models/advisory_wireshark.py +++ b/vulncheck_sdk/aio/models/advisory_wireshark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWireshark(BaseModel): """ - AdvisoryWireshark + advisory.Wireshark """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_with_secure.py b/vulncheck_sdk/aio/models/advisory_with_secure.py index 71a14ca2..74aeb4bd 100644 --- a/vulncheck_sdk/aio/models/advisory_with_secure.py +++ b/vulncheck_sdk/aio/models/advisory_with_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWithSecure(BaseModel): """ - AdvisoryWithSecure + advisory.WithSecure """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_wolf_ssl.py b/vulncheck_sdk/aio/models/advisory_wolf_ssl.py index b343e1d5..488eb412 100644 --- a/vulncheck_sdk/aio/models/advisory_wolf_ssl.py +++ b/vulncheck_sdk/aio/models/advisory_wolf_ssl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWolfSSL(BaseModel): """ - AdvisoryWolfSSL + advisory.WolfSSL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_wolfi.py b/vulncheck_sdk/aio/models/advisory_wolfi.py index 06d7b5d7..ecb18593 100644 --- a/vulncheck_sdk/aio/models/advisory_wolfi.py +++ b/vulncheck_sdk/aio/models/advisory_wolfi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryWolfi(BaseModel): """ - AdvisoryWolfi + advisory.Wolfi """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_wolfi_package.py b/vulncheck_sdk/aio/models/advisory_wolfi_package.py index 656446ab..b19ee7ce 100644 --- a/vulncheck_sdk/aio/models/advisory_wolfi_package.py +++ b/vulncheck_sdk/aio/models/advisory_wolfi_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryWolfiPackage(BaseModel): """ - AdvisoryWolfiPackage + advisory.WolfiPackage """ # noqa: E501 name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryWolfiSecFix]] = None diff --git a/vulncheck_sdk/aio/models/advisory_wolfi_sec_fix.py b/vulncheck_sdk/aio/models/advisory_wolfi_sec_fix.py index 559739d7..c4043d1f 100644 --- a/vulncheck_sdk/aio/models/advisory_wolfi_sec_fix.py +++ b/vulncheck_sdk/aio/models/advisory_wolfi_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWolfiSecFix(BaseModel): """ - AdvisoryWolfiSecFix + advisory.WolfiSecFix """ # noqa: E501 cve: Optional[List[StrictStr]] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_wordfence.py b/vulncheck_sdk/aio/models/advisory_wordfence.py index e0a174e7..3ef02e68 100644 --- a/vulncheck_sdk/aio/models/advisory_wordfence.py +++ b/vulncheck_sdk/aio/models/advisory_wordfence.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWordfence(BaseModel): """ - AdvisoryWordfence + advisory.Wordfence """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_wrt.py b/vulncheck_sdk/aio/models/advisory_wrt.py index 6d0917a4..6cd8be37 100644 --- a/vulncheck_sdk/aio/models/advisory_wrt.py +++ b/vulncheck_sdk/aio/models/advisory_wrt.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWRT(BaseModel): """ - AdvisoryWRT + advisory.WRT """ # noqa: E501 advisory: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") diff --git a/vulncheck_sdk/aio/models/advisory_xdb.py b/vulncheck_sdk/aio/models/advisory_xdb.py index f60a960d..0519f336 100644 --- a/vulncheck_sdk/aio/models/advisory_xdb.py +++ b/vulncheck_sdk/aio/models/advisory_xdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXDB(BaseModel): """ - AdvisoryXDB + advisory.XDB """ # noqa: E501 clone_ssh_url: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_xen.py b/vulncheck_sdk/aio/models/advisory_xen.py index b82af059..b2967af4 100644 --- a/vulncheck_sdk/aio/models/advisory_xen.py +++ b/vulncheck_sdk/aio/models/advisory_xen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXen(BaseModel): """ - AdvisoryXen + advisory.Xen """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_xerox.py b/vulncheck_sdk/aio/models/advisory_xerox.py index 824bf6e4..cb62df9f 100644 --- a/vulncheck_sdk/aio/models/advisory_xerox.py +++ b/vulncheck_sdk/aio/models/advisory_xerox.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXerox(BaseModel): """ - AdvisoryXerox + advisory.Xerox """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_xiaomi.py b/vulncheck_sdk/aio/models/advisory_xiaomi.py index b7016c05..4ffeee37 100644 --- a/vulncheck_sdk/aio/models/advisory_xiaomi.py +++ b/vulncheck_sdk/aio/models/advisory_xiaomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXiaomi(BaseModel): """ - AdvisoryXiaomi + advisory.Xiaomi """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_xylem.py b/vulncheck_sdk/aio/models/advisory_xylem.py index 3fc2ced0..fb8a401c 100644 --- a/vulncheck_sdk/aio/models/advisory_xylem.py +++ b/vulncheck_sdk/aio/models/advisory_xylem.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXylem(BaseModel): """ - AdvisoryXylem + advisory.Xylem """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_yamaha.py b/vulncheck_sdk/aio/models/advisory_yamaha.py index d46e4e2e..73d63cf1 100644 --- a/vulncheck_sdk/aio/models/advisory_yamaha.py +++ b/vulncheck_sdk/aio/models/advisory_yamaha.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYamaha(BaseModel): """ - AdvisoryYamaha + advisory.Yamaha """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_yokogawa_advisory.py b/vulncheck_sdk/aio/models/advisory_yokogawa_advisory.py index 6abb2931..4d96c0f5 100644 --- a/vulncheck_sdk/aio/models/advisory_yokogawa_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_yokogawa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYokogawaAdvisory(BaseModel): """ - AdvisoryYokogawaAdvisory + advisory.YokogawaAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_yubico.py b/vulncheck_sdk/aio/models/advisory_yubico.py index 956ea430..857e5f9a 100644 --- a/vulncheck_sdk/aio/models/advisory_yubico.py +++ b/vulncheck_sdk/aio/models/advisory_yubico.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYubico(BaseModel): """ - AdvisoryYubico + advisory.Yubico """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zdi.py b/vulncheck_sdk/aio/models/advisory_zdi.py index dd23cb4f..90925c98 100644 --- a/vulncheck_sdk/aio/models/advisory_zdi.py +++ b/vulncheck_sdk/aio/models/advisory_zdi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryZDI(BaseModel): """ - AdvisoryZDI + advisory.ZDI """ # noqa: E501 cves: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zdi_product.py b/vulncheck_sdk/aio/models/advisory_zdi_product.py index 6a5a38c9..3a0e8c9c 100644 --- a/vulncheck_sdk/aio/models/advisory_zdi_product.py +++ b/vulncheck_sdk/aio/models/advisory_zdi_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZDIProduct(BaseModel): """ - AdvisoryZDIProduct + advisory.ZDIProduct """ # noqa: E501 name: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zdi_response.py b/vulncheck_sdk/aio/models/advisory_zdi_response.py index 211a4a87..2a501d43 100644 --- a/vulncheck_sdk/aio/models/advisory_zdi_response.py +++ b/vulncheck_sdk/aio/models/advisory_zdi_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZDIResponse(BaseModel): """ - AdvisoryZDIResponse + advisory.ZDIResponse """ # noqa: E501 text: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zdi_response_vendor.py b/vulncheck_sdk/aio/models/advisory_zdi_response_vendor.py index d0c36325..3f22378b 100644 --- a/vulncheck_sdk/aio/models/advisory_zdi_response_vendor.py +++ b/vulncheck_sdk/aio/models/advisory_zdi_response_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZDIResponseVendor(BaseModel): """ - AdvisoryZDIResponseVendor + advisory.ZDIResponseVendor """ # noqa: E501 name: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["name"] diff --git a/vulncheck_sdk/aio/models/advisory_zdi_vendor.py b/vulncheck_sdk/aio/models/advisory_zdi_vendor.py index e6b0b124..db23bd0b 100644 --- a/vulncheck_sdk/aio/models/advisory_zdi_vendor.py +++ b/vulncheck_sdk/aio/models/advisory_zdi_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZDIVendor(BaseModel): """ - AdvisoryZDIVendor + advisory.ZDIVendor """ # noqa: E501 name: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zebra.py b/vulncheck_sdk/aio/models/advisory_zebra.py index b2ff49e2..b31cfb13 100644 --- a/vulncheck_sdk/aio/models/advisory_zebra.py +++ b/vulncheck_sdk/aio/models/advisory_zebra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZebra(BaseModel): """ - AdvisoryZebra + advisory.Zebra """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zero_day_advisory.py b/vulncheck_sdk/aio/models/advisory_zero_day_advisory.py index a12063d7..90656b93 100644 --- a/vulncheck_sdk/aio/models/advisory_zero_day_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_zero_day_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZeroDayAdvisory(BaseModel): """ - AdvisoryZeroDayAdvisory + advisory.ZeroDayAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zero_science_advisory.py b/vulncheck_sdk/aio/models/advisory_zero_science_advisory.py index 2b686175..614f735d 100644 --- a/vulncheck_sdk/aio/models/advisory_zero_science_advisory.py +++ b/vulncheck_sdk/aio/models/advisory_zero_science_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZeroScienceAdvisory(BaseModel): """ - AdvisoryZeroScienceAdvisory + advisory.ZeroScienceAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="advisoryId") affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") diff --git a/vulncheck_sdk/aio/models/advisory_zimbra.py b/vulncheck_sdk/aio/models/advisory_zimbra.py index 87e41ce7..f9a942d4 100644 --- a/vulncheck_sdk/aio/models/advisory_zimbra.py +++ b/vulncheck_sdk/aio/models/advisory_zimbra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZimbra(BaseModel): """ - AdvisoryZimbra + advisory.Zimbra """ # noqa: E501 bugs: Optional[List[StrictInt]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_zoom.py b/vulncheck_sdk/aio/models/advisory_zoom.py index 977443c1..d560e560 100644 --- a/vulncheck_sdk/aio/models/advisory_zoom.py +++ b/vulncheck_sdk/aio/models/advisory_zoom.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZoom(BaseModel): """ - AdvisoryZoom + advisory.Zoom """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/advisory_zscaler.py b/vulncheck_sdk/aio/models/advisory_zscaler.py index e14fc0df..1a5041c4 100644 --- a/vulncheck_sdk/aio/models/advisory_zscaler.py +++ b/vulncheck_sdk/aio/models/advisory_zscaler.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZscaler(BaseModel): """ - AdvisoryZscaler + advisory.Zscaler """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zulu_version.py b/vulncheck_sdk/aio/models/advisory_zulu_version.py index 293368dc..bf78031e 100644 --- a/vulncheck_sdk/aio/models/advisory_zulu_version.py +++ b/vulncheck_sdk/aio/models/advisory_zulu_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZuluVersion(BaseModel): """ - AdvisoryZuluVersion + advisory.ZuluVersion """ # noqa: E501 jdk: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zuso.py b/vulncheck_sdk/aio/models/advisory_zuso.py index 41216b96..35c0e7c2 100644 --- a/vulncheck_sdk/aio/models/advisory_zuso.py +++ b/vulncheck_sdk/aio/models/advisory_zuso.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZuso(BaseModel): """ - AdvisoryZuso + advisory.Zuso """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_zyxel.py b/vulncheck_sdk/aio/models/advisory_zyxel.py index 3d2b7f2a..b781847f 100644 --- a/vulncheck_sdk/aio/models/advisory_zyxel.py +++ b/vulncheck_sdk/aio/models/advisory_zyxel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZyxel(BaseModel): """ - AdvisoryZyxel + advisory.Zyxel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_base_metric_v2.py b/vulncheck_sdk/aio/models/api_base_metric_v2.py index c886b778..8a44e8f3 100644 --- a/vulncheck_sdk/aio/models/api_base_metric_v2.py +++ b/vulncheck_sdk/aio/models/api_base_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiBaseMetricV2(BaseModel): """ - ApiBaseMetricV2 + api.BaseMetricV2 """ # noqa: E501 ac_insuf_info: Optional[StrictBool] = Field(default=None, alias="acInsufInfo") cvss_v2: Optional[ApiCVSSV2] = Field(default=None, alias="cvssV2") diff --git a/vulncheck_sdk/aio/models/api_base_metric_v3.py b/vulncheck_sdk/aio/models/api_base_metric_v3.py index 42a6ba13..d2bf2ed2 100644 --- a/vulncheck_sdk/aio/models/api_base_metric_v3.py +++ b/vulncheck_sdk/aio/models/api_base_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiBaseMetricV3(BaseModel): """ - ApiBaseMetricV3 + api.BaseMetricV3 """ # noqa: E501 cvss_v3: Optional[ApiCVSSV3] = Field(default=None, alias="cvssV3") exploitability_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="exploitabilityScore") diff --git a/vulncheck_sdk/aio/models/api_categorization_extended.py b/vulncheck_sdk/aio/models/api_categorization_extended.py index 40328709..84718bbd 100644 --- a/vulncheck_sdk/aio/models/api_categorization_extended.py +++ b/vulncheck_sdk/aio/models/api_categorization_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCategorizationExtended(BaseModel): """ - ApiCategorizationExtended + api.CategorizationExtended """ # noqa: E501 tags: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["tags"] diff --git a/vulncheck_sdk/aio/models/api_client_fingerprints.py b/vulncheck_sdk/aio/models/api_client_fingerprints.py index 1556a90d..ca72f967 100644 --- a/vulncheck_sdk/aio/models/api_client_fingerprints.py +++ b/vulncheck_sdk/aio/models/api_client_fingerprints.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiClientFingerprints(BaseModel): """ - ApiClientFingerprints + api.ClientFingerprints """ # noqa: E501 hassh: Optional[StrictStr] = None ja3: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_configurations.py b/vulncheck_sdk/aio/models/api_configurations.py index 2bfd44cd..8dd37c73 100644 --- a/vulncheck_sdk/aio/models/api_configurations.py +++ b/vulncheck_sdk/aio/models/api_configurations.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiConfigurations(BaseModel): """ - ApiConfigurations + api.Configurations """ # noqa: E501 cve_data_version: Optional[StrictStr] = Field(default=None, alias="CVE_data_version") nodes: Optional[List[ApiNodes]] = None diff --git a/vulncheck_sdk/aio/models/api_cpe.py b/vulncheck_sdk/aio/models/api_cpe.py index f07fc1f2..f3b2f96e 100644 --- a/vulncheck_sdk/aio/models/api_cpe.py +++ b/vulncheck_sdk/aio/models/api_cpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCPE(BaseModel): """ - ApiCPE + api.CPE """ # noqa: E501 edition: Optional[StrictStr] = None language: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_cpe_match.py b/vulncheck_sdk/aio/models/api_cpe_match.py index c31c6273..75727067 100644 --- a/vulncheck_sdk/aio/models/api_cpe_match.py +++ b/vulncheck_sdk/aio/models/api_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiCPEMatch(BaseModel): """ - ApiCPEMatch + api.CPEMatch """ # noqa: E501 cpe22_uri: Optional[StrictStr] = Field(default=None, alias="cpe22Uri") cpe23_uri: Optional[StrictStr] = Field(default=None, alias="cpe23Uri") diff --git a/vulncheck_sdk/aio/models/api_cpe_name.py b/vulncheck_sdk/aio/models/api_cpe_name.py index 542e8b0e..8b0c77f1 100644 --- a/vulncheck_sdk/aio/models/api_cpe_name.py +++ b/vulncheck_sdk/aio/models/api_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCPEName(BaseModel): """ - ApiCPEName + api.CPEName """ # noqa: E501 cpe22_uri: Optional[StrictStr] = Field(default=None, alias="cpe22Uri") cpe23_uri: Optional[StrictStr] = Field(default=None, alias="cpe23Uri") diff --git a/vulncheck_sdk/aio/models/api_cve.py b/vulncheck_sdk/aio/models/api_cve.py index 0e064a2f..7dacf336 100644 --- a/vulncheck_sdk/aio/models/api_cve.py +++ b/vulncheck_sdk/aio/models/api_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class ApiCVE(BaseModel): """ - ApiCVE + api.CVE """ # noqa: E501 cve_data_meta: Optional[ApiCVEDataMeta] = Field(default=None, alias="CVE_data_meta") data_format: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_cve_data_meta.py b/vulncheck_sdk/aio/models/api_cve_data_meta.py index 7003c6bd..493fb6fe 100644 --- a/vulncheck_sdk/aio/models/api_cve_data_meta.py +++ b/vulncheck_sdk/aio/models/api_cve_data_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVEDataMeta(BaseModel): """ - ApiCVEDataMeta + api.CVEDataMeta """ # noqa: E501 assigner: Optional[StrictStr] = Field(default=None, alias="ASSIGNER") id: Optional[StrictStr] = Field(default=None, alias="ID") diff --git a/vulncheck_sdk/aio/models/api_cve_data_meta_extended.py b/vulncheck_sdk/aio/models/api_cve_data_meta_extended.py index 0cc15498..b725e691 100644 --- a/vulncheck_sdk/aio/models/api_cve_data_meta_extended.py +++ b/vulncheck_sdk/aio/models/api_cve_data_meta_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVEDataMetaExtended(BaseModel): """ - ApiCVEDataMetaExtended + api.CVEDataMetaExtended """ # noqa: E501 alias: Optional[StrictStr] = Field(default=None, alias="ALIAS") assigner: Optional[StrictStr] = Field(default=None, alias="ASSIGNER") diff --git a/vulncheck_sdk/aio/models/api_cve_extended.py b/vulncheck_sdk/aio/models/api_cve_extended.py index 4f384d4a..6aea105b 100644 --- a/vulncheck_sdk/aio/models/api_cve_extended.py +++ b/vulncheck_sdk/aio/models/api_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class ApiCVEExtended(BaseModel): """ - ApiCVEExtended + api.CVEExtended """ # noqa: E501 cve_data_meta: Optional[ApiCVEDataMetaExtended] = Field(default=None, alias="CVE_data_meta") categorization: Optional[ApiCategorizationExtended] = None diff --git a/vulncheck_sdk/aio/models/api_cve_items.py b/vulncheck_sdk/aio/models/api_cve_items.py index 57be5bd2..2f54e150 100644 --- a/vulncheck_sdk/aio/models/api_cve_items.py +++ b/vulncheck_sdk/aio/models/api_cve_items.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiCveItems(BaseModel): """ - ApiCveItems + api.CveItems """ # noqa: E501 configurations: Optional[ApiConfigurations] = None cve: Optional[ApiCVE] = None diff --git a/vulncheck_sdk/aio/models/api_cve_items_extended.py b/vulncheck_sdk/aio/models/api_cve_items_extended.py index 37ea8145..cdda5ad9 100644 --- a/vulncheck_sdk/aio/models/api_cve_items_extended.py +++ b/vulncheck_sdk/aio/models/api_cve_items_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class ApiCveItemsExtended(BaseModel): """ - ApiCveItemsExtended + api.CveItemsExtended """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") configurations: Optional[ApiConfigurations] = None diff --git a/vulncheck_sdk/aio/models/api_cvssv2.py b/vulncheck_sdk/aio/models/api_cvssv2.py index 65316955..e548dfb0 100644 --- a/vulncheck_sdk/aio/models/api_cvssv2.py +++ b/vulncheck_sdk/aio/models/api_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVSSV2(BaseModel): """ - ApiCVSSV2 + api.CVSSV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/aio/models/api_cvssv3.py b/vulncheck_sdk/aio/models/api_cvssv3.py index bd62c7d6..67d99b4c 100644 --- a/vulncheck_sdk/aio/models/api_cvssv3.py +++ b/vulncheck_sdk/aio/models/api_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVSSV3(BaseModel): """ - ApiCVSSV3 + api.CVSSV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/aio/models/api_cwe.py b/vulncheck_sdk/aio/models/api_cwe.py index 94244031..1ffb29b7 100644 --- a/vulncheck_sdk/aio/models/api_cwe.py +++ b/vulncheck_sdk/aio/models/api_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCWE(BaseModel): """ - ApiCWE + api.CWE """ # noqa: E501 abstraction: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_date_time.py b/vulncheck_sdk/aio/models/api_date_time.py deleted file mode 100644 index 1fd4a11d..00000000 --- a/vulncheck_sdk/aio/models/api_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class ApiDateTime(BaseModel): - """ - ApiDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of ApiDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of ApiDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/api_description.py b/vulncheck_sdk/aio/models/api_description.py index 6165f202..5daf91d6 100644 --- a/vulncheck_sdk/aio/models/api_description.py +++ b/vulncheck_sdk/aio/models/api_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiDescription(BaseModel): """ - ApiDescription + api.Description """ # noqa: E501 description_data: Optional[List[ApiDescriptionData]] = None __properties: ClassVar[List[str]] = ["description_data"] diff --git a/vulncheck_sdk/aio/models/api_description_data.py b/vulncheck_sdk/aio/models/api_description_data.py index c727b5d3..715b12dd 100644 --- a/vulncheck_sdk/aio/models/api_description_data.py +++ b/vulncheck_sdk/aio/models/api_description_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiDescriptionData(BaseModel): """ - ApiDescriptionData + api.DescriptionData """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_epss.py b/vulncheck_sdk/aio/models/api_epss.py index 3b5069f3..35886ce2 100644 --- a/vulncheck_sdk/aio/models/api_epss.py +++ b/vulncheck_sdk/aio/models/api_epss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiEPSS(BaseModel): """ - ApiEPSS + exclude EPSS from changelog """ # noqa: E501 epss_percentile: Optional[Union[StrictFloat, StrictInt]] = None epss_score: Optional[Union[StrictFloat, StrictInt]] = None diff --git a/vulncheck_sdk/aio/models/api_epss_data.py b/vulncheck_sdk/aio/models/api_epss_data.py index b6346eb3..f8f5a1a9 100644 --- a/vulncheck_sdk/aio/models/api_epss_data.py +++ b/vulncheck_sdk/aio/models/api_epss_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiEPSSData(BaseModel): """ - ApiEPSSData + api.EPSSData """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_exploit_chain.py b/vulncheck_sdk/aio/models/api_exploit_chain.py index 561bf189..573361d9 100644 --- a/vulncheck_sdk/aio/models/api_exploit_chain.py +++ b/vulncheck_sdk/aio/models/api_exploit_chain.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiExploitChain(BaseModel): """ - ApiExploitChain + api.ExploitChain """ # noqa: E501 cves: Optional[List[ApiExploitChainCVE]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_exploit_chain_cve.py b/vulncheck_sdk/aio/models/api_exploit_chain_cve.py index 8f00a87e..92f6ec48 100644 --- a/vulncheck_sdk/aio/models/api_exploit_chain_cve.py +++ b/vulncheck_sdk/aio/models/api_exploit_chain_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitChainCVE(BaseModel): """ - ApiExploitChainCVE + api.ExploitChainCVE """ # noqa: E501 cve: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_exploit_v3_result.py b/vulncheck_sdk/aio/models/api_exploit_v3_result.py index b05c6886..b2b218da 100644 --- a/vulncheck_sdk/aio/models/api_exploit_v3_result.py +++ b/vulncheck_sdk/aio/models/api_exploit_v3_result.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,13 +31,13 @@ class ApiExploitV3Result(BaseModel): """ - ApiExploitV3Result + api.ExploitV3Result """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, description="ignore this field when checking for differences/changes", alias="_timestamp") commercial_exploit_found: Optional[StrictBool] = None counts: Optional[ApiExploitsV3Count] = None date_added: Optional[StrictStr] = None - epss: Optional[ApiEPSS] = Field(default=None, description="exclude EPSS from changelog") + epss: Optional[ApiEPSS] = None exploits: Optional[List[ApiNormalizedExploitV3Entry]] = None id: Optional[StrictStr] = None in_kev: Optional[StrictBool] = Field(default=None, alias="inKEV") diff --git a/vulncheck_sdk/aio/models/api_exploits_change.py b/vulncheck_sdk/aio/models/api_exploits_change.py index 185c98cc..e6d0374d 100644 --- a/vulncheck_sdk/aio/models/api_exploits_change.py +++ b/vulncheck_sdk/aio/models/api_exploits_change.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,13 +25,13 @@ class ApiExploitsChange(BaseModel): """ - ApiExploitsChange + api.ExploitsChange """ # noqa: E501 change_time: Optional[StrictStr] = None change_type: Optional[StrictStr] = None var_field: Optional[StrictStr] = Field(default=None, alias="field") - new_value: Optional[Dict[str, Any]] = None - old_value: Optional[Dict[str, Any]] = None + new_value: Optional[Any] = None + old_value: Optional[Any] = None __properties: ClassVar[List[str]] = ["change_time", "change_type", "field", "new_value", "old_value"] model_config = ConfigDict( @@ -73,6 +73,16 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if new_value (nullable) is None + # and model_fields_set contains the field + if self.new_value is None and "new_value" in self.model_fields_set: + _dict['new_value'] = None + + # set to None if old_value (nullable) is None + # and model_fields_set contains the field + if self.old_value is None and "old_value" in self.model_fields_set: + _dict['old_value'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/api_exploits_changelog.py b/vulncheck_sdk/aio/models/api_exploits_changelog.py index 0cf9b59f..2999fd75 100644 --- a/vulncheck_sdk/aio/models/api_exploits_changelog.py +++ b/vulncheck_sdk/aio/models/api_exploits_changelog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiExploitsChangelog(BaseModel): """ - ApiExploitsChangelog + api.ExploitsChangelog """ # noqa: E501 changes: Optional[List[ApiExploitsChange]] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_exploits_trending.py b/vulncheck_sdk/aio/models/api_exploits_trending.py index 63d2b822..614a78ba 100644 --- a/vulncheck_sdk/aio/models/api_exploits_trending.py +++ b/vulncheck_sdk/aio/models/api_exploits_trending.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsTrending(BaseModel): """ - ApiExploitsTrending + api.ExploitsTrending """ # noqa: E501 github: Optional[StrictBool] = None __properties: ClassVar[List[str]] = ["github"] diff --git a/vulncheck_sdk/aio/models/api_exploits_v3_count.py b/vulncheck_sdk/aio/models/api_exploits_v3_count.py index 748449a5..1f100fd6 100644 --- a/vulncheck_sdk/aio/models/api_exploits_v3_count.py +++ b/vulncheck_sdk/aio/models/api_exploits_v3_count.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsV3Count(BaseModel): """ - ApiExploitsV3Count + api.ExploitsV3Count """ # noqa: E501 botnets: Optional[StrictInt] = None exploits: Optional[StrictInt] = None diff --git a/vulncheck_sdk/aio/models/api_exploits_v3_timeline.py b/vulncheck_sdk/aio/models/api_exploits_v3_timeline.py index a10396cd..1749f9aa 100644 --- a/vulncheck_sdk/aio/models/api_exploits_v3_timeline.py +++ b/vulncheck_sdk/aio/models/api_exploits_v3_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsV3Timeline(BaseModel): """ - ApiExploitsV3Timeline + api.ExploitsV3Timeline """ # noqa: E501 cisa_kev_date_added: Optional[StrictStr] = None cisa_kev_date_due: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_http_details.py b/vulncheck_sdk/aio/models/api_http_details.py index 8b0fe287..21fba4ee 100644 --- a/vulncheck_sdk/aio/models/api_http_details.py +++ b/vulncheck_sdk/aio/models/api_http_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiHTTPDetails(BaseModel): """ - ApiHTTPDetails + api.HTTPDetails """ # noqa: E501 http_request_body: Optional[StrictStr] = None http_user_agent: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_impact.py b/vulncheck_sdk/aio/models/api_impact.py index 4c7a20d8..5ae1fa67 100644 --- a/vulncheck_sdk/aio/models/api_impact.py +++ b/vulncheck_sdk/aio/models/api_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,11 +28,11 @@ class ApiImpact(BaseModel): """ - ApiImpact + api.Impact """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") - metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, description="this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics", alias="metricV40") + metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, alias="metricV40") __properties: ClassVar[List[str]] = ["baseMetricV2", "baseMetricV3", "metricV40"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/api_impact_extended.py b/vulncheck_sdk/aio/models/api_impact_extended.py index 5eed3f0e..c9f891ea 100644 --- a/vulncheck_sdk/aio/models/api_impact_extended.py +++ b/vulncheck_sdk/aio/models/api_impact_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class ApiImpactExtended(BaseModel): """ - ApiImpactExtended + api.ImpactExtended """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") diff --git a/vulncheck_sdk/aio/models/api_initial_access.py b/vulncheck_sdk/aio/models/api_initial_access.py index 1e58747c..9783062f 100644 --- a/vulncheck_sdk/aio/models/api_initial_access.py +++ b/vulncheck_sdk/aio/models/api_initial_access.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiInitialAccess(BaseModel): """ - ApiInitialAccess + api.InitialAccess """ # noqa: E501 artifacts: Optional[List[ApiInitialAccessArtifact]] = Field(default=None, description="Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.") cve: Optional[StrictStr] = Field(default=None, description="CVE identifier for the given initial access record.") diff --git a/vulncheck_sdk/aio/models/api_initial_access_artifact.py b/vulncheck_sdk/aio/models/api_initial_access_artifact.py index 21ae8625..b06964bf 100644 --- a/vulncheck_sdk/aio/models/api_initial_access_artifact.py +++ b/vulncheck_sdk/aio/models/api_initial_access_artifact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiInitialAccessArtifact(BaseModel): """ - ApiInitialAccessArtifact + api.InitialAccessArtifact """ # noqa: E501 artifact_name: Optional[StrictStr] = Field(default=None, description="ArtifactName is a title to associate with this artifact.", alias="artifactName") artifacts_url: Optional[List[StrictStr]] = Field(default=None, description="ArtifactsURL are URLs to the available artifact.", alias="artifactsURL") diff --git a/vulncheck_sdk/aio/models/api_mitre_attack_tech.py b/vulncheck_sdk/aio/models/api_mitre_attack_tech.py index 8b4a7991..5897a94f 100644 --- a/vulncheck_sdk/aio/models/api_mitre_attack_tech.py +++ b/vulncheck_sdk/aio/models/api_mitre_attack_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiMitreAttackTech(BaseModel): """ - ApiMitreAttackTech + api.MitreAttackTech """ # noqa: E501 d3fendmapping: Optional[List[ApiMitreMitigation2D3fendMapping]] = None detections: Optional[List[ApiMitreDetectionTech]] = None diff --git a/vulncheck_sdk/aio/models/api_mitre_attack_to_cve.py b/vulncheck_sdk/aio/models/api_mitre_attack_to_cve.py index a5f45420..1ba240ee 100644 --- a/vulncheck_sdk/aio/models/api_mitre_attack_to_cve.py +++ b/vulncheck_sdk/aio/models/api_mitre_attack_to_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiMitreAttackToCVE(BaseModel): """ - ApiMitreAttackToCVE + api.MitreAttackToCVE """ # noqa: E501 cve_list: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_mitre_d3fend_technique.py b/vulncheck_sdk/aio/models/api_mitre_d3fend_technique.py index c466f95d..d6da8d98 100644 --- a/vulncheck_sdk/aio/models/api_mitre_d3fend_technique.py +++ b/vulncheck_sdk/aio/models/api_mitre_d3fend_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreD3fendTechnique(BaseModel): """ - ApiMitreD3fendTechnique + api.MitreD3fendTechnique """ # noqa: E501 id: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_mitre_detection_tech.py b/vulncheck_sdk/aio/models/api_mitre_detection_tech.py index 9def96b3..4040c1a9 100644 --- a/vulncheck_sdk/aio/models/api_mitre_detection_tech.py +++ b/vulncheck_sdk/aio/models/api_mitre_detection_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreDetectionTech(BaseModel): """ - ApiMitreDetectionTech + api.MitreDetectionTech """ # noqa: E501 datacomponent: Optional[StrictStr] = None datasource: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_mitre_mitigation2_d3fend_mapping.py b/vulncheck_sdk/aio/models/api_mitre_mitigation2_d3fend_mapping.py index 95a313a1..1aca6283 100644 --- a/vulncheck_sdk/aio/models/api_mitre_mitigation2_d3fend_mapping.py +++ b/vulncheck_sdk/aio/models/api_mitre_mitigation2_d3fend_mapping.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiMitreMitigation2D3fendMapping(BaseModel): """ - ApiMitreMitigation2D3fendMapping + api.MitreMitigation2D3fendMapping """ # noqa: E501 d3fendtechniques: Optional[List[ApiMitreD3fendTechnique]] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_mitre_mitigation_tech.py b/vulncheck_sdk/aio/models/api_mitre_mitigation_tech.py index f0898630..e6e9b700 100644 --- a/vulncheck_sdk/aio/models/api_mitre_mitigation_tech.py +++ b/vulncheck_sdk/aio/models/api_mitre_mitigation_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreMitigationTech(BaseModel): """ - ApiMitreMitigationTech + api.MitreMitigationTech """ # noqa: E501 description: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nodes.py b/vulncheck_sdk/aio/models/api_nodes.py index 93f88ca7..99d1bb7b 100644 --- a/vulncheck_sdk/aio/models/api_nodes.py +++ b/vulncheck_sdk/aio/models/api_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNodes(BaseModel): """ - ApiNodes + api.Nodes """ # noqa: E501 children: Optional[List[ApiNodes]] = None cpe_match: Optional[List[ApiCPEMatch]] = None diff --git a/vulncheck_sdk/aio/models/api_normalized_exploit_v3_entry.py b/vulncheck_sdk/aio/models/api_normalized_exploit_v3_entry.py index b58d3368..a50f88a1 100644 --- a/vulncheck_sdk/aio/models/api_normalized_exploit_v3_entry.py +++ b/vulncheck_sdk/aio/models/api_normalized_exploit_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNormalizedExploitV3Entry(BaseModel): """ - ApiNormalizedExploitV3Entry + api.NormalizedExploitV3Entry """ # noqa: E501 clone_ssh_url: Optional[StrictStr] = None clone_ssh_url_cached: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_normalized_report_v3_entry.py b/vulncheck_sdk/aio/models/api_normalized_report_v3_entry.py index 33d76d6a..b23d3891 100644 --- a/vulncheck_sdk/aio/models/api_normalized_report_v3_entry.py +++ b/vulncheck_sdk/aio/models/api_normalized_report_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNormalizedReportV3Entry(BaseModel): """ - ApiNormalizedReportV3Entry + api.NormalizedReportV3Entry """ # noqa: E501 date_added: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_cpe_match.py b/vulncheck_sdk/aio/models/api_nvd20_cpe_match.py index c69dd72e..f89de746 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cpe_match.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CPEMatch(BaseModel): """ - ApiNVD20CPEMatch + api.NVD20CPEMatch """ # noqa: E501 cpe_last_modified: Optional[StrictStr] = Field(default=None, alias="cpeLastModified") created: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_cpe_name.py b/vulncheck_sdk/aio/models/api_nvd20_cpe_name.py index 94139461..ebbbc445 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cpe_name.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CPEName(BaseModel): """ - ApiNVD20CPEName + api.NVD20CPEName """ # noqa: E501 cpe_name: Optional[StrictStr] = Field(default=None, alias="cpeName") cpe_name_id: Optional[StrictStr] = Field(default=None, alias="cpeNameId") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cve.py b/vulncheck_sdk/aio/models/api_nvd20_cve.py index 2ecd3c08..f2058497 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cve.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class ApiNVD20CVE(BaseModel): """ - ApiNVD20CVE + api.NVD20CVE """ # noqa: E501 cisa_action_due: Optional[StrictStr] = Field(default=None, alias="cisaActionDue") cisa_exploit_add: Optional[StrictStr] = Field(default=None, alias="cisaExploitAdd") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cve_extended.py b/vulncheck_sdk/aio/models/api_nvd20_cve_extended.py index 61c8ad3d..b7b1da9c 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cve_extended.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -34,7 +34,7 @@ class ApiNVD20CVEExtended(BaseModel): """ - ApiNVD20CVEExtended + api.NVD20CVEExtended """ # noqa: E501 alias: Optional[StrictStr] = Field(default=None, alias="ALIAS") status: Optional[StrictStr] = Field(default=None, alias="STATUS") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v2.py b/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v2.py index 25c34e91..4d563801 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v2.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CvssDataV2(BaseModel): """ - ApiNVD20CvssDataV2 + api.NVD20CvssDataV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v3.py b/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v3.py index f978646f..d8fb3f70 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v3.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cvss_data_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CvssDataV3(BaseModel): """ - ApiNVD20CvssDataV3 + api.NVD20CvssDataV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v2.py b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v2.py index 09435814..a1601566 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v2.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV2(BaseModel): """ - ApiNVD20CvssMetricV2 + api.NVD20CvssMetricV2 """ # noqa: E501 ac_insuf_info: Optional[StrictBool] = Field(default=None, alias="acInsufInfo") base_severity: Optional[StrictStr] = Field(default=None, alias="baseSeverity") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v3.py b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v3.py index 8b56b1a6..01d09313 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v3.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV3(BaseModel): """ - ApiNVD20CvssMetricV3 + api.NVD20CvssMetricV3 """ # noqa: E501 cvss_data: Optional[ApiNVD20CvssDataV3] = Field(default=None, alias="cvssData") exploitability_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="exploitabilityScore") diff --git a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v40.py b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v40.py index 5f933451..13a12b07 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v40.py +++ b/vulncheck_sdk/aio/models/api_nvd20_cvss_metric_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV40(BaseModel): """ - ApiNVD20CvssMetricV40 + api.NVD20CvssMetricV40 """ # noqa: E501 cvss_data: Optional[AdvisoryCVSSV40] = Field(default=None, alias="cvssData") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_description.py b/vulncheck_sdk/aio/models/api_nvd20_description.py index 0efa4275..21e10bfc 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_description.py +++ b/vulncheck_sdk/aio/models/api_nvd20_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20Description(BaseModel): """ - ApiNVD20Description + api.NVD20Description """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_metric.py b/vulncheck_sdk/aio/models/api_nvd20_metric.py index 5589ffdc..695bd9a4 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_metric.py +++ b/vulncheck_sdk/aio/models/api_nvd20_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiNVD20Metric(BaseModel): """ - ApiNVD20Metric + api.NVD20Metric """ # noqa: E501 cvss_metric_v2: Optional[List[ApiNVD20CvssMetricV2]] = Field(default=None, alias="cvssMetricV2") cvss_metric_v30: Optional[List[ApiNVD20CvssMetricV3]] = Field(default=None, alias="cvssMetricV30") diff --git a/vulncheck_sdk/aio/models/api_nvd20_metric_extended.py b/vulncheck_sdk/aio/models/api_nvd20_metric_extended.py index 50784a32..ff3ffccb 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_metric_extended.py +++ b/vulncheck_sdk/aio/models/api_nvd20_metric_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class ApiNVD20MetricExtended(BaseModel): """ - ApiNVD20MetricExtended + api.NVD20MetricExtended """ # noqa: E501 cvss_metric_v2: Optional[List[ApiNVD20CvssMetricV2]] = Field(default=None, alias="cvssMetricV2") cvss_metric_v30: Optional[List[ApiNVD20CvssMetricV3]] = Field(default=None, alias="cvssMetricV30") diff --git a/vulncheck_sdk/aio/models/api_nvd20_reference.py b/vulncheck_sdk/aio/models/api_nvd20_reference.py index b644a22e..716aef04 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_reference.py +++ b/vulncheck_sdk/aio/models/api_nvd20_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20Reference(BaseModel): """ - ApiNVD20Reference + api.NVD20Reference """ # noqa: E501 source: Optional[StrictStr] = None tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_reference_extended.py b/vulncheck_sdk/aio/models/api_nvd20_reference_extended.py index 497d984c..092a693d 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_reference_extended.py +++ b/vulncheck_sdk/aio/models/api_nvd20_reference_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20ReferenceExtended(BaseModel): """ - ApiNVD20ReferenceExtended + api.NVD20ReferenceExtended """ # noqa: E501 date_added: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_temporal_associated_base_metric.py b/vulncheck_sdk/aio/models/api_nvd20_temporal_associated_base_metric.py index a6c0f838..d720ac93 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_temporal_associated_base_metric.py +++ b/vulncheck_sdk/aio/models/api_nvd20_temporal_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20TemporalAssociatedBaseMetric(BaseModel): """ - ApiNVD20TemporalAssociatedBaseMetric + api.NVD20TemporalAssociatedBaseMetric """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv2.py b/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv2.py index 18ee3ba9..3cd36af5 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv2.py +++ b/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20TemporalCVSSV2(BaseModel): """ - ApiNVD20TemporalCVSSV2 + api.NVD20TemporalCVSSV2 """ # noqa: E501 associated_base_metric_v2: Optional[ApiNVD20TemporalAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV2") exploitability: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv3.py b/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv3.py index 4fa44b62..61cc5000 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv3.py +++ b/vulncheck_sdk/aio/models/api_nvd20_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20TemporalCVSSV3(BaseModel): """ - ApiNVD20TemporalCVSSV3 + api.NVD20TemporalCVSSV3 """ # noqa: E501 associated_base_metric_v3: Optional[ApiNVD20TemporalAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV3") exploit_code_maturity: Optional[StrictStr] = Field(default=None, alias="exploitCodeMaturity") diff --git a/vulncheck_sdk/aio/models/api_nvd20_threat_associated_base_metric.py b/vulncheck_sdk/aio/models/api_nvd20_threat_associated_base_metric.py index 26ffd24b..e557367e 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_threat_associated_base_metric.py +++ b/vulncheck_sdk/aio/models/api_nvd20_threat_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20ThreatAssociatedBaseMetric(BaseModel): """ - ApiNVD20ThreatAssociatedBaseMetric + api.NVD20ThreatAssociatedBaseMetric """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_threat_cvssv40.py b/vulncheck_sdk/aio/models/api_nvd20_threat_cvssv40.py index e7dd4f0a..c97c6db0 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_threat_cvssv40.py +++ b/vulncheck_sdk/aio/models/api_nvd20_threat_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20ThreatCVSSV40(BaseModel): """ - ApiNVD20ThreatCVSSV40 + api.NVD20ThreatCVSSV40 """ # noqa: E501 associated_base_metric_v40: Optional[ApiNVD20ThreatAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV40") base_threat_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseThreatScore") diff --git a/vulncheck_sdk/aio/models/api_nvd20_vendor_comment.py b/vulncheck_sdk/aio/models/api_nvd20_vendor_comment.py index 1fad1eb0..31b64752 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_vendor_comment.py +++ b/vulncheck_sdk/aio/models/api_nvd20_vendor_comment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20VendorComment(BaseModel): """ - ApiNVD20VendorComment + api.NVD20VendorComment """ # noqa: E501 comment: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/aio/models/api_nvd20_weakness.py b/vulncheck_sdk/aio/models/api_nvd20_weakness.py index fa6db8b4..cddc4254 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_weakness.py +++ b/vulncheck_sdk/aio/models/api_nvd20_weakness.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20Weakness(BaseModel): """ - ApiNVD20Weakness + api.NVD20Weakness """ # noqa: E501 description: Optional[List[ApiNVD20Description]] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_weakness_desc_extended.py b/vulncheck_sdk/aio/models/api_nvd20_weakness_desc_extended.py index cde274ca..023fafa5 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_weakness_desc_extended.py +++ b/vulncheck_sdk/aio/models/api_nvd20_weakness_desc_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20WeaknessDescExtended(BaseModel): """ - ApiNVD20WeaknessDescExtended + api.NVD20WeaknessDescExtended """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_nvd20_weakness_extended.py b/vulncheck_sdk/aio/models/api_nvd20_weakness_extended.py index 2659a30a..48bb0770 100644 --- a/vulncheck_sdk/aio/models/api_nvd20_weakness_extended.py +++ b/vulncheck_sdk/aio/models/api_nvd20_weakness_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20WeaknessExtended(BaseModel): """ - ApiNVD20WeaknessExtended + api.NVD20WeaknessExtended """ # noqa: E501 description: Optional[List[ApiNVD20WeaknessDescExtended]] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_oss_package.py b/vulncheck_sdk/aio/models/api_oss_package.py index 2f4cd9d4..b5fab589 100644 --- a/vulncheck_sdk/aio/models/api_oss_package.py +++ b/vulncheck_sdk/aio/models/api_oss_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiOSSPackage(BaseModel): """ - ApiOSSPackage + api.OSSPackage """ # noqa: E501 artifacts: Optional[ApiOSSPackageArtifacts] = None cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/aio/models/api_oss_package_artifacts.py b/vulncheck_sdk/aio/models/api_oss_package_artifacts.py index 41b7a948..9468f9e0 100644 --- a/vulncheck_sdk/aio/models/api_oss_package_artifacts.py +++ b/vulncheck_sdk/aio/models/api_oss_package_artifacts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiOSSPackageArtifacts(BaseModel): """ - ApiOSSPackageArtifacts + api.OSSPackageArtifacts """ # noqa: E501 binary: Optional[List[ApiOSSPackageDownloadInfo]] = None source: Optional[List[ApiOSSPackageDownloadInfo]] = None diff --git a/vulncheck_sdk/aio/models/api_oss_package_download_info.py b/vulncheck_sdk/aio/models/api_oss_package_download_info.py index 17098698..dcaaf095 100644 --- a/vulncheck_sdk/aio/models/api_oss_package_download_info.py +++ b/vulncheck_sdk/aio/models/api_oss_package_download_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiOSSPackageDownloadInfo(BaseModel): """ - ApiOSSPackageDownloadInfo + api.OSSPackageDownloadInfo """ # noqa: E501 hashes: Optional[List[ApiOSSPackageHashInfo]] = None reference: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_oss_package_hash_info.py b/vulncheck_sdk/aio/models/api_oss_package_hash_info.py index 69127d85..1f70b0ce 100644 --- a/vulncheck_sdk/aio/models/api_oss_package_hash_info.py +++ b/vulncheck_sdk/aio/models/api_oss_package_hash_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageHashInfo(BaseModel): """ - ApiOSSPackageHashInfo + api.OSSPackageHashInfo """ # noqa: E501 algorithm: Optional[StrictStr] = Field(default=None, description="See OSSPackageHashInfoAlgo* consts") type: Optional[StrictStr] = Field(default=None, description="See OSSPackageHashInfoType* consts") diff --git a/vulncheck_sdk/aio/models/api_oss_package_research_attributes.py b/vulncheck_sdk/aio/models/api_oss_package_research_attributes.py index 8270d560..ad7a4996 100644 --- a/vulncheck_sdk/aio/models/api_oss_package_research_attributes.py +++ b/vulncheck_sdk/aio/models/api_oss_package_research_attributes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageResearchAttributes(BaseModel): """ - ApiOSSPackageResearchAttributes + api.OSSPackageResearchAttributes """ # noqa: E501 abandoned: Optional[StrictBool] = None eol: Optional[StrictBool] = None diff --git a/vulncheck_sdk/aio/models/api_oss_package_vulnerability.py b/vulncheck_sdk/aio/models/api_oss_package_vulnerability.py index 4396ced4..268db590 100644 --- a/vulncheck_sdk/aio/models/api_oss_package_vulnerability.py +++ b/vulncheck_sdk/aio/models/api_oss_package_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageVulnerability(BaseModel): """ - ApiOSSPackageVulnerability + api.OSSPackageVulnerability """ # noqa: E501 detection: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_package.py b/vulncheck_sdk/aio/models/api_package.py index 4ce53125..fdb9b622 100644 --- a/vulncheck_sdk/aio/models/api_package.py +++ b/vulncheck_sdk/aio/models/api_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiPackage(BaseModel): """ - ApiPackage + api.Package """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = Field(default=None, description="sort") diff --git a/vulncheck_sdk/aio/models/api_problem_type.py b/vulncheck_sdk/aio/models/api_problem_type.py index f015c866..a8387032 100644 --- a/vulncheck_sdk/aio/models/api_problem_type.py +++ b/vulncheck_sdk/aio/models/api_problem_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemType(BaseModel): """ - ApiProblemType + api.ProblemType """ # noqa: E501 problemtype_data: Optional[List[ApiProblemTypeData]] = None __properties: ClassVar[List[str]] = ["problemtype_data"] diff --git a/vulncheck_sdk/aio/models/api_problem_type_data.py b/vulncheck_sdk/aio/models/api_problem_type_data.py index 35000bc8..ce766e66 100644 --- a/vulncheck_sdk/aio/models/api_problem_type_data.py +++ b/vulncheck_sdk/aio/models/api_problem_type_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeData(BaseModel): """ - ApiProblemTypeData + api.ProblemTypeData """ # noqa: E501 description: Optional[List[ApiProblemTypeDescription]] = None __properties: ClassVar[List[str]] = ["description"] diff --git a/vulncheck_sdk/aio/models/api_problem_type_data_extended.py b/vulncheck_sdk/aio/models/api_problem_type_data_extended.py index f2f06428..a00f3337 100644 --- a/vulncheck_sdk/aio/models/api_problem_type_data_extended.py +++ b/vulncheck_sdk/aio/models/api_problem_type_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeDataExtended(BaseModel): """ - ApiProblemTypeDataExtended + api.ProblemTypeDataExtended """ # noqa: E501 description: Optional[List[ApiProblemTypeDescriptionExtended]] = None __properties: ClassVar[List[str]] = ["description"] diff --git a/vulncheck_sdk/aio/models/api_problem_type_description.py b/vulncheck_sdk/aio/models/api_problem_type_description.py index 86ac9430..78c5be19 100644 --- a/vulncheck_sdk/aio/models/api_problem_type_description.py +++ b/vulncheck_sdk/aio/models/api_problem_type_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiProblemTypeDescription(BaseModel): """ - ApiProblemTypeDescription + api.ProblemTypeDescription """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_problem_type_description_extended.py b/vulncheck_sdk/aio/models/api_problem_type_description_extended.py index cc2277fd..0390e44d 100644 --- a/vulncheck_sdk/aio/models/api_problem_type_description_extended.py +++ b/vulncheck_sdk/aio/models/api_problem_type_description_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiProblemTypeDescriptionExtended(BaseModel): """ - ApiProblemTypeDescriptionExtended + api.ProblemTypeDescriptionExtended """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_problem_type_extended.py b/vulncheck_sdk/aio/models/api_problem_type_extended.py index 6741e090..2b3794b3 100644 --- a/vulncheck_sdk/aio/models/api_problem_type_extended.py +++ b/vulncheck_sdk/aio/models/api_problem_type_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeExtended(BaseModel): """ - ApiProblemTypeExtended + api.ProblemTypeExtended """ # noqa: E501 problemtype_data: Optional[List[ApiProblemTypeDataExtended]] = None __properties: ClassVar[List[str]] = ["problemtype_data"] diff --git a/vulncheck_sdk/aio/models/api_reference.py b/vulncheck_sdk/aio/models/api_reference.py index 1f4c17af..8e082aad 100644 --- a/vulncheck_sdk/aio/models/api_reference.py +++ b/vulncheck_sdk/aio/models/api_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReference(BaseModel): """ - ApiReference + api.Reference """ # noqa: E501 href: Optional[StrictStr] = Field(default=None, description="sort") id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_reference_data.py b/vulncheck_sdk/aio/models/api_reference_data.py index d4bc1639..87e4ced4 100644 --- a/vulncheck_sdk/aio/models/api_reference_data.py +++ b/vulncheck_sdk/aio/models/api_reference_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReferenceData(BaseModel): """ - ApiReferenceData + api.ReferenceData """ # noqa: E501 name: Optional[StrictStr] = None refsource: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_reference_data_extended.py b/vulncheck_sdk/aio/models/api_reference_data_extended.py index b2b98c4a..5cdc1c74 100644 --- a/vulncheck_sdk/aio/models/api_reference_data_extended.py +++ b/vulncheck_sdk/aio/models/api_reference_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReferenceDataExtended(BaseModel): """ - ApiReferenceDataExtended + api.ReferenceDataExtended """ # noqa: E501 date_added: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_references.py b/vulncheck_sdk/aio/models/api_references.py index 799bd742..06c509df 100644 --- a/vulncheck_sdk/aio/models/api_references.py +++ b/vulncheck_sdk/aio/models/api_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiReferences(BaseModel): """ - ApiReferences + api.References """ # noqa: E501 reference_data: Optional[List[ApiReferenceData]] = None __properties: ClassVar[List[str]] = ["reference_data"] diff --git a/vulncheck_sdk/aio/models/api_references_extended.py b/vulncheck_sdk/aio/models/api_references_extended.py index 0c990f33..710f0ab3 100644 --- a/vulncheck_sdk/aio/models/api_references_extended.py +++ b/vulncheck_sdk/aio/models/api_references_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiReferencesExtended(BaseModel): """ - ApiReferencesExtended + api.ReferencesExtended """ # noqa: E501 reference_data: Optional[List[ApiReferenceDataExtended]] = Field(default=None, description="ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"` ThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"` RansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"` AdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"` IdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`") __properties: ClassVar[List[str]] = ["reference_data"] diff --git a/vulncheck_sdk/aio/models/api_related_attack_pattern.py b/vulncheck_sdk/aio/models/api_related_attack_pattern.py index 5f43c4b4..a4b9e07e 100644 --- a/vulncheck_sdk/aio/models/api_related_attack_pattern.py +++ b/vulncheck_sdk/aio/models/api_related_attack_pattern.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiRelatedAttackPattern(BaseModel): """ - ApiRelatedAttackPattern + api.RelatedAttackPattern """ # noqa: E501 capec_id: Optional[StrictStr] = None capec_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_ssvc.py b/vulncheck_sdk/aio/models/api_ssvc.py index f8d6d4d5..f7f001cf 100644 --- a/vulncheck_sdk/aio/models/api_ssvc.py +++ b/vulncheck_sdk/aio/models/api_ssvc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiSSVC(BaseModel): """ - ApiSSVC + api.SSVC """ # noqa: E501 automatable: Optional[StrictStr] = None exploitation: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/api_temporal_cvssv2.py b/vulncheck_sdk/aio/models/api_temporal_cvssv2.py index af1dd13c..4cb7c379 100644 --- a/vulncheck_sdk/aio/models/api_temporal_cvssv2.py +++ b/vulncheck_sdk/aio/models/api_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiTemporalCVSSV2(BaseModel): """ - ApiTemporalCVSSV2 + api.TemporalCVSSV2 """ # noqa: E501 exploitability: Optional[StrictStr] = None remediation_level: Optional[StrictStr] = Field(default=None, alias="remediationLevel") diff --git a/vulncheck_sdk/aio/models/api_temporal_cvssv3.py b/vulncheck_sdk/aio/models/api_temporal_cvssv3.py index 8973c901..bfeeed2c 100644 --- a/vulncheck_sdk/aio/models/api_temporal_cvssv3.py +++ b/vulncheck_sdk/aio/models/api_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiTemporalCVSSV3(BaseModel): """ - ApiTemporalCVSSV3 + api.TemporalCVSSV3 """ # noqa: E501 exploit_code_maturity: Optional[StrictStr] = Field(default=None, alias="exploitCodeMaturity") remediation_level: Optional[StrictStr] = Field(default=None, alias="remediationLevel") diff --git a/vulncheck_sdk/aio/models/api_temporal_metric_v2.py b/vulncheck_sdk/aio/models/api_temporal_metric_v2.py index 09f3c38e..c4169010 100644 --- a/vulncheck_sdk/aio/models/api_temporal_metric_v2.py +++ b/vulncheck_sdk/aio/models/api_temporal_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiTemporalMetricV2(BaseModel): """ - ApiTemporalMetricV2 + api.TemporalMetricV2 """ # noqa: E501 cvss_v2: Optional[ApiTemporalCVSSV2] = Field(default=None, alias="cvssV2") __properties: ClassVar[List[str]] = ["cvssV2"] diff --git a/vulncheck_sdk/aio/models/api_temporal_metric_v3.py b/vulncheck_sdk/aio/models/api_temporal_metric_v3.py index d7b13b9a..206d15b4 100644 --- a/vulncheck_sdk/aio/models/api_temporal_metric_v3.py +++ b/vulncheck_sdk/aio/models/api_temporal_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiTemporalMetricV3(BaseModel): """ - ApiTemporalMetricV3 + api.TemporalMetricV3 """ # noqa: E501 cvss_v3: Optional[ApiTemporalCVSSV3] = Field(default=None, alias="cvssV3") __properties: ClassVar[List[str]] = ["cvssV3"] diff --git a/vulncheck_sdk/aio/models/api_update.py b/vulncheck_sdk/aio/models/api_update.py index 83142502..51853f16 100644 --- a/vulncheck_sdk/aio/models/api_update.py +++ b/vulncheck_sdk/aio/models/api_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime from vulncheck_sdk.aio.models.api_package import ApiPackage from vulncheck_sdk.aio.models.api_reference import ApiReference from typing import Optional, Set @@ -28,13 +27,13 @@ class ApiUpdate(BaseModel): """ - ApiUpdate + api.Update """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[ApiDateTime] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="api.DateTime") os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[ApiPackage]] = None @@ -42,7 +41,7 @@ class ApiUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[ApiDateTime] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="api.DateTime") __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": ApiDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [ApiPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": ApiDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/api_vuln_check_canary.py b/vulncheck_sdk/aio/models/api_vuln_check_canary.py index a17e97ef..db1d7026 100644 --- a/vulncheck_sdk/aio/models/api_vuln_check_canary.py +++ b/vulncheck_sdk/aio/models/api_vuln_check_canary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class ApiVulnCheckCanary(BaseModel): """ - ApiVulnCheckCanary + api.VulnCheckCanary """ # noqa: E501 category: Optional[StrictStr] = None client_fingerprints: Optional[ApiClientFingerprints] = None diff --git a/vulncheck_sdk/aio/models/api_vulnerability_alias.py b/vulncheck_sdk/aio/models/api_vulnerability_alias.py index e511dcbd..37290e95 100644 --- a/vulncheck_sdk/aio/models/api_vulnerability_alias.py +++ b/vulncheck_sdk/aio/models/api_vulnerability_alias.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiVulnerabilityAlias(BaseModel): """ - ApiVulnerabilityAlias + api.VulnerabilityAlias """ # noqa: E501 alias: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/models_entitlements.py b/vulncheck_sdk/aio/models/models_entitlements.py index d4ac7aa4..e36157fd 100644 --- a/vulncheck_sdk/aio/models/models_entitlements.py +++ b/vulncheck_sdk/aio/models/models_entitlements.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ModelsEntitlements(BaseModel): """ - ModelsEntitlements + models.Entitlements """ # noqa: E501 entitlements: Optional[Dict[str, List[StrictStr]]] = Field(default=None, description="Entitlements provides a map of roles to a list of entitlements") __properties: ClassVar[List[str]] = ["entitlements"] diff --git a/vulncheck_sdk/aio/models/paginate_match.py b/vulncheck_sdk/aio/models/paginate_match.py index 8a9215e3..ae68f4cf 100644 --- a/vulncheck_sdk/aio/models/paginate_match.py +++ b/vulncheck_sdk/aio/models/paginate_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PaginateMatch(BaseModel): """ - PaginateMatch + paginate.Match """ # noqa: E501 var_field: Optional[StrictStr] = Field(default=None, alias="field") value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/paginate_pagination.py b/vulncheck_sdk/aio/models/paginate_pagination.py index 93eb5dee..48a44c12 100644 --- a/vulncheck_sdk/aio/models/paginate_pagination.py +++ b/vulncheck_sdk/aio/models/paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class PaginatePagination(BaseModel): """ - PaginatePagination + paginate.Pagination """ # noqa: E501 cursor: Optional[StrictStr] = Field(default=None, description="Cursor for the current page") first_item: Optional[StrictInt] = Field(default=None, description="First and last Item") diff --git a/vulncheck_sdk/aio/models/paginate_param.py b/vulncheck_sdk/aio/models/paginate_param.py index 491e3085..043f0c5c 100644 --- a/vulncheck_sdk/aio/models/paginate_param.py +++ b/vulncheck_sdk/aio/models/paginate_param.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PaginateParam(BaseModel): """ - PaginateParam + paginate.Param """ # noqa: E501 filtering: Optional[StrictStr] = None format: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/params_index_backup.py b/vulncheck_sdk/aio/models/params_index_backup.py index bfb13c73..35cd6309 100644 --- a/vulncheck_sdk/aio/models/params_index_backup.py +++ b/vulncheck_sdk/aio/models/params_index_backup.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexBackup(BaseModel): """ - ParamsIndexBackup + params.IndexBackup """ # noqa: E501 date_added: Optional[StrictStr] = None filename: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/params_index_backup_list.py b/vulncheck_sdk/aio/models/params_index_backup_list.py index eeab7ede..f6e4b843 100644 --- a/vulncheck_sdk/aio/models/params_index_backup_list.py +++ b/vulncheck_sdk/aio/models/params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexBackupList(BaseModel): """ - ParamsIndexBackupList + params.IndexBackupList """ # noqa: E501 description: Optional[StrictStr] = None href: Optional[StrictStr] = Field(default=None, description="Href API endpoint URI to detailed backup information") diff --git a/vulncheck_sdk/aio/models/params_index_list.py b/vulncheck_sdk/aio/models/params_index_list.py index c82eb752..6e5d3755 100644 --- a/vulncheck_sdk/aio/models/params_index_list.py +++ b/vulncheck_sdk/aio/models/params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexList(BaseModel): """ - ParamsIndexList + params.IndexList """ # noqa: E501 description: Optional[StrictStr] = None href: Optional[StrictStr] = Field(default=None, description="Href API endpoint URI to detailed index information") diff --git a/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py b/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py index 534a8e9c..a5ad246e 100644 --- a/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py +++ b/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,11 +28,11 @@ class PurlBatchVulnFinding(BaseModel): """ - PurlBatchVulnFinding + purl.BatchVulnFinding """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") purl: Optional[StrictStr] = Field(default=None, description="the purl, ex. hex/coherence@0.1.2") - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None research_attributes: Optional[ApiOSSPackageResearchAttributes] = None vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") __properties: ClassVar[List[str]] = ["cves", "purl", "purl_struct", "research_attributes", "vulnerabilities"] diff --git a/vulncheck_sdk/aio/models/purl_package_urljson.py b/vulncheck_sdk/aio/models/purl_package_urljson.py index b2aa3310..c5506921 100644 --- a/vulncheck_sdk/aio/models/purl_package_urljson.py +++ b/vulncheck_sdk/aio/models/purl_package_urljson.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class PurlPackageURLJSON(BaseModel): """ - PurlPackageURLJSON + meta-data about the purl """ # noqa: E501 name: Optional[StrictStr] = None namespace: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/purl_qualifier_json.py b/vulncheck_sdk/aio/models/purl_qualifier_json.py index 4378c7dc..a7e42eb5 100644 --- a/vulncheck_sdk/aio/models/purl_qualifier_json.py +++ b/vulncheck_sdk/aio/models/purl_qualifier_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PurlQualifierJSON(BaseModel): """ - PurlQualifierJSON + purl.QualifierJSON """ # noqa: E501 key: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/purls_purl_response.py b/vulncheck_sdk/aio/models/purls_purl_response.py index 0fbc7aae..72a7d2be 100644 --- a/vulncheck_sdk/aio/models/purls_purl_response.py +++ b/vulncheck_sdk/aio/models/purls_purl_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.aio.models.purls_vulnerability import PurlsVulnerability from typing import Optional, Set @@ -26,9 +26,9 @@ class PurlsPurlResponse(BaseModel): """ - PurlsPurlResponse + purls.PurlResponse """ # noqa: E501 - artifacts: Optional[Dict[str, Any]] = None + artifacts: Optional[Dict[str, Any]] = Field(default=None, description="purls.Artifact") cves: Optional[List[StrictStr]] = None licenses: Optional[List[StrictStr]] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/purls_vulnerability.py b/vulncheck_sdk/aio/models/purls_vulnerability.py index 146342b1..44203f0b 100644 --- a/vulncheck_sdk/aio/models/purls_vulnerability.py +++ b/vulncheck_sdk/aio/models/purls_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PurlsVulnerability(BaseModel): """ - PurlsVulnerability + purls.Vulnerability """ # noqa: E501 arch: Optional[StrictStr] = None detection: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/render_response_array_params_index_backup_list.py b/vulncheck_sdk/aio/models/render_response_array_params_index_backup_list.py index 5fab78fd..9001d66a 100644 --- a/vulncheck_sdk/aio/models/render_response_array_params_index_backup_list.py +++ b/vulncheck_sdk/aio/models/render_response_array_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseArrayParamsIndexBackupList(BaseModel): """ - RenderResponseArrayParamsIndexBackupList + render.Response-array_params_IndexBackupList """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") data: Optional[List[ParamsIndexBackupList]] = None diff --git a/vulncheck_sdk/aio/models/render_response_array_params_index_list.py b/vulncheck_sdk/aio/models/render_response_array_params_index_list.py index 41c71ad6..1d6ebc09 100644 --- a/vulncheck_sdk/aio/models/render_response_array_params_index_list.py +++ b/vulncheck_sdk/aio/models/render_response_array_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseArrayParamsIndexList(BaseModel): """ - RenderResponseArrayParamsIndexList + render.Response-array_params_IndexList """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") data: Optional[List[ParamsIndexList]] = None diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py index b2389682..c369a1e8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination + render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py index 9856d17a..f4227283 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index c02caa09..f00565ff 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination + render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index fd977b6c..7107b6b3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination + render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py index 73c82304..beaed9dc 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination + render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index b318af3f..e197d961 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py index 0c7184c7..bafaad07 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination + render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py index 1bdac82a..0e2ec65d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py index 12b0bf42..afe37dd3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination + render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py index 64ccc349..c14aee9d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination + render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py index 9b7da056..4c6e8461 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination + render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py index 5b514dd2..9bd01e45 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination + render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py index b2d266a7..71034671 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination + render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py index 42172f96..1f257412 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination + render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py index 8fe57869..63c40d87 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py index 65066c19..8978910a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination + render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py index dd3a121a..844f47e2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination + render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py index dd801847..8f68d148 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination + render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py index 3a865e51..b677f2d9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py index 13ac75bf..0f041d07 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py index b7419456..32a63bf0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index c01ad5b0..e7b7d009 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py index 7618f8fd..28e28b93 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py index 6a3d0ada..a12fd397 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index 89d92d70..f9d0d857 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py index 9af7beb8..a9e1276f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index 61cd8929..1a6e35f5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py index e5a3989c..b6f926b9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py index 002243ea..669a17be 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 250abb4c..ec4a24c5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 408e4447..20107b66 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py index c6e4bc5c..673249b9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py index 31fdc82a..d50ead0a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index 34c4fa66..f3c74519 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index c1f5ddb0..cf86d567 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index d57e9811..15606ab0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py index 4ac0bf60..70738a15 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination + render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py index 6c6d244f..6f5b146d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index b642d72f..ecd29a1c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py index ca89dc4e..8ceaacf2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py index c107dd18..e7360b0e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py index 91d8b484..8fcf1c06 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index 1a8bace3..33eaa930 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index 91ff0b9d..87d1aae3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 05cde375..d3cbc82e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination + render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py index ce23c0dd..d5a8127c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination + render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py index f9ebf77f..ffecbf9b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py index e544d6a7..b259e13a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination + render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py index a19b4d92..cde0f50c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination + render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py index 83b5c851..acd0c84c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination + render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py index 46f7191a..75e0c2d0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination + render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index 8bf4e3fb..8947070c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination + render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py index 6e57e41d..5c413094 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination + render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py index b831854b..8657ce24 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination + render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py index b29687ec..e0df2438 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination + render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py index e4e4386e..b7e071ea 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py index 578ad70a..d6891940 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination + render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py index 8a4bdba6..3b0b7d4a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination + render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 99387085..5e61abd8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination + render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py index e5b2e585..df9596b2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination + render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py index 979d71b2..fbf95af0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination + render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py index 8f00206e..35964567 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination + render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py index 696b46b5..78ab55c2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py index 25ae0f23..64265550 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination + render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index bfa783f8..6aff3bf6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination + render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py index fdf9170b..0688779f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination + render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py index ec2fe2a4..5f6d367e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination + render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py index 70e8e50e..60f08ba7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination + render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py index eaa0fa08..f60cd9cd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py index ed4caadb..dba6d9c5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination + render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py index 836e9416..5bb820f4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index 8c5e18ed..34d770fb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py index 4f5dcb77..39634e95 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index 817a2ed7..b952e1b1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination + render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py index 7ad1eb05..f539f27a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py index c97cc843..581b3a7b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index 1d1c9b48..7bc0c3b2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination + render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py index 740c3bc4..8cc3f788 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination + render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py index 1c0a2545..3785d17f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination + render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py index df72560c..2abbabe3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination + render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py index b373a2e9..ea5b5972 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination + render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py index 646b764c..eb86be56 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py index 7610aa23..4b7b89bd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py index f70dde15..8bc0de1b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination + render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py index 144cdac4..4b286382 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py index 436e8e51..7682b742 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py index 14dbcc98..4aba47b3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py index 1680dd64..8c936c06 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination + render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py index 045d66e8..c8b22809 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination + render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py index 9d7a5d3b..bc244ce1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination + render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py index dca2703b..a0454237 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index b5691119..941d59e1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination + render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py index df7f37bd..c934bcde 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py index f532fe75..d4719d86 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination + render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py index 7d802031..c82da723 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination + render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py index bc7c0487..49ddc6c3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py index 4139ce64..5e16f941 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination + render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py index 310fe170..2ba7869d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination + render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py index 53746e1a..9e25f03b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination + render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py index 96241f5c..4b0abf0a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination + render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py index 4321cac4..b688b521 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination + render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py index ac96d51b..fd609f4f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 416ea0cc..eaf9d5dd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination + render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py index 49552c50..c0b01b1b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index aaf97e24..54ea26ed 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py index e29de7cd..161f475f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py index c40e1f7a..e4d31fcd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py index 0de99457..0be161a4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index b6c1d379..a961be3f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination + render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py index 68ae5a50..18f19e3b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py index 6d3d2b1b..6575ed40 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination + render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py index fec57a75..4e49f82e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination + render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py index 2bd24872..2ce91183 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination + render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py index 068ff874..4f89d058 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py index 90cebe85..cee9db1e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination + render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py index 6c31f494..2464d4c0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py index a69db6a3..6ad4805f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination + render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py index 9b018efb..ba8485d2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py index 63250307..7f56a05e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination + render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py index f85d07f3..9bb021f0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination + render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py index cc32fe9c..04528a3f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination + render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index 03bd4a59..86c51955 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination + render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index 79f0f51d..9f610684 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 992d601a..6fe86bbf 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination + render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py index 3103d8ec..b69ecf63 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination + render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py index 6c9c84be..bb2064ae 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination + render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index ba4a94d6..a16b67d2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py index b8dd7ccd..7f674caa 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination + render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py index bd51308c..d767816b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py index 80525cb1..d1fd06a4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination + render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py index 1079b74d..a03e7fa4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py index 171c69e8..607ed8b4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination + render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index b4ecd8e6..d7000214 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination + render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py index 0b13bae0..3a34f97b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination + render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py index 721b4533..4d264875 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index 5b3bdeed..fd06a7e7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination + render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py index e14e5313..342d2056 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination + render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py index 8915aefb..8ed9ff7e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py index ef266713..7f4fd2f9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination + render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py index 6d406186..719e4373 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination + render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py index ffe6de56..a0ade44f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination + render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py index 55d14e41..93e6d789 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index 641f1198..22b1b014 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination + render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py index 031802f7..e04f83b8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination + render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py index acc6e122..67baf7cf 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py index 77ead624..c80d4419 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py index 317d1a9c..3bc1b2d5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py index 9b5d3351..51e18bc5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination + render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py index 300cf2cf..057b87c7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination + render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py index c0c5d7a4..62d8b5d0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination + render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py index 3f31ff6f..a5614c45 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination + render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index fc829ce3..3d9a21c5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination + render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py index d0105ea3..b980a397 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination + render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index 77449c73..62e9c0d0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination + render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py index 1f3ee0fd..7ea6b1de 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination + render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py index bb951f9f..6304ef4b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination + render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index cdcf1aed..121ca0c6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination + render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index 4814eb33..268a80b6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py index 0c04e638..d55ed1b2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination + render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py index 8c7a5c80..6d7d3e8e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py index 9d9522be..0199c16d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination + render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py index cbe15f67..ff399cd4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination + render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py index 68894f6f..3c429793 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination + render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py index 0d680da7..fdf75d9b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination + render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index 6499c0bd..5b7c84aa 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination + render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index e7a95373..1b5efd49 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination + render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py index f1a5cc13..39d30db6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py index 4ef18be8..5ec48985 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination + render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 9aefc5b4..67837849 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination + render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index fcd47b49..f540c248 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination + render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index 22b67a51..89e96f92 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination + render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index 80ea9893..6d079f2e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination + render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py index fee65500..67061a9a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py index f28172ec..1f244d1c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index ba0b45f0..92401131 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py index 4cbb6ad0..a7c76baa 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py index 609ef83a..7c324f59 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination + render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py index 25e56f8e..45577412 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py index c582e67c..03d2788b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination + render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index ba83ff40..850c3b85 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination + render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py index 69708546..5c4954af 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination + render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py index 4274064b..c51ff519 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination + render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py index 44cb93d0..f8a97de8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination + render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index 45705e1c..3260e6ec 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination + render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py index 41486bea..cebe4cf8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination + render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index c9ec41c2..56317177 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py index 2191c574..8a5580e2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination + render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py index 5ceeeba7..3b2e4efd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination + render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py index 836d5304..13e8adea 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py index f5b82135..5f951af7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination + render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py index 5f66521d..a40499ea 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination + render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py index a05c7796..1686aff1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination + render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py index 8bf338a5..58d67f79 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index a82fbdb2..246218f0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination + render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py index ff570d3f..f4384580 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination + render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py index 9d8d2fd8..f1b0aa2b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination + render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py index 7e9b0b96..4b3038b4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination + render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py index abd03403..0775c92b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination + render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py index 0d4f99a5..34fbd20d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination + render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py index 13ba15b7..c1e4d191 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination + render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index f41593dd..21102b03 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination + render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py index 226b37a4..cdb95508 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination + render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py index 6f09839a..3cdd4fd0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination + render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py index 8bf293c8..10e5a1ad 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py index 2fe783a7..c4e0d883 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination + render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py index 33c16f6a..2f5e6832 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination + render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py index b8e805ae..b9db8f56 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py index 59ecd733..ec12249b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py index fd21d69d..759c9079 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination + render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py index f656b2e7..b75fdcc7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index ace50191..6b51b4c0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination + render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index 4ba20a8b..abdd34d2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination + render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index fc4a653f..3247335e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination + render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py index ee927f02..f89a90da 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination + render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py index a055b29e..fa8b3b1c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination + render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index 7bb006aa..69b4f5bd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py index 752b053f..aa7d97c8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination + render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py index 81f68ca4..c791aa22 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination + render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py index b300905e..52c114d9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination + render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py index 5ce84af0..fa81c74d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination + render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py index a93296ac..141d0126 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination + render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py index ed787eae..752e60ec 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py index 369450e8..dab205bc 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py index a1a291a4..30578890 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination + render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py index 86fe85df..c469d0d4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index a4c485d2..6533212d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination + render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py index a3cc48b2..97f19099 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination + render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py index 987a8df2..c19aab5a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination + render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py index 0c212f4f..ea8ec9b7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py index 79d61f52..a9c4faa7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination + render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py index 166e2c48..561ae11f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination + render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py index 8b052c03..165f3dc2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination + render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index a9efc8a8..4b5a6798 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination + render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index b2e9e395..762cc991 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination + render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py index 94dc9b0b..d24e7802 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination + render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index 75e6b2f6..802ec077 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index ec271a11..6c46cd68 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py index 681cf949..e1614619 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination + render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py index 36996431..40b4c747 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination + render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py index 42e9f912..880bb4b7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination + render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py index d2031e7c..5fbcb262 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py index cbfdb3c5..d9877121 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination + render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py index d9e63695..aaf610a1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination + render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index e1e2cc04..437c99f8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination + render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py index d2aa8974..7a42eb60 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index 8104da0f..12325d8d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index 56fe636f..fb041786 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index c53dfda5..af929bd4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py index 2898bf20..8613001a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index 6ea6444a..a3badba9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination + render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index dc1f8c47..e35dfc52 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination + render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py index 5b7728a4..e8bcfb00 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination + render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index 5363b224..76368f5b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination + render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index 02be7e06..4d622397 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination + render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py index f786ee52..8ccfac1d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py index 6c42c2ec..1d012b48 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination + render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index 54c719dd..c2a6edc5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py index 1f9675cb..f59f8620 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 21fe58f8..2bf8aecb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination + render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index 535e2dec..afb7f30b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination + render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index e5d61552..8dd43f8c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py index 23498555..707e7878 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination + render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py index dc35f271..b5f6cb43 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination + render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py index a343f12f..cb977a67 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination + render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py index b918eef1..3659159f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination + render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index a3d4d28c..a47c0ab7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination + render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py index 4c6ac1c0..585048eb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination + render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py index 28b4f815..a5e9f46a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination + render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py index 9cd5611e..dc993995 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination + render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py index 1e834f7d..2a1d5822 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py index 1dcd7f90..cf076dfb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination + render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py index 767008e9..187b2b90 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination + render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py index 83482d25..be7c8166 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination + render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py index 40804b67..7b567ad4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index 79fc0b89..caf05c61 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination + render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index d635745f..112227d1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination + render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index 0b8abf1b..747a2051 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination + render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py index a2eaf005..d15d0c59 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination + render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py index a7eecd94..5af0e139 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination + render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index d29bf46b..cb6649d0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination + render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py index 41c39f5a..3e20d3cc 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination + render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py index 7c71f0b4..1a50fb2f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py index a61d8339..1df4a471 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination + render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py index 1bca7321..8d3d1a8b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination + render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 9bcaff9f..a914ee18 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination + render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index 77a338b2..c4e37f53 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination + render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py index 963e258b..848b7ba8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py index 67cafe5a..3242da06 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index 69035fdf..51a6da35 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index bb3bce3a..6d6f60bc 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py index 1707e9e3..1e5c6e75 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py index f5a6f5d8..717b1941 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 3611e6ac..243a08f2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination + render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py index afdf774a..fcf42be2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination + render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 7936622b..d2a0f60c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py index 5d447679..1dd44969 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination + render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py index 871d7e43..de79fcb9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination + render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index 6403e960..56e24e38 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination + render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py index 8e0767b1..1858882c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py index 23d253f3..6f279c8b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination + render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py index dffd373c..d44aa1b8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index 4d17a381..0dd7f599 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination + render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py index 1f05c21c..ad29ca94 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination + render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py index 3fbd3a48..8a9ccccd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination + render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py index 5148d5b5..f5964805 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py index 42f0fb73..48df50f1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index 4f4d1e5d..7284a3a1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination + render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index ea861aec..85e68446 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination + render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py index 554643ec..ad16a64f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination + render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index a2128615..89bd53f7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination + render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py index 5402f759..bf01b791 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination + render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index 9d2559a1..de7d5671 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination + render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index ff99f2a6..83e07caf 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination + render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py index c87df9ff..82d765d9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination + render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index e0dcc4ff..f2a87271 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py index 718189cc..4b09c519 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py index 742df443..298907b9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination + render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index 69af56f4..b5bd8d4b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination + render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py index 15571a98..51aeb661 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination + render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py index f2ef7c29..83382c58 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination + render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py index 6ca4f80a..96cc10a7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination + render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py index 18ab2661..ab253edb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 38e9175b..60452913 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py index 367056c3..f8adee47 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index 84a8c17b..8c0e3895 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination + render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py index 40205835..b35cc8ea 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination + render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index a4b3ba1d..38b41d3b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py index 13b25781..d5e0f3d7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination + render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py index a56e6a14..904f2787 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination + render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py index fe7a7fe3..cc9c42e9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination + render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 4e221bc7..23aa0606 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination + render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index 624569a6..e7a9e848 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination + render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py index f836824d..328ca765 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py index 1d56e767..10c2a782 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py index d1d4d28c..fa1a2ed3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination + render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py index b53ec593..e9c4a9fd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py index 12eb5c44..fdb2237e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination + render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py index 4c37a0fc..cb399732 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination + render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index fd6ca2b0..f31294ce 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination + render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py index 7345b897..3754ec7e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination + render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py index 96125469..48c79b6b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination + render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py index 053176f1..ecdea142 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index 05d9322c..cb00b2a8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination + render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index ffa5121c..3a50fd42 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination + render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py index d6888645..b9efe967 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination + render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py index ab323994..738fb3f0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination + render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py index 70739653..60df7c47 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py index 81f629ad..ac8adea9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySelPaginatePagination + render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py index bff23286..90753be2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination + render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index 641bb1db..d2c1a7c9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination + render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index 3678ebb6..9433b12e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination + render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py index 8b70f450..ab53d23e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index c3616660..d06b0378 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination + render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py index a959494c..a1fae24d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySickPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySickPaginatePagination + render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index a0193cae..9cb8c75f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py index 90b0b6fd..05e43ad0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination + render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index a9c9b159..4c462aa3 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination + render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py index c4462743..75ba715c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination + render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py index 23a627e8..576cbb07 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination + render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index dd60d56d..4b7bafca 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination + render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py index 8dfc8b5e..0a0812fa 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 871aadbe..e384d074 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination + render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index 667fa56b..40a4de54 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination + render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py index a71d94d5..1fcfcb3d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index 3b53a401..51b3edf4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py index 8ff37916..0ba1712f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination + render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py index 0d52a322..e3ec7a0f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination + render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py index a23206d1..bbd2d71a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py index eed251fa..a07b16c6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination + render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py index 1053ec95..735df101 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py index bb89b975..cc6948b9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination + render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 94b550d1..fc9d5865 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py index 9c530180..e202abec 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index c02ba27b..fb2f2cfb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination + render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index 9c7735dc..366481d2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination + render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py index 416055c6..296c5b0b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination + render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py index 69534d41..1839126e 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination + render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py index e495c2be..3a58d102 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination + render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index 23a93731..3d810c89 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination + render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py index b084f1ae..bac9dc14 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py index e9515abe..2953818a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination + render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py index f0e80749..5916724d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py index b9b57c8f..4362c709 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination + render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py index 738bea3c..6533d548 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination + render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py index 0984780c..39c3673f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index cfdafc1c..a2373c8d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination + render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py index 0c2796f6..2380e089 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination + render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py index 86769858..ec0d85d6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination + render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py index f18d0f23..7e0be89f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination + render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py index 1ecd3bd5..459d4204 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py index f9f13844..6be11d50 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination + render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py index 6740a2b0..a0092bad 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination + render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index ce1b2d72..4adbdda5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination + render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py index 8d79cd86..d7e1cb7d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py index 2aa4dfba..b0e0562a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination + render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py index b4110e71..0f131ebb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py index 822de270..ef008f1b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination + render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py index f2c1a274..2a53a2db 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination + render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py index 52e67ac3..dad115cc 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination + render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py index b0059623..bb28b28c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination + render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py index 858d7f5b..37f06695 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 309b992a..8a5f8440 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination + render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py index 9f9f4820..bbded568 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py index 78a01a05..8c77effd 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination + render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py index bfc1c4c4..a06f2cf8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination + render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index 5bb8e04b..ce1ac898 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py index a9c63709..31c1c64b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination + render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py index bebf14a8..d4cba8d1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination + render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py index 2d2f4039..73a1744c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination + render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index ed146771..e74f3180 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination + render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py index ab80b389..5acb99ac 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index 1943bc0f..f0f44602 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination + render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py index 651a0503..f5c52402 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index d8d4ce97..10c645e2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index e5e8a732..372c8005 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py index 04d6ddba..6ac26680 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py index 454c2ade..ac4d180d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index c029929a..7b0a468d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination + render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index f014d6ae..294a8ed1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py index 340ce952..2b9ed830 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination + render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index 6c9594e8..2de45107 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination + render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 18e4cb36..104d173f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination + render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index 529a16b0..30c24a6c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination + render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index fa77b3f6..8470703f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination + render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py index 5816c8cf..bd10daf8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination + render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index ee9dc109..65d3874b 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination + render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py index 68509e37..10317ba2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination + render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py index a8b304ad..63028ce5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination + render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py index c3a32d45..e9587a13 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination + render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index bfb776da..948730a5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination + render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py index 0f52d470..f54a0284 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination + render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py index df6e1695..6b487656 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination + render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py index 874ceab8..7e76c5a1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination + render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py index 95733a1d..74c3d342 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index ee721b00..558f7ac6 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination + render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index fd54a0db..e7311010 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination + render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py index 1f5df532..375e8c8d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py index 2e796944..e5061dc5 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py index a5875e84..9eafe7f7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination + render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py index 50721f14..c07117f1 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination + render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index f6644532..c03a255a 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination + render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py index 482dbe6c..1249245f 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination + render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index 5f16b82a..af0ad858 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination + render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index 45ee559d..0ed3a6be 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination + render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py index f267d821..291fa7b2 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCveItemsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCveItemsPaginatePagination + render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py index ff8baae2..dcab3278 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCWEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCWEPaginatePagination + render.ResponseWithMetadata-array_api_CWE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py index 456e84ba..a1a4c234 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination + render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py index e8d04e11..18c2a4ff 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitChainPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitChainPaginatePagination + render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index d611d162..a59bc1ec 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination + render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index bb2dde35..60d7b5ee 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination + render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py index 9237a5f0..f45a7d31 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination + render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py index d1736d51..38daad57 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination + render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py index e68aeac9..8ca35b0c 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index 4d723184..e3a158f8 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index dc2fe712..966b90e7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py index 03d716fc..c8d1b0e7 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination + render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_update_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_update_paginate_pagination.py index 89586038..1e5cae14 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiUpdatePaginatePagination + render.ResponseWithMetadata-array_api_Update-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 304239eb..7c6069b0 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination + render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py index b9503d88..71d1ec29 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination + render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index f1d4f537..190925e9 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination + render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py b/vulncheck_sdk/aio/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py index f6ba8073..9acd5cdb 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseWithMetadataArrayStringV3controllersResponseMetadata(BaseModel): """ - RenderResponseWithMetadataArrayStringV3controllersResponseMetadata + render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py index c056f37b..b9fd7a70 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata + render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersBackupResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index 125bbc68..1dad4ad4 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata + render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersPurlResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index d650df8e..4b5c848d 100644 --- a/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/vulncheck_sdk/aio/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata + render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersPurlsResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/advisory_updated.py b/vulncheck_sdk/aio/models/search_error_response.py similarity index 77% rename from vulncheck_sdk/aio/models/advisory_updated.py rename to vulncheck_sdk/aio/models/search_error_response.py index 7d63dbe0..189d5c57 100644 --- a/vulncheck_sdk/aio/models/advisory_updated.py +++ b/vulncheck_sdk/aio/models/search_error_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,17 +18,18 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictBool, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self -class AdvisoryUpdated(BaseModel): +class SearchErrorResponse(BaseModel): """ - AdvisoryUpdated + search.ErrorResponse """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] + error: Optional[StrictBool] = None + errors: Optional[List[StrictStr]] = None + __properties: ClassVar[List[str]] = ["error", "errors"] model_config = ConfigDict( populate_by_name=True, @@ -48,7 +49,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a JSON string""" + """Create an instance of SearchErrorResponse from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -73,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a dict""" + """Create an instance of SearchErrorResponse from a dict""" if obj is None: return None @@ -81,7 +82,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "date": obj.get("date") + "error": obj.get("error"), + "errors": obj.get("errors") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_relationship.py b/vulncheck_sdk/aio/models/search_v4_advisory_meta.py similarity index 66% rename from vulncheck_sdk/aio/models/advisory_relationship.py rename to vulncheck_sdk/aio/models/search_v4_advisory_meta.py index d921e8c5..faf0788f 100644 --- a/vulncheck_sdk/aio/models/advisory_relationship.py +++ b/vulncheck_sdk/aio/models/search_v4_advisory_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,19 +18,23 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictInt, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self -class AdvisoryRelationship(BaseModel): +class SearchV4AdvisoryMeta(BaseModel): """ - AdvisoryRelationship + search.V4AdvisoryMeta """ # noqa: E501 - product_reference: Optional[StrictStr] = Field(default=None, alias="productReference") - relates_to_product_reference: Optional[StrictStr] = Field(default=None, alias="relatesToProductReference") - relation_type: Optional[StrictStr] = Field(default=None, alias="relationType") - __properties: ClassVar[List[str]] = ["productReference", "relatesToProductReference", "relationType"] + cursor: Optional[StrictStr] = None + filtered: Optional[StrictInt] = None + limit: Optional[StrictInt] = None + next_cursor: Optional[StrictStr] = None + page: Optional[StrictInt] = None + pages: Optional[StrictInt] = None + total: Optional[StrictInt] = None + __properties: ClassVar[List[str]] = ["cursor", "filtered", "limit", "next_cursor", "page", "pages", "total"] model_config = ConfigDict( populate_by_name=True, @@ -50,7 +54,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a JSON string""" + """Create an instance of SearchV4AdvisoryMeta from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -75,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a dict""" + """Create an instance of SearchV4AdvisoryMeta from a dict""" if obj is None: return None @@ -83,9 +87,13 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "productReference": obj.get("productReference"), - "relatesToProductReference": obj.get("relatesToProductReference"), - "relationType": obj.get("relationType") + "cursor": obj.get("cursor"), + "filtered": obj.get("filtered"), + "limit": obj.get("limit"), + "next_cursor": obj.get("next_cursor"), + "page": obj.get("page"), + "pages": obj.get("pages"), + "total": obj.get("total") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_document_note.py b/vulncheck_sdk/aio/models/search_v4_advisory_return_value.py similarity index 58% rename from vulncheck_sdk/aio/models/advisory_document_note.py rename to vulncheck_sdk/aio/models/search_v4_advisory_return_value.py index fbdc7eb4..207864eb 100644 --- a/vulncheck_sdk/aio/models/advisory_document_note.py +++ b/vulncheck_sdk/aio/models/search_v4_advisory_return_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,19 +18,20 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.aio.models.advisory_mitre_cve_list_v5_ref import AdvisoryMitreCVEListV5Ref +from vulncheck_sdk.aio.models.search_v4_advisory_meta import SearchV4AdvisoryMeta from typing import Optional, Set from typing_extensions import Self -class AdvisoryDocumentNote(BaseModel): +class SearchV4AdvisoryReturnValue(BaseModel): """ - AdvisoryDocumentNote + search.V4AdvisoryReturnValue """ # noqa: E501 - text: Optional[StrictStr] = None - title: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["text", "title", "type"] + meta: Optional[SearchV4AdvisoryMeta] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryMitreCVEListV5Ref]] = None + __properties: ClassVar[List[str]] = ["_meta", "data"] model_config = ConfigDict( populate_by_name=True, @@ -50,7 +51,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a JSON string""" + """Create an instance of SearchV4AdvisoryReturnValue from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -71,11 +72,21 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items return _dict @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a dict""" + """Create an instance of SearchV4AdvisoryReturnValue from a dict""" if obj is None: return None @@ -83,9 +94,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "text": obj.get("text"), - "title": obj.get("title"), - "type": obj.get("type") + "_meta": SearchV4AdvisoryMeta.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryMitreCVEListV5Ref.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None }) return _obj diff --git a/vulncheck_sdk/models/advisory_cwe_node.py b/vulncheck_sdk/aio/models/search_v4_feed_item.py similarity index 81% rename from vulncheck_sdk/models/advisory_cwe_node.py rename to vulncheck_sdk/aio/models/search_v4_feed_item.py index 477c9d42..b08d74a8 100644 --- a/vulncheck_sdk/models/advisory_cwe_node.py +++ b/vulncheck_sdk/aio/models/search_v4_feed_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,15 +23,14 @@ from typing import Optional, Set from typing_extensions import Self -class AdvisoryCWENode(BaseModel): +class SearchV4FeedItem(BaseModel): """ - AdvisoryCWENode + search.V4FeedItem """ # noqa: E501 - cweid: Optional[StrictStr] = None description: Optional[StrictStr] = None - id: Optional[StrictStr] = None + href: Optional[StrictStr] = None name: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["cweid", "description", "id", "name"] + __properties: ClassVar[List[str]] = ["description", "href", "name"] model_config = ConfigDict( populate_by_name=True, @@ -51,7 +50,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a JSON string""" + """Create an instance of SearchV4FeedItem from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -76,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a dict""" + """Create an instance of SearchV4FeedItem from a dict""" if obj is None: return None @@ -84,9 +83,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cweid": obj.get("cweid"), "description": obj.get("description"), - "id": obj.get("id"), + "href": obj.get("href"), "name": obj.get("name") }) return _obj diff --git a/vulncheck_sdk/models/advisory_product_tree.py b/vulncheck_sdk/aio/models/search_v4_list_feed_return_value.py similarity index 69% rename from vulncheck_sdk/models/advisory_product_tree.py rename to vulncheck_sdk/aio/models/search_v4_list_feed_return_value.py index bc7bc3c1..66d652d9 100644 --- a/vulncheck_sdk/models/advisory_product_tree.py +++ b/vulncheck_sdk/aio/models/search_v4_list_feed_return_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,16 +20,16 @@ from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship +from vulncheck_sdk.aio.models.search_v4_feed_item import SearchV4FeedItem from typing import Optional, Set from typing_extensions import Self -class AdvisoryProductTree(BaseModel): +class SearchV4ListFeedReturnValue(BaseModel): """ - AdvisoryProductTree + search.V4ListFeedReturnValue """ # noqa: E501 - relationships: Optional[List[AdvisoryRelationship]] = None - __properties: ClassVar[List[str]] = ["relationships"] + data: Optional[List[SearchV4FeedItem]] = None + __properties: ClassVar[List[str]] = ["data"] model_config = ConfigDict( populate_by_name=True, @@ -49,7 +49,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a JSON string""" + """Create an instance of SearchV4ListFeedReturnValue from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -70,18 +70,18 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in relationships (list) + # override the default output from pydantic by calling `to_dict()` of each item in data (list) _items = [] - if self.relationships: - for _item_relationships in self.relationships: - if _item_relationships: - _items.append(_item_relationships.to_dict()) - _dict['relationships'] = _items + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items return _dict @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a dict""" + """Create an instance of SearchV4ListFeedReturnValue from a dict""" if obj is None: return None @@ -89,7 +89,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "relationships": [AdvisoryRelationship.from_dict(_item) for _item in obj["relationships"]] if obj.get("relationships") is not None else None + "data": [SearchV4FeedItem.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None }) return _obj diff --git a/vulncheck_sdk/aio/models/v3controllers_backup_response_metadata.py b/vulncheck_sdk/aio/models/v3controllers_backup_response_metadata.py index db62c35e..1062db45 100644 --- a/vulncheck_sdk/aio/models/v3controllers_backup_response_metadata.py +++ b/vulncheck_sdk/aio/models/v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class V3controllersBackupResponseMetadata(BaseModel): """ - V3controllersBackupResponseMetadata + v3controllers.BackupResponseMetadata """ # noqa: E501 index: Optional[StrictStr] = None timestamp: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/v3controllers_purl_response_data.py b/vulncheck_sdk/aio/models/v3controllers_purl_response_data.py index a1780f8c..9ba68e71 100644 --- a/vulncheck_sdk/aio/models/v3controllers_purl_response_data.py +++ b/vulncheck_sdk/aio/models/v3controllers_purl_response_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class V3controllersPurlResponseData(BaseModel): """ - V3controllersPurlResponseData + v3controllers.PurlResponseData """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") diff --git a/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py b/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py index 72235c4f..81892ee9 100644 --- a/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class V3controllersPurlResponseMetadata(BaseModel): """ - V3controllersPurlResponseMetadata + v3controllers.PurlResponseMetadata """ # noqa: E501 - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") __properties: ClassVar[List[str]] = ["purl_struct", "timestamp", "total_documents"] diff --git a/vulncheck_sdk/aio/models/v3controllers_purls_response_metadata.py b/vulncheck_sdk/aio/models/v3controllers_purls_response_metadata.py index d378269a..ef95d61d 100644 --- a/vulncheck_sdk/aio/models/v3controllers_purls_response_metadata.py +++ b/vulncheck_sdk/aio/models/v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class V3controllersPurlsResponseMetadata(BaseModel): """ - V3controllersPurlsResponseMetadata + v3controllers.PurlsResponseMetadata """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") diff --git a/vulncheck_sdk/aio/models/v3controllers_response_metadata.py b/vulncheck_sdk/aio/models/v3controllers_response_metadata.py index 0b99cd4a..0bce558d 100644 --- a/vulncheck_sdk/aio/models/v3controllers_response_metadata.py +++ b/vulncheck_sdk/aio/models/v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class V3controllersResponseMetadata(BaseModel): """ - V3controllersResponseMetadata + v3controllers.ResponseMetadata """ # noqa: E501 cpe: Optional[StrictStr] = None cpe_struct: Optional[ApiCPE] = None diff --git a/vulncheck_sdk/aio/rest.py b/vulncheck_sdk/aio/rest.py index 663d698f..812a194c 100644 --- a/vulncheck_sdk/aio/rest.py +++ b/vulncheck_sdk/aio/rest.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/vulncheck_sdk/api/__init__.py b/vulncheck_sdk/api/__init__.py index c48579b9..4f7891e1 100644 --- a/vulncheck_sdk/api/__init__.py +++ b/vulncheck_sdk/api/__init__.py @@ -1,6 +1,7 @@ # flake8: noqa # import apis into api package +from vulncheck_sdk.api.advisory_api import AdvisoryApi from vulncheck_sdk.api.endpoints_api import EndpointsApi from vulncheck_sdk.api.indices_api import IndicesApi diff --git a/vulncheck_sdk/api/advisory_api.py b/vulncheck_sdk/api/advisory_api.py new file mode 100644 index 00000000..8384e556 --- /dev/null +++ b/vulncheck_sdk/api/advisory_api.py @@ -0,0 +1,869 @@ +# coding: utf-8 + +""" + VulnCheck API + + VulnCheck API (v3 + v4) + + The version of the OpenAPI document: latest + Contact: support@vulncheck.com + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + +import warnings +from pydantic import validate_call, Field, StrictFloat, StrictStr, StrictInt +from typing import Any, Dict, List, Optional, Tuple, Union +from typing_extensions import Annotated + +from pydantic import Field, StrictInt, StrictStr +from typing import Optional +from typing_extensions import Annotated +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue + +from vulncheck_sdk.api_client import ApiClient, RequestSerialized +from vulncheck_sdk.api_response import ApiResponse +from vulncheck_sdk.rest import RESTResponseType + + +class AdvisoryApi: + """NOTE: This class is auto generated by OpenAPI Generator + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + def __init__(self, api_client=None) -> None: + if api_client is None: + api_client = ApiClient.get_default() + self.api_client = api_client + + + @validate_call + def advisory_get( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> SearchV4AdvisoryReturnValue: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def advisory_get_with_http_info( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[SearchV4AdvisoryReturnValue]: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def advisory_get_without_preload_content( + self, + name: Annotated[Optional[StrictStr], Field(description="Filter by advisory feed name (e.g. 'vulncheck')")] = None, + cve_id: Annotated[Optional[StrictStr], Field(description="Filter by CVE ID (e.g. 'CVE-2024-1234')")] = None, + vendor: Annotated[Optional[StrictStr], Field(description="Filter by vendor name")] = None, + product: Annotated[Optional[StrictStr], Field(description="Filter by product name")] = None, + platform: Annotated[Optional[StrictStr], Field(description="Filter by OS/platform")] = None, + version: Annotated[Optional[StrictStr], Field(description="Filter by product version (semver-aware)")] = None, + cpe: Annotated[Optional[StrictStr], Field(description="Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')")] = None, + package_name: Annotated[Optional[StrictStr], Field(description="Filter by package name")] = None, + purl: Annotated[Optional[StrictStr], Field(description="Filter by package URL (PURL)")] = None, + reference_url: Annotated[Optional[StrictStr], Field(description="Filter by reference URL")] = None, + reference_tag: Annotated[Optional[StrictStr], Field(description="Filter by reference tag (e.g. 'patch', 'advisory')")] = None, + description_lang: Annotated[Optional[StrictStr], Field(description="Filter by description language (e.g. 'en')")] = None, + updated_after: Annotated[Optional[StrictStr], Field(description="Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')")] = None, + updated_before: Annotated[Optional[StrictStr], Field(description="Return advisories updated before this date (RFC3339 or date-math)")] = None, + page: Annotated[Optional[StrictInt], Field(description="Page number (default: 1)")] = None, + limit: Annotated[Optional[StrictInt], Field(description="Results per page, max 100 (default: 10)")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="Cursor from previous response _meta.next_cursor to fetch the next page")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Query advisories + + Query the VulnCheck v4 advisory index + + :param name: Filter by advisory feed name (e.g. 'vulncheck') + :type name: str + :param cve_id: Filter by CVE ID (e.g. 'CVE-2024-1234') + :type cve_id: str + :param vendor: Filter by vendor name + :type vendor: str + :param product: Filter by product name + :type product: str + :param platform: Filter by OS/platform + :type platform: str + :param version: Filter by product version (semver-aware) + :type version: str + :param cpe: Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*') + :type cpe: str + :param package_name: Filter by package name + :type package_name: str + :param purl: Filter by package URL (PURL) + :type purl: str + :param reference_url: Filter by reference URL + :type reference_url: str + :param reference_tag: Filter by reference tag (e.g. 'patch', 'advisory') + :type reference_tag: str + :param description_lang: Filter by description language (e.g. 'en') + :type description_lang: str + :param updated_after: Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d') + :type updated_after: str + :param updated_before: Return advisories updated before this date (RFC3339 or date-math) + :type updated_before: str + :param page: Page number (default: 1) + :type page: int + :param limit: Results per page, max 100 (default: 10) + :type limit: int + :param start_cursor: Presence activates cursor mode from the first page (value is ignored; cannot be combined with page) + :type start_cursor: str + :param cursor: Cursor from previous response _meta.next_cursor to fetch the next page + :type cursor: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_get_serialize( + name=name, + cve_id=cve_id, + vendor=vendor, + product=product, + platform=platform, + version=version, + cpe=cpe, + package_name=package_name, + purl=purl, + reference_url=reference_url, + reference_tag=reference_tag, + description_lang=description_lang, + updated_after=updated_after, + updated_before=updated_before, + page=page, + limit=limit, + start_cursor=start_cursor, + cursor=cursor, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4AdvisoryReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _advisory_get_serialize( + self, + name, + cve_id, + vendor, + product, + platform, + version, + cpe, + package_name, + purl, + reference_url, + reference_tag, + description_lang, + updated_after, + updated_before, + page, + limit, + start_cursor, + cursor, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com/v4' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if name is not None: + + _query_params.append(('name', name)) + + if cve_id is not None: + + _query_params.append(('cve_id', cve_id)) + + if vendor is not None: + + _query_params.append(('vendor', vendor)) + + if product is not None: + + _query_params.append(('product', product)) + + if platform is not None: + + _query_params.append(('platform', platform)) + + if version is not None: + + _query_params.append(('version', version)) + + if cpe is not None: + + _query_params.append(('cpe', cpe)) + + if package_name is not None: + + _query_params.append(('package_name', package_name)) + + if purl is not None: + + _query_params.append(('purl', purl)) + + if reference_url is not None: + + _query_params.append(('reference_url', reference_url)) + + if reference_tag is not None: + + _query_params.append(('reference_tag', reference_tag)) + + if description_lang is not None: + + _query_params.append(('description_lang', description_lang)) + + if updated_after is not None: + + _query_params.append(('updatedAfter', updated_after)) + + if updated_before is not None: + + _query_params.append(('updatedBefore', updated_before)) + + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/advisory', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def advisory_list_get( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> SearchV4ListFeedReturnValue: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def advisory_list_get_with_http_info( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[SearchV4ListFeedReturnValue]: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def advisory_list_get_without_preload_content( + self, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """List advisory feeds + + Return a list of available advisory feed names + + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._advisory_list_get_serialize( + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "SearchV4ListFeedReturnValue", + '400': "SearchErrorResponse", + '401': "SearchErrorResponse", + '402': "SearchErrorResponse", + '503': "SearchErrorResponse", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _advisory_list_get_serialize( + self, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com/v4' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/advisory/list', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + diff --git a/vulncheck_sdk/api/endpoints_api.py b/vulncheck_sdk/api/endpoints_api.py index f9f530fb..6056a3a4 100644 --- a/vulncheck_sdk/api/endpoints_api.py +++ b/vulncheck_sdk/api/endpoints_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -60,7 +60,7 @@ def backup_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseArrayParamsIndexBackupList: """Return a list of indexes with backup and endpoint links @@ -125,7 +125,7 @@ def backup_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseArrayParamsIndexBackupList]: """Return a list of indexes with backup and endpoint links @@ -190,7 +190,7 @@ def backup_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return a list of indexes with backup and endpoint links @@ -245,7 +245,10 @@ def _backup_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -313,7 +316,7 @@ def backup_index_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata: """Retrieve a list of backups by index @@ -382,7 +385,7 @@ def backup_index_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata]: """Retrieve a list of backups by index @@ -451,7 +454,7 @@ def backup_index_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of backups by index @@ -510,7 +513,10 @@ def _backup_index_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -581,7 +587,7 @@ def cpe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayStringV3controllersResponseMetadata: """Return CVE 's associated with a specific NIST CPE @@ -654,7 +660,7 @@ def cpe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayStringV3controllersResponseMetadata]: """Return CVE 's associated with a specific NIST CPE @@ -727,7 +733,7 @@ def cpe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return CVE 's associated with a specific NIST CPE @@ -790,7 +796,10 @@ def _cpe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -865,7 +874,7 @@ def entitlements_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ModelsEntitlements: """Retrieve user entitlements @@ -930,7 +939,7 @@ def entitlements_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[ModelsEntitlements]: """Retrieve user entitlements @@ -995,7 +1004,7 @@ def entitlements_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve user entitlements @@ -1050,7 +1059,10 @@ def _entitlements_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1117,7 +1129,7 @@ def index_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseArrayParamsIndexList: """Return a list of available indexes with endpoint links @@ -1182,7 +1194,7 @@ def index_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseArrayParamsIndexList]: """Return a list of available indexes with endpoint links @@ -1247,7 +1259,7 @@ def index_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return a list of available indexes with endpoint links @@ -1302,7 +1314,10 @@ def _index_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1369,7 +1384,7 @@ def openapi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> Dict[str, object]: """Return OpenAPI specification @@ -1433,7 +1448,7 @@ def openapi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[Dict[str, object]]: """Return OpenAPI specification @@ -1497,7 +1512,7 @@ def openapi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return OpenAPI specification @@ -1551,7 +1566,10 @@ def _openapi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1619,7 +1637,7 @@ def pdns_vulncheck_c2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve a list of C2 Hostnames @@ -1688,7 +1706,7 @@ def pdns_vulncheck_c2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve a list of C2 Hostnames @@ -1757,7 +1775,7 @@ def pdns_vulncheck_c2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of C2 Hostnames @@ -1816,7 +1834,10 @@ def _pdns_vulncheck_c2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1888,7 +1909,7 @@ def purl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata: """Request vulnerabilities related to a PURL @@ -1957,7 +1978,7 @@ def purl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata]: """Request vulnerabilities related to a PURL @@ -2026,7 +2047,7 @@ def purl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Request vulnerabilities related to a PURL @@ -2085,7 +2106,10 @@ def _purl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2145,7 +2169,7 @@ def _purl_get_serialize( @validate_call def purls_post( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2157,14 +2181,14 @@ def purls_post( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2188,7 +2212,7 @@ def purls_post( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2214,7 +2238,7 @@ def purls_post( @validate_call def purls_post_with_http_info( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2226,14 +2250,14 @@ def purls_post_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata]: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2257,7 +2281,7 @@ def purls_post_with_http_info( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2283,7 +2307,7 @@ def purls_post_with_http_info( @validate_call def purls_post_without_preload_content( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2295,14 +2319,14 @@ def purls_post_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Request vulnerabilities related to a list of PURLs Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2326,7 +2350,7 @@ def purls_post_without_preload_content( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2347,17 +2371,20 @@ def purls_post_without_preload_content( def _purls_post_serialize( self, - purls, + request_body, _request_auth, _content_type, _headers, _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { - 'purls': '', + 'request_body': '', } _path_params: Dict[str, str] = {} @@ -2374,8 +2401,8 @@ def _purls_post_serialize( # process the header parameters # process the form parameters # process the body parameter - if purls is not None: - _body_params = purls + if request_body is not None: + _body_params = request_body # set the HTTP header `Accept` @@ -2386,6 +2413,19 @@ def _purls_post_serialize( ] ) + # set the HTTP header `Content-Type` + if _content_type: + _header_params['Content-Type'] = _content_type + else: + _default_content_type = ( + self.api_client.select_header_content_type( + [ + 'application/json' + ] + ) + ) + if _default_content_type is not None: + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ @@ -2425,7 +2465,7 @@ def rules_initial_access_type_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve set of initial-access detection rules @@ -2494,7 +2534,7 @@ def rules_initial_access_type_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve set of initial-access detection rules @@ -2563,7 +2603,7 @@ def rules_initial_access_type_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve set of initial-access detection rules @@ -2622,7 +2662,10 @@ def _rules_initial_access_type_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2692,7 +2735,7 @@ def tags_vulncheck_c2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> str: """Retrieve a list of C2 IP addresses @@ -2761,7 +2804,7 @@ def tags_vulncheck_c2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[str]: """Retrieve a list of C2 IP addresses @@ -2830,7 +2873,7 @@ def tags_vulncheck_c2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Retrieve a list of C2 IP addresses @@ -2889,7 +2932,10 @@ def _tags_vulncheck_c2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } diff --git a/vulncheck_sdk/api/indices_api.py b/vulncheck_sdk/api/indices_api.py index 4837b1ac..4a325880 100644 --- a/vulncheck_sdk/api/indices_api.py +++ b/vulncheck_sdk/api/indices_api.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -519,8 +519,7 @@ def index7zip_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -538,7 +537,7 @@ def index7zip_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination: """Return vulnerability data stored in index \"7zip\" @@ -578,10 +577,8 @@ def index7zip_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -634,8 +631,7 @@ def index7zip_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -684,8 +680,7 @@ def index7zip_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -703,7 +698,7 @@ def index7zip_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination]: """Return vulnerability data stored in index \"7zip\" @@ -743,10 +738,8 @@ def index7zip_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -799,8 +792,7 @@ def index7zip_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -849,8 +841,7 @@ def index7zip_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -868,7 +859,7 @@ def index7zip_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"7zip\" @@ -908,10 +899,8 @@ def index7zip_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -964,8 +953,7 @@ def index7zip_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1009,8 +997,7 @@ def _index7zip_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1023,7 +1010,10 @@ def _index7zip_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1107,13 +1097,9 @@ def _index7zip_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -1196,8 +1182,7 @@ def index_a10_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1215,7 +1200,7 @@ def index_a10_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination: """Return vulnerability data stored in index \"a10\" @@ -1255,10 +1240,8 @@ def index_a10_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1311,8 +1294,7 @@ def index_a10_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1361,8 +1343,7 @@ def index_a10_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1380,7 +1361,7 @@ def index_a10_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination]: """Return vulnerability data stored in index \"a10\" @@ -1420,10 +1401,8 @@ def index_a10_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1476,8 +1455,7 @@ def index_a10_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1526,8 +1504,7 @@ def index_a10_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1545,7 +1522,7 @@ def index_a10_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"a10\" @@ -1585,10 +1562,8 @@ def index_a10_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1641,8 +1616,7 @@ def index_a10_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1686,8 +1660,7 @@ def _index_a10_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1700,7 +1673,10 @@ def _index_a10_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -1784,13 +1760,9 @@ def _index_a10_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -1873,8 +1845,7 @@ def index_abb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1892,7 +1863,7 @@ def index_abb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"abb\" @@ -1932,10 +1903,8 @@ def index_abb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1988,8 +1957,7 @@ def index_abb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2038,8 +2006,7 @@ def index_abb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2057,7 +2024,7 @@ def index_abb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"abb\" @@ -2097,10 +2064,8 @@ def index_abb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2153,8 +2118,7 @@ def index_abb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2203,8 +2167,7 @@ def index_abb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2222,7 +2185,7 @@ def index_abb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"abb\" @@ -2262,10 +2225,8 @@ def index_abb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2318,8 +2279,7 @@ def index_abb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2363,8 +2323,7 @@ def _index_abb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -2377,7 +2336,10 @@ def _index_abb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -2461,13 +2423,9 @@ def _index_abb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -2550,8 +2508,7 @@ def index_abbott_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2569,7 +2526,7 @@ def index_abbott_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination: """Return vulnerability data stored in index \"abbott\" @@ -2609,10 +2566,8 @@ def index_abbott_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2665,8 +2620,7 @@ def index_abbott_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2715,8 +2669,7 @@ def index_abbott_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2734,7 +2687,7 @@ def index_abbott_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination]: """Return vulnerability data stored in index \"abbott\" @@ -2774,10 +2727,8 @@ def index_abbott_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2830,8 +2781,7 @@ def index_abbott_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2880,8 +2830,7 @@ def index_abbott_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2899,7 +2848,7 @@ def index_abbott_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"abbott\" @@ -2939,10 +2888,8 @@ def index_abbott_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2995,8 +2942,7 @@ def index_abbott_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3040,8 +2986,7 @@ def _index_abbott_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3054,7 +2999,10 @@ def _index_abbott_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -3138,13 +3086,9 @@ def _index_abbott_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -3227,8 +3171,7 @@ def index_absolute_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3246,7 +3189,7 @@ def index_absolute_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination: """Return vulnerability data stored in index \"absolute\" @@ -3286,10 +3229,8 @@ def index_absolute_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3342,8 +3283,7 @@ def index_absolute_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3392,8 +3332,7 @@ def index_absolute_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3411,7 +3350,7 @@ def index_absolute_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination]: """Return vulnerability data stored in index \"absolute\" @@ -3451,10 +3390,8 @@ def index_absolute_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3507,8 +3444,7 @@ def index_absolute_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3557,8 +3493,7 @@ def index_absolute_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3576,7 +3511,7 @@ def index_absolute_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"absolute\" @@ -3616,10 +3551,8 @@ def index_absolute_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3672,8 +3605,7 @@ def index_absolute_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3717,8 +3649,7 @@ def _index_absolute_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3731,7 +3662,10 @@ def _index_absolute_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -3815,13 +3749,9 @@ def _index_absolute_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -3904,8 +3834,7 @@ def index_acronis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3923,7 +3852,7 @@ def index_acronis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination: """Return vulnerability data stored in index \"acronis\" @@ -3963,10 +3892,8 @@ def index_acronis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4019,8 +3946,7 @@ def index_acronis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4069,8 +3995,7 @@ def index_acronis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4088,7 +4013,7 @@ def index_acronis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination]: """Return vulnerability data stored in index \"acronis\" @@ -4128,10 +4053,8 @@ def index_acronis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4184,8 +4107,7 @@ def index_acronis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4234,8 +4156,7 @@ def index_acronis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4253,7 +4174,7 @@ def index_acronis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"acronis\" @@ -4293,10 +4214,8 @@ def index_acronis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4349,8 +4268,7 @@ def index_acronis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4394,8 +4312,7 @@ def _index_acronis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -4408,7 +4325,10 @@ def _index_acronis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -4492,13 +4412,9 @@ def _index_acronis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -4581,8 +4497,7 @@ def index_adobe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4600,7 +4515,7 @@ def index_adobe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination: """Return vulnerability data stored in index \"adobe\" @@ -4640,10 +4555,8 @@ def index_adobe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4696,8 +4609,7 @@ def index_adobe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4746,8 +4658,7 @@ def index_adobe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4765,7 +4676,7 @@ def index_adobe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"adobe\" @@ -4805,10 +4716,8 @@ def index_adobe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4861,8 +4770,7 @@ def index_adobe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4911,8 +4819,7 @@ def index_adobe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4930,7 +4837,7 @@ def index_adobe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"adobe\" @@ -4970,10 +4877,8 @@ def index_adobe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5026,8 +4931,7 @@ def index_adobe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5071,8 +4975,7 @@ def _index_adobe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5085,7 +4988,10 @@ def _index_adobe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -5169,13 +5075,9 @@ def _index_adobe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -5258,8 +5160,7 @@ def index_advantech_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5277,7 +5178,7 @@ def index_advantech_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination: """Return vulnerability data stored in index \"advantech\" @@ -5317,10 +5218,8 @@ def index_advantech_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5373,8 +5272,7 @@ def index_advantech_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5423,8 +5321,7 @@ def index_advantech_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5442,7 +5339,7 @@ def index_advantech_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination]: """Return vulnerability data stored in index \"advantech\" @@ -5482,10 +5379,8 @@ def index_advantech_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5538,8 +5433,7 @@ def index_advantech_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5588,8 +5482,7 @@ def index_advantech_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5607,7 +5500,7 @@ def index_advantech_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"advantech\" @@ -5647,10 +5540,8 @@ def index_advantech_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5703,8 +5594,7 @@ def index_advantech_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5748,8 +5638,7 @@ def _index_advantech_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5762,7 +5651,10 @@ def _index_advantech_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -5846,13 +5738,9 @@ def _index_advantech_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -5935,8 +5823,7 @@ def index_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5954,7 +5841,7 @@ def index_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination: """Return vulnerability data stored in index \"advisories\" @@ -5994,10 +5881,8 @@ def index_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6050,8 +5935,7 @@ def index_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6100,8 +5984,7 @@ def index_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6119,7 +6002,7 @@ def index_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination]: """Return vulnerability data stored in index \"advisories\" @@ -6159,10 +6042,8 @@ def index_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6215,8 +6096,7 @@ def index_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6265,8 +6145,7 @@ def index_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6284,7 +6163,7 @@ def index_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"advisories\" @@ -6324,10 +6203,8 @@ def index_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6380,8 +6257,7 @@ def index_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6425,8 +6301,7 @@ def _index_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -6439,7 +6314,10 @@ def _index_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -6523,13 +6401,9 @@ def _index_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -6612,8 +6486,7 @@ def index_aix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6631,7 +6504,7 @@ def index_aix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination: """Return vulnerability data stored in index \"aix\" @@ -6671,10 +6544,8 @@ def index_aix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6727,8 +6598,7 @@ def index_aix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6777,8 +6647,7 @@ def index_aix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6796,7 +6665,7 @@ def index_aix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination]: """Return vulnerability data stored in index \"aix\" @@ -6836,10 +6705,8 @@ def index_aix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6892,8 +6759,7 @@ def index_aix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6942,8 +6808,7 @@ def index_aix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6961,7 +6826,7 @@ def index_aix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aix\" @@ -7001,10 +6866,8 @@ def index_aix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7057,8 +6920,7 @@ def index_aix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7102,8 +6964,7 @@ def _index_aix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7116,7 +6977,10 @@ def _index_aix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -7200,13 +7064,9 @@ def _index_aix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -7289,8 +7149,7 @@ def index_aleph_research_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7308,7 +7167,7 @@ def index_aleph_research_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination: """Return vulnerability data stored in index \"aleph-research\" @@ -7348,10 +7207,8 @@ def index_aleph_research_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7404,8 +7261,7 @@ def index_aleph_research_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7454,8 +7310,7 @@ def index_aleph_research_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7473,7 +7328,7 @@ def index_aleph_research_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination]: """Return vulnerability data stored in index \"aleph-research\" @@ -7513,10 +7368,8 @@ def index_aleph_research_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7569,8 +7422,7 @@ def index_aleph_research_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7619,8 +7471,7 @@ def index_aleph_research_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7638,7 +7489,7 @@ def index_aleph_research_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aleph-research\" @@ -7678,10 +7529,8 @@ def index_aleph_research_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7734,8 +7583,7 @@ def index_aleph_research_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7779,8 +7627,7 @@ def _index_aleph_research_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7793,7 +7640,10 @@ def _index_aleph_research_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -7877,13 +7727,9 @@ def _index_aleph_research_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -7966,8 +7812,7 @@ def index_alibaba_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7985,7 +7830,7 @@ def index_alibaba_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8025,10 +7870,8 @@ def index_alibaba_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8081,8 +7924,7 @@ def index_alibaba_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8131,8 +7973,7 @@ def index_alibaba_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8150,7 +7991,7 @@ def index_alibaba_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination]: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8190,10 +8031,8 @@ def index_alibaba_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8246,8 +8085,7 @@ def index_alibaba_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8296,8 +8134,7 @@ def index_alibaba_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8315,7 +8152,7 @@ def index_alibaba_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alibaba-advs\" @@ -8355,10 +8192,8 @@ def index_alibaba_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8411,8 +8246,7 @@ def index_alibaba_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8456,8 +8290,7 @@ def _index_alibaba_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -8470,7 +8303,10 @@ def _index_alibaba_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -8554,13 +8390,9 @@ def _index_alibaba_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -8643,8 +8475,7 @@ def index_alma_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8662,7 +8493,7 @@ def index_alma_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination: """Return vulnerability data stored in index \"alma\" @@ -8702,10 +8533,8 @@ def index_alma_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8758,8 +8587,7 @@ def index_alma_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8808,8 +8636,7 @@ def index_alma_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8827,7 +8654,7 @@ def index_alma_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination]: """Return vulnerability data stored in index \"alma\" @@ -8867,10 +8694,8 @@ def index_alma_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8923,8 +8748,7 @@ def index_alma_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8973,8 +8797,7 @@ def index_alma_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8992,7 +8815,7 @@ def index_alma_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alma\" @@ -9032,10 +8855,8 @@ def index_alma_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9088,8 +8909,7 @@ def index_alma_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9133,8 +8953,7 @@ def _index_alma_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9147,7 +8966,10 @@ def _index_alma_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -9231,13 +9053,9 @@ def _index_alma_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -9320,8 +9138,7 @@ def index_alpine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9339,7 +9156,7 @@ def index_alpine_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination: """Return vulnerability data stored in index \"alpine\" @@ -9379,10 +9196,8 @@ def index_alpine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9435,8 +9250,7 @@ def index_alpine_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9485,8 +9299,7 @@ def index_alpine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9504,7 +9317,7 @@ def index_alpine_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination]: """Return vulnerability data stored in index \"alpine\" @@ -9544,10 +9357,8 @@ def index_alpine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9600,8 +9411,7 @@ def index_alpine_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9650,8 +9460,7 @@ def index_alpine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9669,7 +9478,7 @@ def index_alpine_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alpine\" @@ -9709,10 +9518,8 @@ def index_alpine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9765,8 +9572,7 @@ def index_alpine_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9810,8 +9616,7 @@ def _index_alpine_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9824,7 +9629,10 @@ def _index_alpine_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -9908,13 +9716,9 @@ def _index_alpine_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -9997,8 +9801,7 @@ def index_alpine_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10016,7 +9819,7 @@ def index_alpine_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"alpine-purls\" @@ -10056,10 +9859,8 @@ def index_alpine_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10112,8 +9913,7 @@ def index_alpine_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10162,8 +9962,7 @@ def index_alpine_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10181,7 +9980,7 @@ def index_alpine_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"alpine-purls\" @@ -10221,10 +10020,8 @@ def index_alpine_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10277,8 +10074,7 @@ def index_alpine_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10327,8 +10123,7 @@ def index_alpine_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10346,7 +10141,7 @@ def index_alpine_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"alpine-purls\" @@ -10386,10 +10181,8 @@ def index_alpine_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10442,8 +10235,7 @@ def index_alpine_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10487,8 +10279,7 @@ def _index_alpine_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -10501,7 +10292,10 @@ def _index_alpine_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -10585,13 +10379,9 @@ def _index_alpine_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -10674,8 +10464,7 @@ def index_amazon_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10693,7 +10482,7 @@ def index_amazon_cve_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination: """Return vulnerability data stored in index \"amazon-cve\" @@ -10733,10 +10522,8 @@ def index_amazon_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10789,8 +10576,7 @@ def index_amazon_cve_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10839,8 +10625,7 @@ def index_amazon_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10858,7 +10643,7 @@ def index_amazon_cve_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination]: """Return vulnerability data stored in index \"amazon-cve\" @@ -10898,10 +10683,8 @@ def index_amazon_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10954,8 +10737,7 @@ def index_amazon_cve_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11004,8 +10786,7 @@ def index_amazon_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11023,7 +10804,7 @@ def index_amazon_cve_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amazon-cve\" @@ -11063,10 +10844,8 @@ def index_amazon_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11119,8 +10898,7 @@ def index_amazon_cve_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11164,8 +10942,7 @@ def _index_amazon_cve_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11178,7 +10955,10 @@ def _index_amazon_cve_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -11262,13 +11042,9 @@ def _index_amazon_cve_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -11351,8 +11127,7 @@ def index_amazon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11370,7 +11145,7 @@ def index_amazon_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination: """Return vulnerability data stored in index \"amazon\" @@ -11410,10 +11185,8 @@ def index_amazon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11466,8 +11239,7 @@ def index_amazon_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11516,8 +11288,7 @@ def index_amazon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11535,7 +11306,7 @@ def index_amazon_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination]: """Return vulnerability data stored in index \"amazon\" @@ -11575,10 +11346,8 @@ def index_amazon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11631,8 +11400,7 @@ def index_amazon_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11681,8 +11449,7 @@ def index_amazon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11700,7 +11467,7 @@ def index_amazon_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amazon\" @@ -11740,10 +11507,8 @@ def index_amazon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11796,8 +11561,7 @@ def index_amazon_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11841,8 +11605,7 @@ def _index_amazon_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11855,7 +11618,10 @@ def _index_amazon_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -11939,13 +11705,9 @@ def _index_amazon_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -12028,8 +11790,7 @@ def index_amd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12047,7 +11808,7 @@ def index_amd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination: """Return vulnerability data stored in index \"amd\" @@ -12087,10 +11848,8 @@ def index_amd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12143,8 +11902,7 @@ def index_amd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12193,8 +11951,7 @@ def index_amd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12212,7 +11969,7 @@ def index_amd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination]: """Return vulnerability data stored in index \"amd\" @@ -12252,10 +12009,8 @@ def index_amd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12308,8 +12063,7 @@ def index_amd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12358,8 +12112,7 @@ def index_amd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12377,7 +12130,7 @@ def index_amd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"amd\" @@ -12417,10 +12170,8 @@ def index_amd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12473,8 +12224,7 @@ def index_amd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12518,8 +12268,7 @@ def _index_amd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -12532,7 +12281,10 @@ def _index_amd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -12616,13 +12368,9 @@ def _index_amd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -12705,8 +12453,7 @@ def index_ami_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12724,7 +12471,7 @@ def index_ami_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination: """Return vulnerability data stored in index \"ami\" @@ -12764,10 +12511,8 @@ def index_ami_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12820,8 +12565,7 @@ def index_ami_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12870,8 +12614,7 @@ def index_ami_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12889,7 +12632,7 @@ def index_ami_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination]: """Return vulnerability data stored in index \"ami\" @@ -12929,10 +12672,8 @@ def index_ami_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12985,8 +12726,7 @@ def index_ami_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13035,8 +12775,7 @@ def index_ami_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13054,7 +12793,7 @@ def index_ami_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ami\" @@ -13094,10 +12833,8 @@ def index_ami_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13150,8 +12887,7 @@ def index_ami_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13195,8 +12931,7 @@ def _index_ami_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13209,7 +12944,10 @@ def _index_ami_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -13293,13 +13031,9 @@ def _index_ami_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -13382,8 +13116,7 @@ def index_anchore_nvd_override_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13401,7 +13134,7 @@ def index_anchore_nvd_override_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13441,10 +13174,8 @@ def index_anchore_nvd_override_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13497,8 +13228,7 @@ def index_anchore_nvd_override_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13547,8 +13277,7 @@ def index_anchore_nvd_override_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13566,7 +13295,7 @@ def index_anchore_nvd_override_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination]: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13606,10 +13335,8 @@ def index_anchore_nvd_override_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13662,8 +13389,7 @@ def index_anchore_nvd_override_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13712,8 +13438,7 @@ def index_anchore_nvd_override_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13731,7 +13456,7 @@ def index_anchore_nvd_override_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"anchore-nvd-override\" @@ -13771,10 +13496,8 @@ def index_anchore_nvd_override_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13827,8 +13550,7 @@ def index_anchore_nvd_override_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13872,8 +13594,7 @@ def _index_anchore_nvd_override_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13886,7 +13607,10 @@ def _index_anchore_nvd_override_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -13970,13 +13694,9 @@ def _index_anchore_nvd_override_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -14059,8 +13779,7 @@ def index_android_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14078,7 +13797,7 @@ def index_android_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination: """Return vulnerability data stored in index \"android\" @@ -14118,10 +13837,8 @@ def index_android_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14174,8 +13891,7 @@ def index_android_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14224,8 +13940,7 @@ def index_android_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14243,7 +13958,7 @@ def index_android_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"android\" @@ -14283,10 +13998,8 @@ def index_android_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14339,8 +14052,7 @@ def index_android_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14389,8 +14101,7 @@ def index_android_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14408,7 +14119,7 @@ def index_android_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"android\" @@ -14448,10 +14159,8 @@ def index_android_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14504,8 +14213,7 @@ def index_android_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14549,8 +14257,7 @@ def _index_android_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -14563,7 +14270,10 @@ def _index_android_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -14647,13 +14357,9 @@ def _index_android_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -14736,8 +14442,7 @@ def index_apache_activemq_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14755,7 +14460,7 @@ def index_apache_activemq_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination: """Return vulnerability data stored in index \"apache-activemq\" @@ -14795,10 +14500,8 @@ def index_apache_activemq_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14851,8 +14554,7 @@ def index_apache_activemq_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14901,8 +14603,7 @@ def index_apache_activemq_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14920,7 +14621,7 @@ def index_apache_activemq_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination]: """Return vulnerability data stored in index \"apache-activemq\" @@ -14960,10 +14661,8 @@ def index_apache_activemq_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15016,8 +14715,7 @@ def index_apache_activemq_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15066,8 +14764,7 @@ def index_apache_activemq_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15085,7 +14782,7 @@ def index_apache_activemq_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-activemq\" @@ -15125,10 +14822,8 @@ def index_apache_activemq_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15181,8 +14876,7 @@ def index_apache_activemq_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15226,8 +14920,7 @@ def _index_apache_activemq_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15240,7 +14933,10 @@ def _index_apache_activemq_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -15324,13 +15020,9 @@ def _index_apache_activemq_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -15413,8 +15105,7 @@ def index_apache_archiva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15432,7 +15123,7 @@ def index_apache_archiva_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination: """Return vulnerability data stored in index \"apache-archiva\" @@ -15472,10 +15163,8 @@ def index_apache_archiva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15528,8 +15217,7 @@ def index_apache_archiva_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15578,8 +15266,7 @@ def index_apache_archiva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15597,7 +15284,7 @@ def index_apache_archiva_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination]: """Return vulnerability data stored in index \"apache-archiva\" @@ -15637,10 +15324,8 @@ def index_apache_archiva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15693,8 +15378,7 @@ def index_apache_archiva_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15743,8 +15427,7 @@ def index_apache_archiva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15762,7 +15445,7 @@ def index_apache_archiva_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-archiva\" @@ -15802,10 +15485,8 @@ def index_apache_archiva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15858,8 +15539,7 @@ def index_apache_archiva_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15903,8 +15583,7 @@ def _index_apache_archiva_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15917,7 +15596,10 @@ def _index_apache_archiva_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -16001,13 +15683,9 @@ def _index_apache_archiva_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -16090,8 +15768,7 @@ def index_apache_arrow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16109,7 +15786,7 @@ def index_apache_arrow_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination: """Return vulnerability data stored in index \"apache-arrow\" @@ -16149,10 +15826,8 @@ def index_apache_arrow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16205,8 +15880,7 @@ def index_apache_arrow_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16255,8 +15929,7 @@ def index_apache_arrow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16274,7 +15947,7 @@ def index_apache_arrow_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination]: """Return vulnerability data stored in index \"apache-arrow\" @@ -16314,10 +15987,8 @@ def index_apache_arrow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16370,8 +16041,7 @@ def index_apache_arrow_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16420,8 +16090,7 @@ def index_apache_arrow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16439,7 +16108,7 @@ def index_apache_arrow_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-arrow\" @@ -16479,10 +16148,8 @@ def index_apache_arrow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16535,8 +16202,7 @@ def index_apache_arrow_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16580,8 +16246,7 @@ def _index_apache_arrow_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16594,7 +16259,10 @@ def _index_apache_arrow_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -16678,13 +16346,9 @@ def _index_apache_arrow_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -16767,8 +16431,7 @@ def index_apache_camel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16786,7 +16449,7 @@ def index_apache_camel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination: """Return vulnerability data stored in index \"apache-camel\" @@ -16826,10 +16489,8 @@ def index_apache_camel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16882,8 +16543,7 @@ def index_apache_camel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16932,8 +16592,7 @@ def index_apache_camel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16951,7 +16610,7 @@ def index_apache_camel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination]: """Return vulnerability data stored in index \"apache-camel\" @@ -16991,10 +16650,8 @@ def index_apache_camel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17047,8 +16704,7 @@ def index_apache_camel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17097,8 +16753,7 @@ def index_apache_camel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17116,7 +16771,7 @@ def index_apache_camel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-camel\" @@ -17156,10 +16811,8 @@ def index_apache_camel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17212,8 +16865,7 @@ def index_apache_camel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17257,8 +16909,7 @@ def _index_apache_camel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17271,7 +16922,10 @@ def _index_apache_camel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -17355,13 +17009,9 @@ def _index_apache_camel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -17444,8 +17094,7 @@ def index_apache_commons_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17463,7 +17112,7 @@ def index_apache_commons_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination: """Return vulnerability data stored in index \"apache-commons\" @@ -17503,10 +17152,8 @@ def index_apache_commons_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17559,8 +17206,7 @@ def index_apache_commons_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17609,8 +17255,7 @@ def index_apache_commons_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17628,7 +17273,7 @@ def index_apache_commons_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination]: """Return vulnerability data stored in index \"apache-commons\" @@ -17668,10 +17313,8 @@ def index_apache_commons_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17724,8 +17367,7 @@ def index_apache_commons_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17774,8 +17416,7 @@ def index_apache_commons_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17793,7 +17434,7 @@ def index_apache_commons_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-commons\" @@ -17833,10 +17474,8 @@ def index_apache_commons_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17889,8 +17528,7 @@ def index_apache_commons_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17934,8 +17572,7 @@ def _index_apache_commons_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17948,7 +17585,10 @@ def _index_apache_commons_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -18032,13 +17672,9 @@ def _index_apache_commons_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -18121,8 +17757,7 @@ def index_apache_couchdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18140,7 +17775,7 @@ def index_apache_couchdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18180,10 +17815,8 @@ def index_apache_couchdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18236,8 +17869,7 @@ def index_apache_couchdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18286,8 +17918,7 @@ def index_apache_couchdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18305,7 +17936,7 @@ def index_apache_couchdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination]: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18345,10 +17976,8 @@ def index_apache_couchdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18401,8 +18030,7 @@ def index_apache_couchdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18451,8 +18079,7 @@ def index_apache_couchdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18470,7 +18097,7 @@ def index_apache_couchdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-couchdb\" @@ -18510,10 +18137,8 @@ def index_apache_couchdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18566,8 +18191,7 @@ def index_apache_couchdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18611,8 +18235,7 @@ def _index_apache_couchdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18625,7 +18248,10 @@ def _index_apache_couchdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -18709,13 +18335,9 @@ def _index_apache_couchdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -18798,8 +18420,7 @@ def index_apache_flink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18817,7 +18438,7 @@ def index_apache_flink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination: """Return vulnerability data stored in index \"apache-flink\" @@ -18857,10 +18478,8 @@ def index_apache_flink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18913,8 +18532,7 @@ def index_apache_flink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18963,8 +18581,7 @@ def index_apache_flink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18982,7 +18599,7 @@ def index_apache_flink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination]: """Return vulnerability data stored in index \"apache-flink\" @@ -19022,10 +18639,8 @@ def index_apache_flink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19078,8 +18693,7 @@ def index_apache_flink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19128,8 +18742,7 @@ def index_apache_flink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19147,7 +18760,7 @@ def index_apache_flink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-flink\" @@ -19187,10 +18800,8 @@ def index_apache_flink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19243,8 +18854,7 @@ def index_apache_flink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19288,8 +18898,7 @@ def _index_apache_flink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19302,7 +18911,10 @@ def _index_apache_flink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -19386,13 +18998,9 @@ def _index_apache_flink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -19475,8 +19083,7 @@ def index_apache_guacamole_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19494,7 +19101,7 @@ def index_apache_guacamole_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19534,10 +19141,8 @@ def index_apache_guacamole_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19590,8 +19195,7 @@ def index_apache_guacamole_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19640,8 +19244,7 @@ def index_apache_guacamole_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19659,7 +19262,7 @@ def index_apache_guacamole_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination]: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19699,10 +19302,8 @@ def index_apache_guacamole_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19755,8 +19356,7 @@ def index_apache_guacamole_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19805,8 +19405,7 @@ def index_apache_guacamole_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19824,7 +19423,7 @@ def index_apache_guacamole_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-guacamole\" @@ -19864,10 +19463,8 @@ def index_apache_guacamole_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19920,8 +19517,7 @@ def index_apache_guacamole_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19965,8 +19561,7 @@ def _index_apache_guacamole_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19979,7 +19574,10 @@ def _index_apache_guacamole_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -20063,13 +19661,9 @@ def _index_apache_guacamole_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -20152,8 +19746,7 @@ def index_apache_hadoop_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20171,7 +19764,7 @@ def index_apache_hadoop_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20211,10 +19804,8 @@ def index_apache_hadoop_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20267,8 +19858,7 @@ def index_apache_hadoop_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20317,8 +19907,7 @@ def index_apache_hadoop_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20336,7 +19925,7 @@ def index_apache_hadoop_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination]: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20376,10 +19965,8 @@ def index_apache_hadoop_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20432,8 +20019,7 @@ def index_apache_hadoop_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20482,8 +20068,7 @@ def index_apache_hadoop_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20501,7 +20086,7 @@ def index_apache_hadoop_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-hadoop\" @@ -20541,10 +20126,8 @@ def index_apache_hadoop_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20597,8 +20180,7 @@ def index_apache_hadoop_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20642,8 +20224,7 @@ def _index_apache_hadoop_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20656,7 +20237,10 @@ def _index_apache_hadoop_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -20740,13 +20324,9 @@ def _index_apache_hadoop_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -20829,8 +20409,7 @@ def index_apache_http_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20848,7 +20427,7 @@ def index_apache_http_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination: """Return vulnerability data stored in index \"apache-http\" @@ -20888,10 +20467,8 @@ def index_apache_http_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20944,8 +20521,7 @@ def index_apache_http_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20994,8 +20570,7 @@ def index_apache_http_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21013,7 +20588,7 @@ def index_apache_http_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination]: """Return vulnerability data stored in index \"apache-http\" @@ -21053,10 +20628,8 @@ def index_apache_http_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21109,8 +20682,7 @@ def index_apache_http_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21159,8 +20731,7 @@ def index_apache_http_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21178,7 +20749,7 @@ def index_apache_http_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-http\" @@ -21218,10 +20789,8 @@ def index_apache_http_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21274,8 +20843,7 @@ def index_apache_http_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21319,8 +20887,7 @@ def _index_apache_http_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -21333,7 +20900,10 @@ def _index_apache_http_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -21417,13 +20987,9 @@ def _index_apache_http_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -21506,8 +21072,7 @@ def index_apache_jspwiki_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21525,7 +21090,7 @@ def index_apache_jspwiki_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21565,10 +21130,8 @@ def index_apache_jspwiki_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21621,8 +21184,7 @@ def index_apache_jspwiki_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21671,8 +21233,7 @@ def index_apache_jspwiki_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21690,7 +21251,7 @@ def index_apache_jspwiki_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination]: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21730,10 +21291,8 @@ def index_apache_jspwiki_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21786,8 +21345,7 @@ def index_apache_jspwiki_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21836,8 +21394,7 @@ def index_apache_jspwiki_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21855,7 +21412,7 @@ def index_apache_jspwiki_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-jspwiki\" @@ -21895,10 +21452,8 @@ def index_apache_jspwiki_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21951,8 +21506,7 @@ def index_apache_jspwiki_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21996,8 +21550,7 @@ def _index_apache_jspwiki_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22010,7 +21563,10 @@ def _index_apache_jspwiki_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -22094,13 +21650,9 @@ def _index_apache_jspwiki_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -22183,8 +21735,7 @@ def index_apache_kafka_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22202,7 +21753,7 @@ def index_apache_kafka_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination: """Return vulnerability data stored in index \"apache-kafka\" @@ -22242,10 +21793,8 @@ def index_apache_kafka_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22298,8 +21847,7 @@ def index_apache_kafka_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22348,8 +21896,7 @@ def index_apache_kafka_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22367,7 +21914,7 @@ def index_apache_kafka_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination]: """Return vulnerability data stored in index \"apache-kafka\" @@ -22407,10 +21954,8 @@ def index_apache_kafka_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22463,8 +22008,7 @@ def index_apache_kafka_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22513,8 +22057,7 @@ def index_apache_kafka_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22532,7 +22075,7 @@ def index_apache_kafka_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-kafka\" @@ -22572,10 +22115,8 @@ def index_apache_kafka_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22628,8 +22169,7 @@ def index_apache_kafka_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22673,8 +22213,7 @@ def _index_apache_kafka_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22687,7 +22226,10 @@ def _index_apache_kafka_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -22771,13 +22313,9 @@ def _index_apache_kafka_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -22860,8 +22398,7 @@ def index_apache_loggingservices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22879,7 +22416,7 @@ def index_apache_loggingservices_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -22919,10 +22456,8 @@ def index_apache_loggingservices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22975,8 +22510,7 @@ def index_apache_loggingservices_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23025,8 +22559,7 @@ def index_apache_loggingservices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23044,7 +22577,7 @@ def index_apache_loggingservices_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination]: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -23084,10 +22617,8 @@ def index_apache_loggingservices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23140,8 +22671,7 @@ def index_apache_loggingservices_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23190,8 +22720,7 @@ def index_apache_loggingservices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23209,7 +22738,7 @@ def index_apache_loggingservices_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-loggingservices\" @@ -23249,10 +22778,8 @@ def index_apache_loggingservices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23305,8 +22832,7 @@ def index_apache_loggingservices_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23350,8 +22876,7 @@ def _index_apache_loggingservices_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -23364,7 +22889,10 @@ def _index_apache_loggingservices_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -23448,13 +22976,9 @@ def _index_apache_loggingservices_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -23537,8 +23061,7 @@ def index_apache_nifi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23556,7 +23079,7 @@ def index_apache_nifi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination: """Return vulnerability data stored in index \"apache-nifi\" @@ -23596,10 +23119,8 @@ def index_apache_nifi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23652,8 +23173,7 @@ def index_apache_nifi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23702,8 +23222,7 @@ def index_apache_nifi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23721,7 +23240,7 @@ def index_apache_nifi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination]: """Return vulnerability data stored in index \"apache-nifi\" @@ -23761,10 +23280,8 @@ def index_apache_nifi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23817,8 +23334,7 @@ def index_apache_nifi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23867,8 +23383,7 @@ def index_apache_nifi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23886,7 +23401,7 @@ def index_apache_nifi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-nifi\" @@ -23926,10 +23441,8 @@ def index_apache_nifi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23982,8 +23495,7 @@ def index_apache_nifi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24027,8 +23539,7 @@ def _index_apache_nifi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24041,7 +23552,10 @@ def _index_apache_nifi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -24125,13 +23639,9 @@ def _index_apache_nifi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -24214,8 +23724,7 @@ def index_apache_ofbiz_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24233,7 +23742,7 @@ def index_apache_ofbiz_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24273,10 +23782,8 @@ def index_apache_ofbiz_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24329,8 +23836,7 @@ def index_apache_ofbiz_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24379,8 +23885,7 @@ def index_apache_ofbiz_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24398,7 +23903,7 @@ def index_apache_ofbiz_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination]: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24438,10 +23943,8 @@ def index_apache_ofbiz_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24494,8 +23997,7 @@ def index_apache_ofbiz_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24544,8 +24046,7 @@ def index_apache_ofbiz_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24563,7 +24064,7 @@ def index_apache_ofbiz_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-ofbiz\" @@ -24603,10 +24104,8 @@ def index_apache_ofbiz_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24659,8 +24158,7 @@ def index_apache_ofbiz_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24704,8 +24202,7 @@ def _index_apache_ofbiz_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24718,7 +24215,10 @@ def _index_apache_ofbiz_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -24802,13 +24302,9 @@ def _index_apache_ofbiz_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -24891,8 +24387,7 @@ def index_apache_openmeetings_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24910,7 +24405,7 @@ def index_apache_openmeetings_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -24950,10 +24445,8 @@ def index_apache_openmeetings_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25006,8 +24499,7 @@ def index_apache_openmeetings_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25056,8 +24548,7 @@ def index_apache_openmeetings_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25075,7 +24566,7 @@ def index_apache_openmeetings_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination]: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -25115,10 +24606,8 @@ def index_apache_openmeetings_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25171,8 +24660,7 @@ def index_apache_openmeetings_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25221,8 +24709,7 @@ def index_apache_openmeetings_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25240,7 +24727,7 @@ def index_apache_openmeetings_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-openmeetings\" @@ -25280,10 +24767,8 @@ def index_apache_openmeetings_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25336,8 +24821,7 @@ def index_apache_openmeetings_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25381,8 +24865,7 @@ def _index_apache_openmeetings_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -25395,7 +24878,10 @@ def _index_apache_openmeetings_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -25479,13 +24965,9 @@ def _index_apache_openmeetings_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -25568,8 +25050,7 @@ def index_apache_openoffice_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25587,7 +25068,7 @@ def index_apache_openoffice_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25627,10 +25108,8 @@ def index_apache_openoffice_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25683,8 +25162,7 @@ def index_apache_openoffice_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25733,8 +25211,7 @@ def index_apache_openoffice_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25752,7 +25229,7 @@ def index_apache_openoffice_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination]: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25792,10 +25269,8 @@ def index_apache_openoffice_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25848,8 +25323,7 @@ def index_apache_openoffice_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25898,8 +25372,7 @@ def index_apache_openoffice_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25917,7 +25390,7 @@ def index_apache_openoffice_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-openoffice\" @@ -25957,10 +25430,8 @@ def index_apache_openoffice_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26013,8 +25484,7 @@ def index_apache_openoffice_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26058,8 +25528,7 @@ def _index_apache_openoffice_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26072,7 +25541,10 @@ def _index_apache_openoffice_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -26156,13 +25628,9 @@ def _index_apache_openoffice_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -26245,8 +25713,7 @@ def index_apache_pulsar_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26264,7 +25731,7 @@ def index_apache_pulsar_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26304,10 +25771,8 @@ def index_apache_pulsar_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26360,8 +25825,7 @@ def index_apache_pulsar_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26410,8 +25874,7 @@ def index_apache_pulsar_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26429,7 +25892,7 @@ def index_apache_pulsar_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination]: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26469,10 +25932,8 @@ def index_apache_pulsar_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26525,8 +25986,7 @@ def index_apache_pulsar_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26575,8 +26035,7 @@ def index_apache_pulsar_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26594,7 +26053,7 @@ def index_apache_pulsar_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-pulsar\" @@ -26634,10 +26093,8 @@ def index_apache_pulsar_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26690,8 +26147,7 @@ def index_apache_pulsar_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26735,8 +26191,7 @@ def _index_apache_pulsar_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26749,7 +26204,10 @@ def _index_apache_pulsar_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -26833,13 +26291,9 @@ def _index_apache_pulsar_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -26922,8 +26376,7 @@ def index_apache_shiro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26941,7 +26394,7 @@ def index_apache_shiro_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination: """Return vulnerability data stored in index \"apache-shiro\" @@ -26981,10 +26434,8 @@ def index_apache_shiro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27037,8 +26488,7 @@ def index_apache_shiro_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27087,8 +26537,7 @@ def index_apache_shiro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27106,7 +26555,7 @@ def index_apache_shiro_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination]: """Return vulnerability data stored in index \"apache-shiro\" @@ -27146,10 +26595,8 @@ def index_apache_shiro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27202,8 +26649,7 @@ def index_apache_shiro_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27252,8 +26698,7 @@ def index_apache_shiro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27271,7 +26716,7 @@ def index_apache_shiro_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-shiro\" @@ -27311,10 +26756,8 @@ def index_apache_shiro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27367,8 +26810,7 @@ def index_apache_shiro_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27412,8 +26854,7 @@ def _index_apache_shiro_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -27426,7 +26867,10 @@ def _index_apache_shiro_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -27510,13 +26954,9 @@ def _index_apache_shiro_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -27599,8 +27039,7 @@ def index_apache_spark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27618,7 +27057,7 @@ def index_apache_spark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination: """Return vulnerability data stored in index \"apache-spark\" @@ -27658,10 +27097,8 @@ def index_apache_spark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27714,8 +27151,7 @@ def index_apache_spark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27764,8 +27200,7 @@ def index_apache_spark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27783,7 +27218,7 @@ def index_apache_spark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination]: """Return vulnerability data stored in index \"apache-spark\" @@ -27823,10 +27258,8 @@ def index_apache_spark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27879,8 +27312,7 @@ def index_apache_spark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27929,8 +27361,7 @@ def index_apache_spark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27948,7 +27379,7 @@ def index_apache_spark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-spark\" @@ -27988,10 +27419,8 @@ def index_apache_spark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28044,8 +27473,7 @@ def index_apache_spark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28089,8 +27517,7 @@ def _index_apache_spark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28103,7 +27530,10 @@ def _index_apache_spark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -28187,13 +27617,9 @@ def _index_apache_spark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -28276,8 +27702,7 @@ def index_apache_struts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28295,7 +27720,7 @@ def index_apache_struts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination: """Return vulnerability data stored in index \"apache-struts\" @@ -28335,10 +27760,8 @@ def index_apache_struts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28391,8 +27814,7 @@ def index_apache_struts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28441,8 +27863,7 @@ def index_apache_struts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28460,7 +27881,7 @@ def index_apache_struts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination]: """Return vulnerability data stored in index \"apache-struts\" @@ -28500,10 +27921,8 @@ def index_apache_struts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28556,8 +27975,7 @@ def index_apache_struts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28606,8 +28024,7 @@ def index_apache_struts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28625,7 +28042,7 @@ def index_apache_struts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-struts\" @@ -28665,10 +28082,8 @@ def index_apache_struts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28721,8 +28136,7 @@ def index_apache_struts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28766,8 +28180,7 @@ def _index_apache_struts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28780,7 +28193,10 @@ def _index_apache_struts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -28864,13 +28280,9 @@ def _index_apache_struts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -28953,8 +28365,7 @@ def index_apache_subversion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28972,7 +28383,7 @@ def index_apache_subversion_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination: """Return vulnerability data stored in index \"apache-subversion\" @@ -29012,10 +28423,8 @@ def index_apache_subversion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29068,8 +28477,7 @@ def index_apache_subversion_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29118,8 +28526,7 @@ def index_apache_subversion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29137,7 +28544,7 @@ def index_apache_subversion_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination]: """Return vulnerability data stored in index \"apache-subversion\" @@ -29177,10 +28584,8 @@ def index_apache_subversion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29233,8 +28638,7 @@ def index_apache_subversion_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29283,8 +28687,7 @@ def index_apache_subversion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29302,7 +28705,7 @@ def index_apache_subversion_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-subversion\" @@ -29342,10 +28745,8 @@ def index_apache_subversion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29398,8 +28799,7 @@ def index_apache_subversion_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29443,8 +28843,7 @@ def _index_apache_subversion_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -29457,7 +28856,10 @@ def _index_apache_subversion_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -29541,13 +28943,9 @@ def _index_apache_subversion_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -29630,8 +29028,7 @@ def index_apache_superset_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29649,7 +29046,7 @@ def index_apache_superset_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination: """Return vulnerability data stored in index \"apache-superset\" @@ -29689,10 +29086,8 @@ def index_apache_superset_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29745,8 +29140,7 @@ def index_apache_superset_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29795,8 +29189,7 @@ def index_apache_superset_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29814,7 +29207,7 @@ def index_apache_superset_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination]: """Return vulnerability data stored in index \"apache-superset\" @@ -29854,10 +29247,8 @@ def index_apache_superset_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29910,8 +29301,7 @@ def index_apache_superset_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29960,8 +29350,7 @@ def index_apache_superset_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29979,7 +29368,7 @@ def index_apache_superset_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-superset\" @@ -30019,10 +29408,8 @@ def index_apache_superset_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30075,8 +29462,7 @@ def index_apache_superset_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30120,8 +29506,7 @@ def _index_apache_superset_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30134,7 +29519,10 @@ def _index_apache_superset_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -30218,13 +29606,9 @@ def _index_apache_superset_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -30307,8 +29691,7 @@ def index_apache_tomcat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30326,7 +29709,7 @@ def index_apache_tomcat_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30366,10 +29749,8 @@ def index_apache_tomcat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30422,8 +29803,7 @@ def index_apache_tomcat_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30472,8 +29852,7 @@ def index_apache_tomcat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30491,7 +29870,7 @@ def index_apache_tomcat_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination]: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30531,10 +29910,8 @@ def index_apache_tomcat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30587,8 +29964,7 @@ def index_apache_tomcat_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30637,8 +30013,7 @@ def index_apache_tomcat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30656,7 +30031,7 @@ def index_apache_tomcat_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-tomcat\" @@ -30696,10 +30071,8 @@ def index_apache_tomcat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30752,8 +30125,7 @@ def index_apache_tomcat_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30797,8 +30169,7 @@ def _index_apache_tomcat_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30811,7 +30182,10 @@ def _index_apache_tomcat_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -30895,13 +30269,9 @@ def _index_apache_tomcat_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -30984,8 +30354,7 @@ def index_apache_zookeeper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31003,7 +30372,7 @@ def index_apache_zookeeper_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31043,10 +30412,8 @@ def index_apache_zookeeper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31099,8 +30466,7 @@ def index_apache_zookeeper_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31149,8 +30515,7 @@ def index_apache_zookeeper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31168,7 +30533,7 @@ def index_apache_zookeeper_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination]: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31208,10 +30573,8 @@ def index_apache_zookeeper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31264,8 +30627,7 @@ def index_apache_zookeeper_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31314,8 +30676,7 @@ def index_apache_zookeeper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31333,7 +30694,7 @@ def index_apache_zookeeper_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apache-zookeeper\" @@ -31373,10 +30734,8 @@ def index_apache_zookeeper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31429,8 +30788,7 @@ def index_apache_zookeeper_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31474,8 +30832,7 @@ def _index_apache_zookeeper_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -31488,7 +30845,10 @@ def _index_apache_zookeeper_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -31572,13 +30932,9 @@ def _index_apache_zookeeper_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -31661,8 +31017,7 @@ def index_appcheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31680,7 +31035,7 @@ def index_appcheck_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination: """Return vulnerability data stored in index \"appcheck\" @@ -31720,10 +31075,8 @@ def index_appcheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31776,8 +31129,7 @@ def index_appcheck_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31826,8 +31178,7 @@ def index_appcheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31845,7 +31196,7 @@ def index_appcheck_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination]: """Return vulnerability data stored in index \"appcheck\" @@ -31885,10 +31236,8 @@ def index_appcheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31941,8 +31290,7 @@ def index_appcheck_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31991,8 +31339,7 @@ def index_appcheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32010,7 +31357,7 @@ def index_appcheck_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"appcheck\" @@ -32050,10 +31397,8 @@ def index_appcheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32106,8 +31451,7 @@ def index_appcheck_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32151,8 +31495,7 @@ def _index_appcheck_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32165,7 +31508,10 @@ def _index_appcheck_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -32249,13 +31595,9 @@ def _index_appcheck_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -32338,8 +31680,7 @@ def index_appgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32357,7 +31698,7 @@ def index_appgate_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination: """Return vulnerability data stored in index \"appgate\" @@ -32397,10 +31738,8 @@ def index_appgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32453,8 +31792,7 @@ def index_appgate_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32503,8 +31841,7 @@ def index_appgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32522,7 +31859,7 @@ def index_appgate_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination]: """Return vulnerability data stored in index \"appgate\" @@ -32562,10 +31899,8 @@ def index_appgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32618,8 +31953,7 @@ def index_appgate_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32668,8 +32002,7 @@ def index_appgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32687,7 +32020,7 @@ def index_appgate_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"appgate\" @@ -32727,10 +32060,8 @@ def index_appgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32783,8 +32114,7 @@ def index_appgate_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32828,8 +32158,7 @@ def _index_appgate_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32842,7 +32171,10 @@ def _index_appgate_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -32926,13 +32258,9 @@ def _index_appgate_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -33015,8 +32343,7 @@ def index_apple_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33034,7 +32361,7 @@ def index_apple_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination: """Return vulnerability data stored in index \"apple\" @@ -33074,10 +32401,8 @@ def index_apple_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33130,8 +32455,7 @@ def index_apple_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33180,8 +32504,7 @@ def index_apple_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33199,7 +32522,7 @@ def index_apple_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"apple\" @@ -33239,10 +32562,8 @@ def index_apple_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33295,8 +32616,7 @@ def index_apple_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33345,8 +32665,7 @@ def index_apple_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33364,7 +32683,7 @@ def index_apple_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"apple\" @@ -33404,10 +32723,8 @@ def index_apple_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33460,8 +32777,7 @@ def index_apple_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33505,8 +32821,7 @@ def _index_apple_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -33519,7 +32834,10 @@ def _index_apple_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -33603,13 +32921,9 @@ def _index_apple_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -33692,8 +33006,7 @@ def index_arch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33711,7 +33024,7 @@ def index_arch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination: """Return vulnerability data stored in index \"arch\" @@ -33751,10 +33064,8 @@ def index_arch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33807,8 +33118,7 @@ def index_arch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33857,8 +33167,7 @@ def index_arch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33876,7 +33185,7 @@ def index_arch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination]: """Return vulnerability data stored in index \"arch\" @@ -33916,10 +33225,8 @@ def index_arch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33972,8 +33279,7 @@ def index_arch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34022,8 +33328,7 @@ def index_arch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34041,7 +33346,7 @@ def index_arch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"arch\" @@ -34081,10 +33386,8 @@ def index_arch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34137,8 +33440,7 @@ def index_arch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34182,8 +33484,7 @@ def _index_arch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34196,7 +33497,10 @@ def _index_arch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -34280,13 +33584,9 @@ def _index_arch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -34369,8 +33669,7 @@ def index_arista_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34388,7 +33687,7 @@ def index_arista_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination: """Return vulnerability data stored in index \"arista\" @@ -34428,10 +33727,8 @@ def index_arista_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34484,8 +33781,7 @@ def index_arista_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34534,8 +33830,7 @@ def index_arista_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34553,7 +33848,7 @@ def index_arista_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination]: """Return vulnerability data stored in index \"arista\" @@ -34593,10 +33888,8 @@ def index_arista_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34649,8 +33942,7 @@ def index_arista_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34699,8 +33991,7 @@ def index_arista_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34718,7 +34009,7 @@ def index_arista_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"arista\" @@ -34758,10 +34049,8 @@ def index_arista_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34814,8 +34103,7 @@ def index_arista_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34859,8 +34147,7 @@ def _index_arista_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34873,7 +34160,10 @@ def _index_arista_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -34957,13 +34247,9 @@ def _index_arista_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -35046,8 +34332,7 @@ def index_aruba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35065,7 +34350,7 @@ def index_aruba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination: """Return vulnerability data stored in index \"aruba\" @@ -35105,10 +34390,8 @@ def index_aruba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35161,8 +34444,7 @@ def index_aruba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35211,8 +34493,7 @@ def index_aruba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35230,7 +34511,7 @@ def index_aruba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination]: """Return vulnerability data stored in index \"aruba\" @@ -35270,10 +34551,8 @@ def index_aruba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35326,8 +34605,7 @@ def index_aruba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35376,8 +34654,7 @@ def index_aruba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35395,7 +34672,7 @@ def index_aruba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aruba\" @@ -35435,10 +34712,8 @@ def index_aruba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35491,8 +34766,7 @@ def index_aruba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35536,8 +34810,7 @@ def _index_aruba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -35550,7 +34823,10 @@ def _index_aruba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -35634,13 +34910,9 @@ def _index_aruba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -35723,8 +34995,7 @@ def index_asrg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35742,7 +35013,7 @@ def index_asrg_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination: """Return vulnerability data stored in index \"asrg\" @@ -35782,10 +35053,8 @@ def index_asrg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35838,8 +35107,7 @@ def index_asrg_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35888,8 +35156,7 @@ def index_asrg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35907,7 +35174,7 @@ def index_asrg_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination]: """Return vulnerability data stored in index \"asrg\" @@ -35947,10 +35214,8 @@ def index_asrg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36003,8 +35268,7 @@ def index_asrg_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36053,8 +35317,7 @@ def index_asrg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36072,7 +35335,7 @@ def index_asrg_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asrg\" @@ -36112,10 +35375,8 @@ def index_asrg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36168,8 +35429,7 @@ def index_asrg_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36213,8 +35473,7 @@ def _index_asrg_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36227,7 +35486,10 @@ def _index_asrg_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -36311,13 +35573,9 @@ def _index_asrg_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -36400,8 +35658,7 @@ def index_assetnote_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36419,7 +35676,7 @@ def index_assetnote_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination: """Return vulnerability data stored in index \"assetnote\" @@ -36459,10 +35716,8 @@ def index_assetnote_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36515,8 +35770,7 @@ def index_assetnote_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36565,8 +35819,7 @@ def index_assetnote_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36584,7 +35837,7 @@ def index_assetnote_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination]: """Return vulnerability data stored in index \"assetnote\" @@ -36624,10 +35877,8 @@ def index_assetnote_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36680,8 +35931,7 @@ def index_assetnote_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36730,8 +35980,7 @@ def index_assetnote_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36749,7 +35998,7 @@ def index_assetnote_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"assetnote\" @@ -36789,10 +36038,8 @@ def index_assetnote_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36845,8 +36092,7 @@ def index_assetnote_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36890,8 +36136,7 @@ def _index_assetnote_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36904,7 +36149,10 @@ def _index_assetnote_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -36988,13 +36236,9 @@ def _index_assetnote_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -37077,8 +36321,7 @@ def index_asterisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37096,7 +36339,7 @@ def index_asterisk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination: """Return vulnerability data stored in index \"asterisk\" @@ -37136,10 +36379,8 @@ def index_asterisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37192,8 +36433,7 @@ def index_asterisk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37242,8 +36482,7 @@ def index_asterisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37261,7 +36500,7 @@ def index_asterisk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination]: """Return vulnerability data stored in index \"asterisk\" @@ -37301,10 +36540,8 @@ def index_asterisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37357,8 +36594,7 @@ def index_asterisk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37407,8 +36643,7 @@ def index_asterisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37426,7 +36661,7 @@ def index_asterisk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asterisk\" @@ -37466,10 +36701,8 @@ def index_asterisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37522,8 +36755,7 @@ def index_asterisk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37567,8 +36799,7 @@ def _index_asterisk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -37581,7 +36812,10 @@ def _index_asterisk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -37665,13 +36899,9 @@ def _index_asterisk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -37754,8 +36984,7 @@ def index_astra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37773,7 +37002,7 @@ def index_astra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination: """Return vulnerability data stored in index \"astra\" @@ -37813,10 +37042,8 @@ def index_astra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37869,8 +37096,7 @@ def index_astra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37919,8 +37145,7 @@ def index_astra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37938,7 +37163,7 @@ def index_astra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination]: """Return vulnerability data stored in index \"astra\" @@ -37978,10 +37203,8 @@ def index_astra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38034,8 +37257,7 @@ def index_astra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38084,8 +37306,7 @@ def index_astra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38103,7 +37324,7 @@ def index_astra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"astra\" @@ -38143,10 +37364,8 @@ def index_astra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38199,8 +37418,7 @@ def index_astra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38244,8 +37462,7 @@ def _index_astra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38258,7 +37475,10 @@ def _index_astra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -38342,13 +37562,9 @@ def _index_astra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -38431,8 +37647,7 @@ def index_asus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38450,7 +37665,7 @@ def index_asus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination: """Return vulnerability data stored in index \"asus\" @@ -38490,10 +37705,8 @@ def index_asus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38546,8 +37759,7 @@ def index_asus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38596,8 +37808,7 @@ def index_asus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38615,7 +37826,7 @@ def index_asus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination]: """Return vulnerability data stored in index \"asus\" @@ -38655,10 +37866,8 @@ def index_asus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38711,8 +37920,7 @@ def index_asus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38761,8 +37969,7 @@ def index_asus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38780,7 +37987,7 @@ def index_asus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"asus\" @@ -38820,10 +38027,8 @@ def index_asus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38876,8 +38081,7 @@ def index_asus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38921,8 +38125,7 @@ def _index_asus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38935,7 +38138,10 @@ def _index_asus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -39019,13 +38225,9 @@ def _index_asus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -39108,8 +38310,7 @@ def index_atlassian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39127,7 +38328,7 @@ def index_atlassian_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination: """Return vulnerability data stored in index \"atlassian\" @@ -39167,10 +38368,8 @@ def index_atlassian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39223,8 +38422,7 @@ def index_atlassian_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39273,8 +38471,7 @@ def index_atlassian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39292,7 +38489,7 @@ def index_atlassian_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"atlassian\" @@ -39332,10 +38529,8 @@ def index_atlassian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39388,8 +38583,7 @@ def index_atlassian_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39438,8 +38632,7 @@ def index_atlassian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39457,7 +38650,7 @@ def index_atlassian_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atlassian\" @@ -39497,10 +38690,8 @@ def index_atlassian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39553,8 +38744,7 @@ def index_atlassian_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39598,8 +38788,7 @@ def _index_atlassian_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39612,7 +38801,10 @@ def _index_atlassian_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -39696,13 +38888,9 @@ def _index_atlassian_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -39785,8 +38973,7 @@ def index_atlassian_vulns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39804,7 +38991,7 @@ def index_atlassian_vulns_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -39844,10 +39031,8 @@ def index_atlassian_vulns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39900,8 +39085,7 @@ def index_atlassian_vulns_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39950,8 +39134,7 @@ def index_atlassian_vulns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39969,7 +39152,7 @@ def index_atlassian_vulns_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination]: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -40009,10 +39192,8 @@ def index_atlassian_vulns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40065,8 +39246,7 @@ def index_atlassian_vulns_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40115,8 +39295,7 @@ def index_atlassian_vulns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40134,7 +39313,7 @@ def index_atlassian_vulns_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atlassian-vulns\" @@ -40174,10 +39353,8 @@ def index_atlassian_vulns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40230,8 +39407,7 @@ def index_atlassian_vulns_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40275,8 +39451,7 @@ def _index_atlassian_vulns_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40289,7 +39464,10 @@ def _index_atlassian_vulns_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -40373,13 +39551,9 @@ def _index_atlassian_vulns_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -40462,8 +39636,7 @@ def index_atredis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40481,7 +39654,7 @@ def index_atredis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination: """Return vulnerability data stored in index \"atredis\" @@ -40521,10 +39694,8 @@ def index_atredis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40577,8 +39748,7 @@ def index_atredis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40627,8 +39797,7 @@ def index_atredis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40646,7 +39815,7 @@ def index_atredis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination]: """Return vulnerability data stored in index \"atredis\" @@ -40686,10 +39855,8 @@ def index_atredis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40742,8 +39909,7 @@ def index_atredis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40792,8 +39958,7 @@ def index_atredis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40811,7 +39976,7 @@ def index_atredis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"atredis\" @@ -40851,10 +40016,8 @@ def index_atredis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40907,8 +40070,7 @@ def index_atredis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40952,8 +40114,7 @@ def _index_atredis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40966,7 +40127,10 @@ def _index_atredis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -41050,13 +40214,9 @@ def _index_atredis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -41139,8 +40299,7 @@ def index_audiocodes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41158,7 +40317,7 @@ def index_audiocodes_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination: """Return vulnerability data stored in index \"audiocodes\" @@ -41198,10 +40357,8 @@ def index_audiocodes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41254,8 +40411,7 @@ def index_audiocodes_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41304,8 +40460,7 @@ def index_audiocodes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41323,7 +40478,7 @@ def index_audiocodes_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination]: """Return vulnerability data stored in index \"audiocodes\" @@ -41363,10 +40518,8 @@ def index_audiocodes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41419,8 +40572,7 @@ def index_audiocodes_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41469,8 +40621,7 @@ def index_audiocodes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41488,7 +40639,7 @@ def index_audiocodes_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"audiocodes\" @@ -41528,10 +40679,8 @@ def index_audiocodes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41584,8 +40733,7 @@ def index_audiocodes_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41629,8 +40777,7 @@ def _index_audiocodes_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41643,7 +40790,10 @@ def _index_audiocodes_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -41727,13 +40877,9 @@ def _index_audiocodes_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -41816,8 +40962,7 @@ def index_auscert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41835,7 +40980,7 @@ def index_auscert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination: """Return vulnerability data stored in index \"auscert\" @@ -41875,10 +41020,8 @@ def index_auscert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41931,8 +41074,7 @@ def index_auscert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41981,8 +41123,7 @@ def index_auscert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42000,7 +41141,7 @@ def index_auscert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination]: """Return vulnerability data stored in index \"auscert\" @@ -42040,10 +41181,8 @@ def index_auscert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42096,8 +41235,7 @@ def index_auscert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42146,8 +41284,7 @@ def index_auscert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42165,7 +41302,7 @@ def index_auscert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"auscert\" @@ -42205,10 +41342,8 @@ def index_auscert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42261,8 +41396,7 @@ def index_auscert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42306,8 +41440,7 @@ def _index_auscert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42320,7 +41453,10 @@ def _index_auscert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -42404,13 +41540,9 @@ def _index_auscert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -42493,8 +41625,7 @@ def index_autodesk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42512,7 +41643,7 @@ def index_autodesk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination: """Return vulnerability data stored in index \"autodesk\" @@ -42552,10 +41683,8 @@ def index_autodesk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42608,8 +41737,7 @@ def index_autodesk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42658,8 +41786,7 @@ def index_autodesk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42677,7 +41804,7 @@ def index_autodesk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination]: """Return vulnerability data stored in index \"autodesk\" @@ -42717,10 +41844,8 @@ def index_autodesk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42773,8 +41898,7 @@ def index_autodesk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42823,8 +41947,7 @@ def index_autodesk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42842,7 +41965,7 @@ def index_autodesk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"autodesk\" @@ -42882,10 +42005,8 @@ def index_autodesk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42938,8 +42059,7 @@ def index_autodesk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42983,8 +42103,7 @@ def _index_autodesk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42997,7 +42116,10 @@ def _index_autodesk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -43081,13 +42203,9 @@ def _index_autodesk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -43170,8 +42288,7 @@ def index_avaya_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43189,7 +42306,7 @@ def index_avaya_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination: """Return vulnerability data stored in index \"avaya\" @@ -43229,10 +42346,8 @@ def index_avaya_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43285,8 +42400,7 @@ def index_avaya_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43335,8 +42449,7 @@ def index_avaya_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43354,7 +42467,7 @@ def index_avaya_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination]: """Return vulnerability data stored in index \"avaya\" @@ -43394,10 +42507,8 @@ def index_avaya_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43450,8 +42561,7 @@ def index_avaya_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43500,8 +42610,7 @@ def index_avaya_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43519,7 +42628,7 @@ def index_avaya_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avaya\" @@ -43559,10 +42668,8 @@ def index_avaya_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43615,8 +42722,7 @@ def index_avaya_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43660,8 +42766,7 @@ def _index_avaya_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43674,7 +42779,10 @@ def _index_avaya_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -43758,13 +42866,9 @@ def _index_avaya_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -43847,8 +42951,7 @@ def index_aveva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43866,7 +42969,7 @@ def index_aveva_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"aveva\" @@ -43906,10 +43009,8 @@ def index_aveva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43962,8 +43063,7 @@ def index_aveva_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44012,8 +43112,7 @@ def index_aveva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44031,7 +43130,7 @@ def index_aveva_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"aveva\" @@ -44071,10 +43170,8 @@ def index_aveva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44127,8 +43224,7 @@ def index_aveva_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44177,8 +43273,7 @@ def index_aveva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44196,7 +43291,7 @@ def index_aveva_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aveva\" @@ -44236,10 +43331,8 @@ def index_aveva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44292,8 +43385,7 @@ def index_aveva_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44337,8 +43429,7 @@ def _index_aveva_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -44351,7 +43442,10 @@ def _index_aveva_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -44435,13 +43529,9 @@ def _index_aveva_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -44524,8 +43614,7 @@ def index_avidml_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44543,7 +43632,7 @@ def index_avidml_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination: """Return vulnerability data stored in index \"avidml-advs\" @@ -44583,10 +43672,8 @@ def index_avidml_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44639,8 +43726,7 @@ def index_avidml_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44689,8 +43775,7 @@ def index_avidml_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44708,7 +43793,7 @@ def index_avidml_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination]: """Return vulnerability data stored in index \"avidml-advs\" @@ -44748,10 +43833,8 @@ def index_avidml_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44804,8 +43887,7 @@ def index_avidml_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44854,8 +43936,7 @@ def index_avidml_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44873,7 +43954,7 @@ def index_avidml_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avidml-advs\" @@ -44913,10 +43994,8 @@ def index_avidml_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44969,8 +44048,7 @@ def index_avidml_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45014,8 +44092,7 @@ def _index_avidml_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45028,7 +44105,10 @@ def _index_avidml_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -45112,13 +44192,9 @@ def _index_avidml_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -45201,8 +44277,7 @@ def index_avigilon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45220,7 +44295,7 @@ def index_avigilon_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination: """Return vulnerability data stored in index \"avigilon\" @@ -45260,10 +44335,8 @@ def index_avigilon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45316,8 +44389,7 @@ def index_avigilon_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45366,8 +44438,7 @@ def index_avigilon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45385,7 +44456,7 @@ def index_avigilon_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination]: """Return vulnerability data stored in index \"avigilon\" @@ -45425,10 +44496,8 @@ def index_avigilon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45481,8 +44550,7 @@ def index_avigilon_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45531,8 +44599,7 @@ def index_avigilon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45550,7 +44617,7 @@ def index_avigilon_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"avigilon\" @@ -45590,10 +44657,8 @@ def index_avigilon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45646,8 +44711,7 @@ def index_avigilon_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45691,8 +44755,7 @@ def _index_avigilon_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45705,7 +44768,10 @@ def _index_avigilon_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -45789,13 +44855,9 @@ def _index_avigilon_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -45878,8 +44940,7 @@ def index_aws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45897,7 +44958,7 @@ def index_aws_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination: """Return vulnerability data stored in index \"aws\" @@ -45937,10 +44998,8 @@ def index_aws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45993,8 +45052,7 @@ def index_aws_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46043,8 +45101,7 @@ def index_aws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46062,7 +45119,7 @@ def index_aws_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination]: """Return vulnerability data stored in index \"aws\" @@ -46102,10 +45159,8 @@ def index_aws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46158,8 +45213,7 @@ def index_aws_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46208,8 +45262,7 @@ def index_aws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46227,7 +45280,7 @@ def index_aws_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"aws\" @@ -46267,10 +45320,8 @@ def index_aws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46323,8 +45374,7 @@ def index_aws_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46368,8 +45418,7 @@ def _index_aws_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -46382,7 +45431,10 @@ def _index_aws_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -46466,13 +45518,9 @@ def _index_aws_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -46555,8 +45603,7 @@ def index_axis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46574,7 +45621,7 @@ def index_axis_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination: """Return vulnerability data stored in index \"axis\" @@ -46614,10 +45661,8 @@ def index_axis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46670,8 +45715,7 @@ def index_axis_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46720,8 +45764,7 @@ def index_axis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46739,7 +45782,7 @@ def index_axis_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination]: """Return vulnerability data stored in index \"axis\" @@ -46779,10 +45822,8 @@ def index_axis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46835,8 +45876,7 @@ def index_axis_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46885,8 +45925,7 @@ def index_axis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46904,7 +45943,7 @@ def index_axis_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"axis\" @@ -46944,10 +45983,8 @@ def index_axis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47000,8 +46037,7 @@ def index_axis_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47045,8 +46081,7 @@ def _index_axis_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47059,7 +46094,10 @@ def _index_axis_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -47143,13 +46181,9 @@ def _index_axis_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -47232,8 +46266,7 @@ def index_azul_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47251,7 +46284,7 @@ def index_azul_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination: """Return vulnerability data stored in index \"azul\" @@ -47291,10 +46324,8 @@ def index_azul_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47347,8 +46378,7 @@ def index_azul_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47397,8 +46427,7 @@ def index_azul_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47416,7 +46445,7 @@ def index_azul_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination]: """Return vulnerability data stored in index \"azul\" @@ -47456,10 +46485,8 @@ def index_azul_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47512,8 +46539,7 @@ def index_azul_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47562,8 +46588,7 @@ def index_azul_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47581,7 +46606,7 @@ def index_azul_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"azul\" @@ -47621,10 +46646,8 @@ def index_azul_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47677,8 +46700,7 @@ def index_azul_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47722,8 +46744,7 @@ def _index_azul_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47736,7 +46757,10 @@ def _index_azul_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -47820,13 +46844,9 @@ def _index_azul_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -47909,8 +46929,7 @@ def index_bandr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47928,7 +46947,7 @@ def index_bandr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination: """Return vulnerability data stored in index \"bandr\" @@ -47968,10 +46987,8 @@ def index_bandr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48024,8 +47041,7 @@ def index_bandr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48074,8 +47090,7 @@ def index_bandr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48093,7 +47108,7 @@ def index_bandr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination]: """Return vulnerability data stored in index \"bandr\" @@ -48133,10 +47148,8 @@ def index_bandr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48189,8 +47202,7 @@ def index_bandr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48239,8 +47251,7 @@ def index_bandr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48258,7 +47269,7 @@ def index_bandr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bandr\" @@ -48298,10 +47309,8 @@ def index_bandr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48354,8 +47363,7 @@ def index_bandr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48399,8 +47407,7 @@ def _index_bandr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -48413,7 +47420,10 @@ def _index_bandr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -48497,13 +47507,9 @@ def _index_bandr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -48586,8 +47592,7 @@ def index_baxter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48605,7 +47610,7 @@ def index_baxter_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination: """Return vulnerability data stored in index \"baxter\" @@ -48645,10 +47650,8 @@ def index_baxter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48701,8 +47704,7 @@ def index_baxter_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48751,8 +47753,7 @@ def index_baxter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48770,7 +47771,7 @@ def index_baxter_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"baxter\" @@ -48810,10 +47811,8 @@ def index_baxter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48866,8 +47865,7 @@ def index_baxter_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48916,8 +47914,7 @@ def index_baxter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48935,7 +47932,7 @@ def index_baxter_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"baxter\" @@ -48975,10 +47972,8 @@ def index_baxter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49031,8 +48026,7 @@ def index_baxter_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49076,8 +48070,7 @@ def _index_baxter_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49090,7 +48083,10 @@ def _index_baxter_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -49174,13 +48170,9 @@ def _index_baxter_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -49263,8 +48255,7 @@ def index_bbraun_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49282,7 +48273,7 @@ def index_bbraun_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bbraun\" @@ -49322,10 +48313,8 @@ def index_bbraun_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49378,8 +48367,7 @@ def index_bbraun_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49428,8 +48416,7 @@ def index_bbraun_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49447,7 +48434,7 @@ def index_bbraun_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bbraun\" @@ -49487,10 +48474,8 @@ def index_bbraun_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49543,8 +48528,7 @@ def index_bbraun_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49593,8 +48577,7 @@ def index_bbraun_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49612,7 +48595,7 @@ def index_bbraun_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bbraun\" @@ -49652,10 +48635,8 @@ def index_bbraun_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49708,8 +48689,7 @@ def index_bbraun_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49753,8 +48733,7 @@ def _index_bbraun_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49767,7 +48746,10 @@ def _index_bbraun_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -49851,13 +48833,9 @@ def _index_bbraun_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -49940,8 +48918,7 @@ def index_bd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49959,7 +48936,7 @@ def index_bd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bd\" @@ -49999,10 +48976,8 @@ def index_bd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50055,8 +49030,7 @@ def index_bd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50105,8 +49079,7 @@ def index_bd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50124,7 +49097,7 @@ def index_bd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bd\" @@ -50164,10 +49137,8 @@ def index_bd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50220,8 +49191,7 @@ def index_bd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50270,8 +49240,7 @@ def index_bd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50289,7 +49258,7 @@ def index_bd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bd\" @@ -50329,10 +49298,8 @@ def index_bd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50385,8 +49352,7 @@ def index_bd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50430,8 +49396,7 @@ def _index_bd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -50444,7 +49409,10 @@ def _index_bd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -50528,13 +49496,9 @@ def _index_bd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -50617,8 +49581,7 @@ def index_bdu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50636,7 +49599,7 @@ def index_bdu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bdu\" @@ -50676,10 +49639,8 @@ def index_bdu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50732,8 +49693,7 @@ def index_bdu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50782,8 +49742,7 @@ def index_bdu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50801,7 +49760,7 @@ def index_bdu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bdu\" @@ -50841,10 +49800,8 @@ def index_bdu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50897,8 +49854,7 @@ def index_bdu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50947,8 +49903,7 @@ def index_bdu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50966,7 +49921,7 @@ def index_bdu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bdu\" @@ -51006,10 +49961,8 @@ def index_bdu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51062,8 +50015,7 @@ def index_bdu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51107,8 +50059,7 @@ def _index_bdu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51121,7 +50072,10 @@ def _index_bdu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -51205,13 +50159,9 @@ def _index_bdu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -51294,8 +50244,7 @@ def index_beckhoff_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51313,7 +50262,7 @@ def index_beckhoff_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination: """Return vulnerability data stored in index \"beckhoff\" @@ -51353,10 +50302,8 @@ def index_beckhoff_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51409,8 +50356,7 @@ def index_beckhoff_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51459,8 +50405,7 @@ def index_beckhoff_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51478,7 +50423,7 @@ def index_beckhoff_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"beckhoff\" @@ -51518,10 +50463,8 @@ def index_beckhoff_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51574,8 +50517,7 @@ def index_beckhoff_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51624,8 +50566,7 @@ def index_beckhoff_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51643,7 +50584,7 @@ def index_beckhoff_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beckhoff\" @@ -51683,10 +50624,8 @@ def index_beckhoff_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51739,8 +50678,7 @@ def index_beckhoff_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51784,8 +50722,7 @@ def _index_beckhoff_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51798,7 +50735,10 @@ def _index_beckhoff_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -51882,13 +50822,9 @@ def _index_beckhoff_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -51971,8 +50907,7 @@ def index_beckman_coulter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51990,7 +50925,7 @@ def index_beckman_coulter_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52030,10 +50965,8 @@ def index_beckman_coulter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52086,8 +51019,7 @@ def index_beckman_coulter_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52136,8 +51068,7 @@ def index_beckman_coulter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52155,7 +51086,7 @@ def index_beckman_coulter_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination]: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52195,10 +51126,8 @@ def index_beckman_coulter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52251,8 +51180,7 @@ def index_beckman_coulter_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52301,8 +51229,7 @@ def index_beckman_coulter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52320,7 +51247,7 @@ def index_beckman_coulter_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beckman-coulter\" @@ -52360,10 +51287,8 @@ def index_beckman_coulter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52416,8 +51341,7 @@ def index_beckman_coulter_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52461,8 +51385,7 @@ def _index_beckman_coulter_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -52475,7 +51398,10 @@ def _index_beckman_coulter_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -52559,13 +51485,9 @@ def _index_beckman_coulter_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -52648,8 +51570,7 @@ def index_belden_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52667,7 +51588,7 @@ def index_belden_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination: """Return vulnerability data stored in index \"belden\" @@ -52707,10 +51628,8 @@ def index_belden_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52763,8 +51682,7 @@ def index_belden_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52813,8 +51731,7 @@ def index_belden_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52832,7 +51749,7 @@ def index_belden_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"belden\" @@ -52872,10 +51789,8 @@ def index_belden_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52928,8 +51843,7 @@ def index_belden_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52978,8 +51892,7 @@ def index_belden_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52997,7 +51910,7 @@ def index_belden_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"belden\" @@ -53037,10 +51950,8 @@ def index_belden_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53093,8 +52004,7 @@ def index_belden_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53138,8 +52048,7 @@ def _index_belden_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53152,7 +52061,10 @@ def _index_belden_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -53236,13 +52148,9 @@ def _index_belden_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -53325,8 +52233,7 @@ def index_beyond_trust_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53344,7 +52251,7 @@ def index_beyond_trust_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination: """Return vulnerability data stored in index \"beyond-trust\" @@ -53384,10 +52291,8 @@ def index_beyond_trust_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53440,8 +52345,7 @@ def index_beyond_trust_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53490,8 +52394,7 @@ def index_beyond_trust_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53509,7 +52412,7 @@ def index_beyond_trust_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination]: """Return vulnerability data stored in index \"beyond-trust\" @@ -53549,10 +52452,8 @@ def index_beyond_trust_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53605,8 +52506,7 @@ def index_beyond_trust_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53655,8 +52555,7 @@ def index_beyond_trust_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53674,7 +52573,7 @@ def index_beyond_trust_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"beyond-trust\" @@ -53714,10 +52613,8 @@ def index_beyond_trust_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53770,8 +52667,7 @@ def index_beyond_trust_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53815,8 +52711,7 @@ def _index_beyond_trust_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53829,7 +52724,10 @@ def _index_beyond_trust_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -53913,13 +52811,9 @@ def _index_beyond_trust_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -54002,8 +52896,7 @@ def index_binarly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54021,7 +52914,7 @@ def index_binarly_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination: """Return vulnerability data stored in index \"binarly\" @@ -54061,10 +52954,8 @@ def index_binarly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54117,8 +53008,7 @@ def index_binarly_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54167,8 +53057,7 @@ def index_binarly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54186,7 +53075,7 @@ def index_binarly_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination]: """Return vulnerability data stored in index \"binarly\" @@ -54226,10 +53115,8 @@ def index_binarly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54282,8 +53169,7 @@ def index_binarly_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54332,8 +53218,7 @@ def index_binarly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54351,7 +53236,7 @@ def index_binarly_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"binarly\" @@ -54391,10 +53276,8 @@ def index_binarly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54447,8 +53330,7 @@ def index_binarly_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54492,8 +53374,7 @@ def _index_binarly_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -54506,7 +53387,10 @@ def _index_binarly_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -54590,13 +53474,9 @@ def _index_binarly_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -54679,8 +53559,7 @@ def index_bitdefender_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54698,7 +53577,7 @@ def index_bitdefender_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination: """Return vulnerability data stored in index \"bitdefender\" @@ -54738,10 +53617,8 @@ def index_bitdefender_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54794,8 +53671,7 @@ def index_bitdefender_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54844,8 +53720,7 @@ def index_bitdefender_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54863,7 +53738,7 @@ def index_bitdefender_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination]: """Return vulnerability data stored in index \"bitdefender\" @@ -54903,10 +53778,8 @@ def index_bitdefender_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54959,8 +53832,7 @@ def index_bitdefender_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55009,8 +53881,7 @@ def index_bitdefender_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55028,7 +53899,7 @@ def index_bitdefender_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bitdefender\" @@ -55068,10 +53939,8 @@ def index_bitdefender_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55124,8 +53993,7 @@ def index_bitdefender_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55169,8 +54037,7 @@ def _index_bitdefender_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55183,7 +54050,10 @@ def _index_bitdefender_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -55267,13 +54137,9 @@ def _index_bitdefender_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -55356,8 +54222,7 @@ def index_blackberry_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55375,7 +54240,7 @@ def index_blackberry_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination: """Return vulnerability data stored in index \"blackberry\" @@ -55415,10 +54280,8 @@ def index_blackberry_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55471,8 +54334,7 @@ def index_blackberry_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55521,8 +54383,7 @@ def index_blackberry_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55540,7 +54401,7 @@ def index_blackberry_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination]: """Return vulnerability data stored in index \"blackberry\" @@ -55580,10 +54441,8 @@ def index_blackberry_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55636,8 +54495,7 @@ def index_blackberry_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55686,8 +54544,7 @@ def index_blackberry_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55705,7 +54562,7 @@ def index_blackberry_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"blackberry\" @@ -55745,10 +54602,8 @@ def index_blackberry_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55801,8 +54656,7 @@ def index_blackberry_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55846,8 +54700,7 @@ def _index_blackberry_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55860,7 +54713,10 @@ def _index_blackberry_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -55944,13 +54800,9 @@ def _index_blackberry_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -56033,8 +54885,7 @@ def index_bls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56052,7 +54903,7 @@ def index_bls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination: """Return vulnerability data stored in index \"bls\" @@ -56092,10 +54943,8 @@ def index_bls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56148,8 +54997,7 @@ def index_bls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56198,8 +55046,7 @@ def index_bls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56217,7 +55064,7 @@ def index_bls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination]: """Return vulnerability data stored in index \"bls\" @@ -56257,10 +55104,8 @@ def index_bls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56313,8 +55158,7 @@ def index_bls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56363,8 +55207,7 @@ def index_bls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56382,7 +55225,7 @@ def index_bls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bls\" @@ -56422,10 +55265,8 @@ def index_bls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56478,8 +55319,7 @@ def index_bls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56523,8 +55363,7 @@ def _index_bls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -56537,7 +55376,10 @@ def _index_bls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -56621,13 +55463,9 @@ def _index_bls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -56710,8 +55548,7 @@ def index_bosch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56729,7 +55566,7 @@ def index_bosch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination: """Return vulnerability data stored in index \"bosch\" @@ -56769,10 +55606,8 @@ def index_bosch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56825,8 +55660,7 @@ def index_bosch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56875,8 +55709,7 @@ def index_bosch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56894,7 +55727,7 @@ def index_bosch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"bosch\" @@ -56934,10 +55767,8 @@ def index_bosch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56990,8 +55821,7 @@ def index_bosch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57040,8 +55870,7 @@ def index_bosch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57059,7 +55888,7 @@ def index_bosch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"bosch\" @@ -57099,10 +55928,8 @@ def index_bosch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57155,8 +55982,7 @@ def index_bosch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57200,8 +56026,7 @@ def _index_bosch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57214,7 +56039,10 @@ def _index_bosch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -57298,13 +56126,9 @@ def _index_bosch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -57387,8 +56211,7 @@ def index_boston_scientific_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57406,7 +56229,7 @@ def index_boston_scientific_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination: """Return vulnerability data stored in index \"boston-scientific\" @@ -57446,10 +56269,8 @@ def index_boston_scientific_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57502,8 +56323,7 @@ def index_boston_scientific_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57552,8 +56372,7 @@ def index_boston_scientific_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57571,7 +56390,7 @@ def index_boston_scientific_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"boston-scientific\" @@ -57611,10 +56430,8 @@ def index_boston_scientific_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57667,8 +56484,7 @@ def index_boston_scientific_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57717,8 +56533,7 @@ def index_boston_scientific_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57736,7 +56551,7 @@ def index_boston_scientific_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"boston-scientific\" @@ -57776,10 +56591,8 @@ def index_boston_scientific_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57832,8 +56645,7 @@ def index_boston_scientific_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57877,8 +56689,7 @@ def _index_boston_scientific_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57891,7 +56702,10 @@ def _index_boston_scientific_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -57975,13 +56789,9 @@ def _index_boston_scientific_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -58064,8 +56874,7 @@ def index_botnets_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58083,7 +56892,7 @@ def index_botnets_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination: """Return vulnerability data stored in index \"botnets\" @@ -58123,10 +56932,8 @@ def index_botnets_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58179,8 +56986,7 @@ def index_botnets_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58229,8 +57035,7 @@ def index_botnets_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58248,7 +57053,7 @@ def index_botnets_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination]: """Return vulnerability data stored in index \"botnets\" @@ -58288,10 +57093,8 @@ def index_botnets_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58344,8 +57147,7 @@ def index_botnets_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58394,8 +57196,7 @@ def index_botnets_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58413,7 +57214,7 @@ def index_botnets_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"botnets\" @@ -58453,10 +57254,8 @@ def index_botnets_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58509,8 +57308,7 @@ def index_botnets_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58554,8 +57352,7 @@ def _index_botnets_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -58568,7 +57365,10 @@ def _index_botnets_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -58652,13 +57452,9 @@ def _index_botnets_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -58741,8 +57537,7 @@ def index_ca_cyber_centre_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58760,7 +57555,7 @@ def index_ca_cyber_centre_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -58800,10 +57595,8 @@ def index_ca_cyber_centre_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58856,8 +57649,7 @@ def index_ca_cyber_centre_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58906,8 +57698,7 @@ def index_ca_cyber_centre_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58925,7 +57716,7 @@ def index_ca_cyber_centre_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -58965,10 +57756,8 @@ def index_ca_cyber_centre_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59021,8 +57810,7 @@ def index_ca_cyber_centre_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59071,8 +57859,7 @@ def index_ca_cyber_centre_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59090,7 +57877,7 @@ def index_ca_cyber_centre_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ca-cyber-centre\" @@ -59130,10 +57917,8 @@ def index_ca_cyber_centre_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59186,8 +57971,7 @@ def index_ca_cyber_centre_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59231,8 +58015,7 @@ def _index_ca_cyber_centre_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59245,7 +58028,10 @@ def _index_ca_cyber_centre_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -59329,13 +58115,9 @@ def _index_ca_cyber_centre_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -59418,8 +58200,7 @@ def index_canvas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59437,7 +58218,7 @@ def index_canvas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination: """Return vulnerability data stored in index \"canvas\" @@ -59477,10 +58258,8 @@ def index_canvas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59533,8 +58312,7 @@ def index_canvas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59583,8 +58361,7 @@ def index_canvas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59602,7 +58379,7 @@ def index_canvas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination]: """Return vulnerability data stored in index \"canvas\" @@ -59642,10 +58419,8 @@ def index_canvas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59698,8 +58473,7 @@ def index_canvas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59748,8 +58522,7 @@ def index_canvas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59767,7 +58540,7 @@ def index_canvas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"canvas\" @@ -59807,10 +58580,8 @@ def index_canvas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59863,8 +58634,7 @@ def index_canvas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59908,8 +58678,7 @@ def _index_canvas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59922,7 +58691,10 @@ def _index_canvas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -60006,13 +58778,9 @@ def _index_canvas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -60095,8 +58863,7 @@ def index_carestream_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60114,7 +58881,7 @@ def index_carestream_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination: """Return vulnerability data stored in index \"carestream\" @@ -60154,10 +58921,8 @@ def index_carestream_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60210,8 +58975,7 @@ def index_carestream_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60260,8 +59024,7 @@ def index_carestream_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60279,7 +59042,7 @@ def index_carestream_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"carestream\" @@ -60319,10 +59082,8 @@ def index_carestream_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60375,8 +59136,7 @@ def index_carestream_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60425,8 +59185,7 @@ def index_carestream_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60444,7 +59203,7 @@ def index_carestream_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"carestream\" @@ -60484,10 +59243,8 @@ def index_carestream_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60540,8 +59297,7 @@ def index_carestream_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60585,8 +59341,7 @@ def _index_carestream_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60599,7 +59354,10 @@ def _index_carestream_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -60683,13 +59441,9 @@ def _index_carestream_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -60772,8 +59526,7 @@ def index_cargo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60791,7 +59544,7 @@ def index_cargo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"cargo\" @@ -60831,10 +59584,8 @@ def index_cargo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60887,8 +59638,7 @@ def index_cargo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60937,8 +59687,7 @@ def index_cargo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60956,7 +59705,7 @@ def index_cargo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"cargo\" @@ -60996,10 +59745,8 @@ def index_cargo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61052,8 +59799,7 @@ def index_cargo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61102,8 +59848,7 @@ def index_cargo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61121,7 +59866,7 @@ def index_cargo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cargo\" @@ -61161,10 +59906,8 @@ def index_cargo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61217,8 +59960,7 @@ def index_cargo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61262,8 +60004,7 @@ def _index_cargo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61276,7 +60017,10 @@ def _index_cargo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -61360,13 +60104,9 @@ def _index_cargo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -61449,8 +60189,7 @@ def index_carrier_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61468,7 +60207,7 @@ def index_carrier_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination: """Return vulnerability data stored in index \"carrier\" @@ -61508,10 +60247,8 @@ def index_carrier_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61564,8 +60301,7 @@ def index_carrier_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61614,8 +60350,7 @@ def index_carrier_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61633,7 +60368,7 @@ def index_carrier_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination]: """Return vulnerability data stored in index \"carrier\" @@ -61673,10 +60408,8 @@ def index_carrier_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61729,8 +60462,7 @@ def index_carrier_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61779,8 +60511,7 @@ def index_carrier_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61798,7 +60529,7 @@ def index_carrier_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"carrier\" @@ -61838,10 +60569,8 @@ def index_carrier_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61894,8 +60623,7 @@ def index_carrier_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61939,8 +60667,7 @@ def _index_carrier_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61953,7 +60680,10 @@ def _index_carrier_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -62037,13 +60767,9 @@ def _index_carrier_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -62126,8 +60852,7 @@ def index_cbl_mariner_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62145,7 +60870,7 @@ def index_cbl_mariner_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62185,10 +60910,8 @@ def index_cbl_mariner_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62241,8 +60964,7 @@ def index_cbl_mariner_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62291,8 +61013,7 @@ def index_cbl_mariner_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62310,7 +61031,7 @@ def index_cbl_mariner_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination]: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62350,10 +61071,8 @@ def index_cbl_mariner_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62406,8 +61125,7 @@ def index_cbl_mariner_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62456,8 +61174,7 @@ def index_cbl_mariner_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62475,7 +61192,7 @@ def index_cbl_mariner_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cbl-mariner\" @@ -62515,10 +61232,8 @@ def index_cbl_mariner_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62571,8 +61286,7 @@ def index_cbl_mariner_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62616,8 +61330,7 @@ def _index_cbl_mariner_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62630,7 +61343,10 @@ def _index_cbl_mariner_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -62714,13 +61430,9 @@ def _index_cbl_mariner_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -62803,8 +61515,7 @@ def index_centos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62822,7 +61533,7 @@ def index_centos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination: """Return vulnerability data stored in index \"centos\" @@ -62862,10 +61573,8 @@ def index_centos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62918,8 +61627,7 @@ def index_centos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62968,8 +61676,7 @@ def index_centos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62987,7 +61694,7 @@ def index_centos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination]: """Return vulnerability data stored in index \"centos\" @@ -63027,10 +61734,8 @@ def index_centos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63083,8 +61788,7 @@ def index_centos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63133,8 +61837,7 @@ def index_centos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63152,7 +61855,7 @@ def index_centos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"centos\" @@ -63192,10 +61895,8 @@ def index_centos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63248,8 +61949,7 @@ def index_centos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63293,8 +61993,7 @@ def _index_centos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63307,7 +62006,10 @@ def _index_centos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -63391,13 +62093,9 @@ def _index_centos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -63480,8 +62178,7 @@ def index_cert_be_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63499,7 +62196,7 @@ def index_cert_be_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination: """Return vulnerability data stored in index \"cert-be\" @@ -63539,10 +62236,8 @@ def index_cert_be_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63595,8 +62290,7 @@ def index_cert_be_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63645,8 +62339,7 @@ def index_cert_be_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63664,7 +62357,7 @@ def index_cert_be_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination]: """Return vulnerability data stored in index \"cert-be\" @@ -63704,10 +62397,8 @@ def index_cert_be_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63760,8 +62451,7 @@ def index_cert_be_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63810,8 +62500,7 @@ def index_cert_be_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63829,7 +62518,7 @@ def index_cert_be_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-be\" @@ -63869,10 +62558,8 @@ def index_cert_be_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63925,8 +62612,7 @@ def index_cert_be_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63970,8 +62656,7 @@ def _index_cert_be_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63984,7 +62669,10 @@ def _index_cert_be_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -64068,13 +62756,9 @@ def _index_cert_be_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -64157,8 +62841,7 @@ def index_cert_in_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64176,7 +62859,7 @@ def index_cert_in_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination: """Return vulnerability data stored in index \"cert-in\" @@ -64216,10 +62899,8 @@ def index_cert_in_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64272,8 +62953,7 @@ def index_cert_in_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64322,8 +63002,7 @@ def index_cert_in_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64341,7 +63020,7 @@ def index_cert_in_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination]: """Return vulnerability data stored in index \"cert-in\" @@ -64381,10 +63060,8 @@ def index_cert_in_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64437,8 +63114,7 @@ def index_cert_in_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64487,8 +63163,7 @@ def index_cert_in_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64506,7 +63181,7 @@ def index_cert_in_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-in\" @@ -64546,10 +63221,8 @@ def index_cert_in_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64602,8 +63275,7 @@ def index_cert_in_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64647,8 +63319,7 @@ def _index_cert_in_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64661,7 +63332,10 @@ def _index_cert_in_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -64745,13 +63419,9 @@ def _index_cert_in_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -64834,8 +63504,7 @@ def index_cert_ir_security_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64853,7 +63522,7 @@ def index_cert_ir_security_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -64893,10 +63562,8 @@ def index_cert_ir_security_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64949,8 +63616,7 @@ def index_cert_ir_security_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64999,8 +63665,7 @@ def index_cert_ir_security_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65018,7 +63683,7 @@ def index_cert_ir_security_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination]: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -65058,10 +63723,8 @@ def index_cert_ir_security_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65114,8 +63777,7 @@ def index_cert_ir_security_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65164,8 +63826,7 @@ def index_cert_ir_security_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65183,7 +63844,7 @@ def index_cert_ir_security_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -65223,10 +63884,8 @@ def index_cert_ir_security_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65279,8 +63938,7 @@ def index_cert_ir_security_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65324,8 +63982,7 @@ def _index_cert_ir_security_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -65338,7 +63995,10 @@ def _index_cert_ir_security_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -65422,13 +64082,9 @@ def _index_cert_ir_security_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -65511,8 +64167,7 @@ def index_cert_se_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65530,7 +64185,7 @@ def index_cert_se_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination: """Return vulnerability data stored in index \"cert-se\" @@ -65570,10 +64225,8 @@ def index_cert_se_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65626,8 +64279,7 @@ def index_cert_se_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65676,8 +64328,7 @@ def index_cert_se_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65695,7 +64346,7 @@ def index_cert_se_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination]: """Return vulnerability data stored in index \"cert-se\" @@ -65735,10 +64386,8 @@ def index_cert_se_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65791,8 +64440,7 @@ def index_cert_se_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65841,8 +64489,7 @@ def index_cert_se_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65860,7 +64507,7 @@ def index_cert_se_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-se\" @@ -65900,10 +64547,8 @@ def index_cert_se_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65956,8 +64601,7 @@ def index_cert_se_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66001,8 +64645,7 @@ def _index_cert_se_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66015,7 +64658,10 @@ def _index_cert_se_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -66099,13 +64745,9 @@ def _index_cert_se_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -66188,8 +64830,7 @@ def index_cert_ua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66207,7 +64848,7 @@ def index_cert_ua_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination: """Return vulnerability data stored in index \"cert-ua\" @@ -66247,10 +64888,8 @@ def index_cert_ua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66303,8 +64942,7 @@ def index_cert_ua_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66353,8 +64991,7 @@ def index_cert_ua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66372,7 +65009,7 @@ def index_cert_ua_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination]: """Return vulnerability data stored in index \"cert-ua\" @@ -66412,10 +65049,8 @@ def index_cert_ua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66468,8 +65103,7 @@ def index_cert_ua_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66518,8 +65152,7 @@ def index_cert_ua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66537,7 +65170,7 @@ def index_cert_ua_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cert-ua\" @@ -66577,10 +65210,8 @@ def index_cert_ua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66633,8 +65264,7 @@ def index_cert_ua_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66678,8 +65308,7 @@ def _index_cert_ua_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66692,7 +65321,10 @@ def _index_cert_ua_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -66776,13 +65408,9 @@ def _index_cert_ua_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -66865,8 +65493,7 @@ def index_certeu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66884,7 +65511,7 @@ def index_certeu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination: """Return vulnerability data stored in index \"certeu\" @@ -66924,10 +65551,8 @@ def index_certeu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66980,8 +65605,7 @@ def index_certeu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67030,8 +65654,7 @@ def index_certeu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67049,7 +65672,7 @@ def index_certeu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"certeu\" @@ -67089,10 +65712,8 @@ def index_certeu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67145,8 +65766,7 @@ def index_certeu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67195,8 +65815,7 @@ def index_certeu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67214,7 +65833,7 @@ def index_certeu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"certeu\" @@ -67254,10 +65873,8 @@ def index_certeu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67310,8 +65927,7 @@ def index_certeu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67355,8 +65971,7 @@ def _index_certeu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -67369,7 +65984,10 @@ def _index_certeu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -67453,13 +66071,9 @@ def _index_certeu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -67542,8 +66156,7 @@ def index_certfr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67561,7 +66174,7 @@ def index_certfr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination: """Return vulnerability data stored in index \"certfr\" @@ -67601,10 +66214,8 @@ def index_certfr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67657,8 +66268,7 @@ def index_certfr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67707,8 +66317,7 @@ def index_certfr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67726,7 +66335,7 @@ def index_certfr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"certfr\" @@ -67766,10 +66375,8 @@ def index_certfr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67822,8 +66429,7 @@ def index_certfr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67872,8 +66478,7 @@ def index_certfr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67891,7 +66496,7 @@ def index_certfr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"certfr\" @@ -67931,10 +66536,8 @@ def index_certfr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67987,8 +66590,7 @@ def index_certfr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68032,8 +66634,7 @@ def _index_certfr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68046,7 +66647,10 @@ def _index_certfr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -68130,13 +66734,9 @@ def _index_certfr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -68219,8 +66819,7 @@ def index_chainguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68238,7 +66837,7 @@ def index_chainguard_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination: """Return vulnerability data stored in index \"chainguard\" @@ -68278,10 +66877,8 @@ def index_chainguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68334,8 +66931,7 @@ def index_chainguard_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68384,8 +66980,7 @@ def index_chainguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68403,7 +66998,7 @@ def index_chainguard_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination]: """Return vulnerability data stored in index \"chainguard\" @@ -68443,10 +67038,8 @@ def index_chainguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68499,8 +67092,7 @@ def index_chainguard_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68549,8 +67141,7 @@ def index_chainguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68568,7 +67159,7 @@ def index_chainguard_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"chainguard\" @@ -68608,10 +67199,8 @@ def index_chainguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68664,8 +67253,7 @@ def index_chainguard_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68709,8 +67297,7 @@ def _index_chainguard_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68723,7 +67310,10 @@ def _index_chainguard_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -68807,13 +67397,9 @@ def _index_chainguard_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -68896,8 +67482,7 @@ def index_checkpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68915,7 +67500,7 @@ def index_checkpoint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination: """Return vulnerability data stored in index \"checkpoint\" @@ -68955,10 +67540,8 @@ def index_checkpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69011,8 +67594,7 @@ def index_checkpoint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69061,8 +67643,7 @@ def index_checkpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69080,7 +67661,7 @@ def index_checkpoint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination]: """Return vulnerability data stored in index \"checkpoint\" @@ -69120,10 +67701,8 @@ def index_checkpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69176,8 +67755,7 @@ def index_checkpoint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69226,8 +67804,7 @@ def index_checkpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69245,7 +67822,7 @@ def index_checkpoint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"checkpoint\" @@ -69285,10 +67862,8 @@ def index_checkpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69341,8 +67916,7 @@ def index_checkpoint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69386,8 +67960,7 @@ def _index_checkpoint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -69400,7 +67973,10 @@ def _index_checkpoint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -69484,13 +68060,9 @@ def _index_checkpoint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -69573,8 +68145,7 @@ def index_chrome_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69592,7 +68163,7 @@ def index_chrome_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination: """Return vulnerability data stored in index \"chrome\" @@ -69632,10 +68203,8 @@ def index_chrome_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69688,8 +68257,7 @@ def index_chrome_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69738,8 +68306,7 @@ def index_chrome_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69757,7 +68324,7 @@ def index_chrome_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination]: """Return vulnerability data stored in index \"chrome\" @@ -69797,10 +68364,8 @@ def index_chrome_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69853,8 +68418,7 @@ def index_chrome_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69903,8 +68467,7 @@ def index_chrome_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69922,7 +68485,7 @@ def index_chrome_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"chrome\" @@ -69962,10 +68525,8 @@ def index_chrome_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70018,8 +68579,7 @@ def index_chrome_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70063,8 +68623,7 @@ def _index_chrome_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70077,7 +68636,10 @@ def _index_chrome_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -70161,13 +68723,9 @@ def _index_chrome_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -70250,8 +68808,7 @@ def index_ciena_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70269,7 +68826,7 @@ def index_ciena_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination: """Return vulnerability data stored in index \"ciena\" @@ -70309,10 +68866,8 @@ def index_ciena_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70365,8 +68920,7 @@ def index_ciena_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70415,8 +68969,7 @@ def index_ciena_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70434,7 +68987,7 @@ def index_ciena_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination]: """Return vulnerability data stored in index \"ciena\" @@ -70474,10 +69027,8 @@ def index_ciena_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70530,8 +69081,7 @@ def index_ciena_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70580,8 +69130,7 @@ def index_ciena_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70599,7 +69148,7 @@ def index_ciena_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ciena\" @@ -70639,10 +69188,8 @@ def index_ciena_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70695,8 +69242,7 @@ def index_ciena_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70740,8 +69286,7 @@ def _index_ciena_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70754,7 +69299,10 @@ def _index_ciena_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -70838,13 +69386,9 @@ def _index_ciena_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -70927,8 +69471,7 @@ def index_cisa_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70946,7 +69489,7 @@ def index_cisa_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination: """Return vulnerability data stored in index \"cisa-alerts\" @@ -70986,10 +69529,8 @@ def index_cisa_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71042,8 +69583,7 @@ def index_cisa_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71092,8 +69632,7 @@ def index_cisa_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71111,7 +69650,7 @@ def index_cisa_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination]: """Return vulnerability data stored in index \"cisa-alerts\" @@ -71151,10 +69690,8 @@ def index_cisa_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71207,8 +69744,7 @@ def index_cisa_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71257,8 +69793,7 @@ def index_cisa_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71276,7 +69811,7 @@ def index_cisa_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-alerts\" @@ -71316,10 +69851,8 @@ def index_cisa_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71372,8 +69905,7 @@ def index_cisa_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71417,8 +69949,7 @@ def _index_cisa_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -71431,7 +69962,10 @@ def _index_cisa_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -71515,13 +70049,9 @@ def _index_cisa_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -71604,8 +70134,7 @@ def index_cisa_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71623,7 +70152,7 @@ def index_cisa_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71663,10 +70192,8 @@ def index_cisa_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71719,8 +70246,7 @@ def index_cisa_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71769,8 +70295,7 @@ def index_cisa_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71788,7 +70313,7 @@ def index_cisa_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination]: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71828,10 +70353,8 @@ def index_cisa_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71884,8 +70407,7 @@ def index_cisa_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71934,8 +70456,7 @@ def index_cisa_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71953,7 +70474,7 @@ def index_cisa_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-csaf\" @@ -71993,10 +70514,8 @@ def index_cisa_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72049,8 +70568,7 @@ def index_cisa_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72094,8 +70612,7 @@ def _index_cisa_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72108,7 +70625,10 @@ def _index_cisa_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -72192,13 +70712,9 @@ def _index_cisa_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -72281,8 +70797,7 @@ def index_cisa_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72300,7 +70815,7 @@ def index_cisa_kev_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"cisa-kev\" @@ -72340,10 +70855,8 @@ def index_cisa_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72396,8 +70909,7 @@ def index_cisa_kev_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72446,8 +70958,7 @@ def index_cisa_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72465,7 +70976,7 @@ def index_cisa_kev_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"cisa-kev\" @@ -72505,10 +71016,8 @@ def index_cisa_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72561,8 +71070,7 @@ def index_cisa_kev_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72611,8 +71119,7 @@ def index_cisa_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72630,7 +71137,7 @@ def index_cisa_kev_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisa-kev\" @@ -72670,10 +71177,8 @@ def index_cisa_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72726,8 +71231,7 @@ def index_cisa_kev_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72771,8 +71275,7 @@ def _index_cisa_kev_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72785,7 +71288,10 @@ def _index_cisa_kev_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -72869,13 +71375,9 @@ def _index_cisa_kev_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -72958,8 +71460,7 @@ def index_cisco_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72977,7 +71478,7 @@ def index_cisco_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73017,10 +71518,8 @@ def index_cisco_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73073,8 +71572,7 @@ def index_cisco_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73123,8 +71621,7 @@ def index_cisco_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73142,7 +71639,7 @@ def index_cisco_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination]: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73182,10 +71679,8 @@ def index_cisco_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73238,8 +71733,7 @@ def index_cisco_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73288,8 +71782,7 @@ def index_cisco_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73307,7 +71800,7 @@ def index_cisco_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-csaf\" @@ -73347,10 +71840,8 @@ def index_cisco_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73403,8 +71894,7 @@ def index_cisco_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73448,8 +71938,7 @@ def _index_cisco_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -73462,7 +71951,10 @@ def _index_cisco_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -73546,13 +72038,9 @@ def _index_cisco_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -73635,8 +72123,7 @@ def index_cisco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73654,7 +72141,7 @@ def index_cisco_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cisco\" @@ -73694,10 +72181,8 @@ def index_cisco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73750,8 +72235,7 @@ def index_cisco_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73800,8 +72284,7 @@ def index_cisco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73819,7 +72302,7 @@ def index_cisco_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cisco\" @@ -73859,10 +72342,8 @@ def index_cisco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73915,8 +72396,7 @@ def index_cisco_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73965,8 +72445,7 @@ def index_cisco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73984,7 +72463,7 @@ def index_cisco_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco\" @@ -74024,10 +72503,8 @@ def index_cisco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74080,8 +72557,7 @@ def index_cisco_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74125,8 +72601,7 @@ def _index_cisco_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74139,7 +72614,10 @@ def _index_cisco_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -74223,13 +72701,9 @@ def _index_cisco_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -74312,8 +72786,7 @@ def index_cisco_known_good_values_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74331,7 +72804,7 @@ def index_cisco_known_good_values_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74371,10 +72844,8 @@ def index_cisco_known_good_values_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74427,8 +72898,7 @@ def index_cisco_known_good_values_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74477,8 +72947,7 @@ def index_cisco_known_good_values_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74496,7 +72965,7 @@ def index_cisco_known_good_values_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination]: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74536,10 +73005,8 @@ def index_cisco_known_good_values_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74592,8 +73059,7 @@ def index_cisco_known_good_values_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74642,8 +73108,7 @@ def index_cisco_known_good_values_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74661,7 +73126,7 @@ def index_cisco_known_good_values_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-known-good-values\" @@ -74701,10 +73166,8 @@ def index_cisco_known_good_values_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74757,8 +73220,7 @@ def index_cisco_known_good_values_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74802,8 +73264,7 @@ def _index_cisco_known_good_values_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74816,7 +73277,10 @@ def _index_cisco_known_good_values_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -74900,13 +73364,9 @@ def _index_cisco_known_good_values_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -74989,8 +73449,7 @@ def index_cisco_talos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75008,7 +73467,7 @@ def index_cisco_talos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cisco-talos\" @@ -75048,10 +73507,8 @@ def index_cisco_talos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75104,8 +73561,7 @@ def index_cisco_talos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75154,8 +73610,7 @@ def index_cisco_talos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75173,7 +73628,7 @@ def index_cisco_talos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cisco-talos\" @@ -75213,10 +73668,8 @@ def index_cisco_talos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75269,8 +73722,7 @@ def index_cisco_talos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75319,8 +73771,7 @@ def index_cisco_talos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75338,7 +73789,7 @@ def index_cisco_talos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cisco-talos\" @@ -75378,10 +73829,8 @@ def index_cisco_talos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75434,8 +73883,7 @@ def index_cisco_talos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75479,8 +73927,7 @@ def _index_cisco_talos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -75493,7 +73940,10 @@ def _index_cisco_talos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -75577,13 +74027,9 @@ def _index_cisco_talos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -75666,8 +74112,7 @@ def index_citrix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75685,7 +74130,7 @@ def index_citrix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination: """Return vulnerability data stored in index \"citrix\" @@ -75725,10 +74170,8 @@ def index_citrix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75781,8 +74224,7 @@ def index_citrix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75831,8 +74273,7 @@ def index_citrix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75850,7 +74291,7 @@ def index_citrix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"citrix\" @@ -75890,10 +74331,8 @@ def index_citrix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75946,8 +74385,7 @@ def index_citrix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75996,8 +74434,7 @@ def index_citrix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76015,7 +74452,7 @@ def index_citrix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"citrix\" @@ -76055,10 +74492,8 @@ def index_citrix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76111,8 +74546,7 @@ def index_citrix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76156,8 +74590,7 @@ def _index_citrix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76170,7 +74603,10 @@ def _index_citrix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -76254,13 +74690,9 @@ def _index_citrix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -76343,8 +74775,7 @@ def index_claroty_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76362,7 +74793,7 @@ def index_claroty_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"claroty\" @@ -76402,10 +74833,8 @@ def index_claroty_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76458,8 +74887,7 @@ def index_claroty_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76508,8 +74936,7 @@ def index_claroty_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76527,7 +74954,7 @@ def index_claroty_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"claroty\" @@ -76567,10 +74994,8 @@ def index_claroty_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76623,8 +75048,7 @@ def index_claroty_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76673,8 +75097,7 @@ def index_claroty_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76692,7 +75115,7 @@ def index_claroty_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"claroty\" @@ -76732,10 +75155,8 @@ def index_claroty_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76788,8 +75209,7 @@ def index_claroty_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76833,8 +75253,7 @@ def _index_claroty_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76847,7 +75266,10 @@ def _index_claroty_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -76931,13 +75353,9 @@ def _index_claroty_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -77020,8 +75438,7 @@ def index_cloudbees_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77039,7 +75456,7 @@ def index_cloudbees_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination: """Return vulnerability data stored in index \"cloudbees\" @@ -77079,10 +75496,8 @@ def index_cloudbees_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77135,8 +75550,7 @@ def index_cloudbees_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77185,8 +75599,7 @@ def index_cloudbees_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77204,7 +75617,7 @@ def index_cloudbees_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination]: """Return vulnerability data stored in index \"cloudbees\" @@ -77244,10 +75657,8 @@ def index_cloudbees_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77300,8 +75711,7 @@ def index_cloudbees_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77350,8 +75760,7 @@ def index_cloudbees_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77369,7 +75778,7 @@ def index_cloudbees_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cloudbees\" @@ -77409,10 +75818,8 @@ def index_cloudbees_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77465,8 +75872,7 @@ def index_cloudbees_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77510,8 +75916,7 @@ def _index_cloudbees_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -77524,7 +75929,10 @@ def _index_cloudbees_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -77608,13 +76016,9 @@ def _index_cloudbees_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -77697,8 +76101,7 @@ def index_cloudvulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77716,7 +76119,7 @@ def index_cloudvulndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"cloudvulndb\" @@ -77756,10 +76159,8 @@ def index_cloudvulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77812,8 +76213,7 @@ def index_cloudvulndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77862,8 +76262,7 @@ def index_cloudvulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77881,7 +76280,7 @@ def index_cloudvulndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"cloudvulndb\" @@ -77921,10 +76320,8 @@ def index_cloudvulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77977,8 +76374,7 @@ def index_cloudvulndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78027,8 +76423,7 @@ def index_cloudvulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78046,7 +76441,7 @@ def index_cloudvulndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cloudvulndb\" @@ -78086,10 +76481,8 @@ def index_cloudvulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78142,8 +76535,7 @@ def index_cloudvulndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78187,8 +76579,7 @@ def _index_cloudvulndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78201,7 +76592,10 @@ def _index_cloudvulndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -78285,13 +76679,9 @@ def _index_cloudvulndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -78374,8 +76764,7 @@ def index_cnnvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78393,7 +76782,7 @@ def index_cnnvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination: """Return vulnerability data stored in index \"cnnvd\" @@ -78433,10 +76822,8 @@ def index_cnnvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78489,8 +76876,7 @@ def index_cnnvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78539,8 +76925,7 @@ def index_cnnvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78558,7 +76943,7 @@ def index_cnnvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination]: """Return vulnerability data stored in index \"cnnvd\" @@ -78598,10 +76983,8 @@ def index_cnnvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78654,8 +77037,7 @@ def index_cnnvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78704,8 +77086,7 @@ def index_cnnvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78723,7 +77104,7 @@ def index_cnnvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnnvd\" @@ -78763,10 +77144,8 @@ def index_cnnvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78819,8 +77198,7 @@ def index_cnnvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78864,8 +77242,7 @@ def _index_cnnvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78878,7 +77255,10 @@ def _index_cnnvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -78962,13 +77342,9 @@ def _index_cnnvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -79051,8 +77427,7 @@ def index_cnvd_bulletins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79070,7 +77445,7 @@ def index_cnvd_bulletins_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79110,10 +77485,8 @@ def index_cnvd_bulletins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79166,8 +77539,7 @@ def index_cnvd_bulletins_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79216,8 +77588,7 @@ def index_cnvd_bulletins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79235,7 +77606,7 @@ def index_cnvd_bulletins_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination]: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79275,10 +77646,8 @@ def index_cnvd_bulletins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79331,8 +77700,7 @@ def index_cnvd_bulletins_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79381,8 +77749,7 @@ def index_cnvd_bulletins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79400,7 +77767,7 @@ def index_cnvd_bulletins_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnvd-bulletins\" @@ -79440,10 +77807,8 @@ def index_cnvd_bulletins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79496,8 +77861,7 @@ def index_cnvd_bulletins_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79541,8 +77905,7 @@ def _index_cnvd_bulletins_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -79555,7 +77918,10 @@ def _index_cnvd_bulletins_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -79639,13 +78005,9 @@ def _index_cnvd_bulletins_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -79728,8 +78090,7 @@ def index_cnvd_flaws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79747,7 +78108,7 @@ def index_cnvd_flaws_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -79787,10 +78148,8 @@ def index_cnvd_flaws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79843,8 +78202,7 @@ def index_cnvd_flaws_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79893,8 +78251,7 @@ def index_cnvd_flaws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79912,7 +78269,7 @@ def index_cnvd_flaws_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination]: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -79952,10 +78309,8 @@ def index_cnvd_flaws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80008,8 +78363,7 @@ def index_cnvd_flaws_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80058,8 +78412,7 @@ def index_cnvd_flaws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80077,7 +78430,7 @@ def index_cnvd_flaws_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cnvd-flaws\" @@ -80117,10 +78470,8 @@ def index_cnvd_flaws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80173,8 +78524,7 @@ def index_cnvd_flaws_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80218,8 +78568,7 @@ def _index_cnvd_flaws_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80232,7 +78581,10 @@ def _index_cnvd_flaws_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -80316,13 +78668,9 @@ def _index_cnvd_flaws_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -80405,8 +78753,7 @@ def index_cocoapods_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80424,7 +78771,7 @@ def index_cocoapods_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"cocoapods\" @@ -80464,10 +78811,8 @@ def index_cocoapods_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80520,8 +78865,7 @@ def index_cocoapods_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80570,8 +78914,7 @@ def index_cocoapods_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80589,7 +78932,7 @@ def index_cocoapods_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"cocoapods\" @@ -80629,10 +78972,8 @@ def index_cocoapods_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80685,8 +79026,7 @@ def index_cocoapods_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80735,8 +79075,7 @@ def index_cocoapods_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80754,7 +79093,7 @@ def index_cocoapods_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cocoapods\" @@ -80794,10 +79133,8 @@ def index_cocoapods_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80850,8 +79187,7 @@ def index_cocoapods_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80895,8 +79231,7 @@ def _index_cocoapods_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80909,7 +79244,10 @@ def _index_cocoapods_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -80993,13 +79331,9 @@ def _index_cocoapods_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -81082,8 +79416,7 @@ def index_codesys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81101,7 +79434,7 @@ def index_codesys_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination: """Return vulnerability data stored in index \"codesys\" @@ -81141,10 +79474,8 @@ def index_codesys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81197,8 +79528,7 @@ def index_codesys_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81247,8 +79577,7 @@ def index_codesys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81266,7 +79595,7 @@ def index_codesys_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"codesys\" @@ -81306,10 +79635,8 @@ def index_codesys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81362,8 +79689,7 @@ def index_codesys_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81412,8 +79738,7 @@ def index_codesys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81431,7 +79756,7 @@ def index_codesys_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"codesys\" @@ -81471,10 +79796,8 @@ def index_codesys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81527,8 +79850,7 @@ def index_codesys_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81572,8 +79894,7 @@ def _index_codesys_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -81586,7 +79907,10 @@ def _index_codesys_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -81670,13 +79994,9 @@ def _index_codesys_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -81759,8 +80079,7 @@ def index_commvault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81778,7 +80097,7 @@ def index_commvault_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination: """Return vulnerability data stored in index \"commvault\" @@ -81818,10 +80137,8 @@ def index_commvault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81874,8 +80191,7 @@ def index_commvault_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81924,8 +80240,7 @@ def index_commvault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81943,7 +80258,7 @@ def index_commvault_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination]: """Return vulnerability data stored in index \"commvault\" @@ -81983,10 +80298,8 @@ def index_commvault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82039,8 +80352,7 @@ def index_commvault_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82089,8 +80401,7 @@ def index_commvault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82108,7 +80419,7 @@ def index_commvault_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"commvault\" @@ -82148,10 +80459,8 @@ def index_commvault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82204,8 +80513,7 @@ def index_commvault_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82249,8 +80557,7 @@ def _index_commvault_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82263,7 +80570,10 @@ def _index_commvault_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -82347,13 +80657,9 @@ def _index_commvault_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -82436,8 +80742,7 @@ def index_compass_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82455,7 +80760,7 @@ def index_compass_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination: """Return vulnerability data stored in index \"compass-security\" @@ -82495,10 +80800,8 @@ def index_compass_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82551,8 +80854,7 @@ def index_compass_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82601,8 +80903,7 @@ def index_compass_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82620,7 +80921,7 @@ def index_compass_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination]: """Return vulnerability data stored in index \"compass-security\" @@ -82660,10 +80961,8 @@ def index_compass_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82716,8 +81015,7 @@ def index_compass_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82766,8 +81064,7 @@ def index_compass_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82785,7 +81082,7 @@ def index_compass_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"compass-security\" @@ -82825,10 +81122,8 @@ def index_compass_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82881,8 +81176,7 @@ def index_compass_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82926,8 +81220,7 @@ def _index_compass_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82940,7 +81233,10 @@ def _index_compass_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -83024,13 +81320,9 @@ def _index_compass_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -83113,8 +81405,7 @@ def index_composer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83132,7 +81423,7 @@ def index_composer_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"composer\" @@ -83172,10 +81463,8 @@ def index_composer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83228,8 +81517,7 @@ def index_composer_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83278,8 +81566,7 @@ def index_composer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83297,7 +81584,7 @@ def index_composer_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"composer\" @@ -83337,10 +81624,8 @@ def index_composer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83393,8 +81678,7 @@ def index_composer_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83443,8 +81727,7 @@ def index_composer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83462,7 +81745,7 @@ def index_composer_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"composer\" @@ -83502,10 +81785,8 @@ def index_composer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83558,8 +81839,7 @@ def index_composer_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83603,8 +81883,7 @@ def _index_composer_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83617,7 +81896,10 @@ def _index_composer_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -83701,13 +81983,9 @@ def _index_composer_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -83790,8 +82068,7 @@ def index_conan_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83809,7 +82086,7 @@ def index_conan_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"conan\" @@ -83849,10 +82126,8 @@ def index_conan_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83905,8 +82180,7 @@ def index_conan_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83955,8 +82229,7 @@ def index_conan_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83974,7 +82247,7 @@ def index_conan_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"conan\" @@ -84014,10 +82287,8 @@ def index_conan_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84070,8 +82341,7 @@ def index_conan_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84120,8 +82390,7 @@ def index_conan_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84139,7 +82408,7 @@ def index_conan_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"conan\" @@ -84179,10 +82448,8 @@ def index_conan_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84235,8 +82502,7 @@ def index_conan_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84280,8 +82546,7 @@ def _index_conan_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84294,7 +82559,10 @@ def _index_conan_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -84378,13 +82646,9 @@ def _index_conan_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -84467,8 +82731,7 @@ def index_coreimpact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84486,7 +82749,7 @@ def index_coreimpact_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination: """Return vulnerability data stored in index \"coreimpact\" @@ -84526,10 +82789,8 @@ def index_coreimpact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84582,8 +82843,7 @@ def index_coreimpact_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84632,8 +82892,7 @@ def index_coreimpact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84651,7 +82910,7 @@ def index_coreimpact_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination]: """Return vulnerability data stored in index \"coreimpact\" @@ -84691,10 +82950,8 @@ def index_coreimpact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84747,8 +83004,7 @@ def index_coreimpact_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84797,8 +83053,7 @@ def index_coreimpact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84816,7 +83071,7 @@ def index_coreimpact_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"coreimpact\" @@ -84856,10 +83111,8 @@ def index_coreimpact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84912,8 +83165,7 @@ def index_coreimpact_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84957,8 +83209,7 @@ def _index_coreimpact_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84971,7 +83222,10 @@ def _index_coreimpact_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -85055,13 +83309,9 @@ def _index_coreimpact_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -85144,8 +83394,7 @@ def index_cpe_vulnerable_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85163,7 +83412,7 @@ def index_cpe_vulnerable_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85203,10 +83452,8 @@ def index_cpe_vulnerable_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85259,8 +83506,7 @@ def index_cpe_vulnerable_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85309,8 +83555,7 @@ def index_cpe_vulnerable_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85328,7 +83573,7 @@ def index_cpe_vulnerable_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination]: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85368,10 +83613,8 @@ def index_cpe_vulnerable_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85424,8 +83667,7 @@ def index_cpe_vulnerable_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85474,8 +83716,7 @@ def index_cpe_vulnerable_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85493,7 +83734,7 @@ def index_cpe_vulnerable_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cpe-vulnerable\" @@ -85533,10 +83774,8 @@ def index_cpe_vulnerable_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85589,8 +83828,7 @@ def index_cpe_vulnerable_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85634,8 +83872,7 @@ def _index_cpe_vulnerable_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85648,7 +83885,10 @@ def _index_cpe_vulnerable_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -85732,13 +83972,9 @@ def _index_cpe_vulnerable_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -85821,8 +84057,7 @@ def index_crestron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85840,7 +84075,7 @@ def index_crestron_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination: """Return vulnerability data stored in index \"crestron\" @@ -85880,10 +84115,8 @@ def index_crestron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85936,8 +84169,7 @@ def index_crestron_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85986,8 +84218,7 @@ def index_crestron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86005,7 +84236,7 @@ def index_crestron_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination]: """Return vulnerability data stored in index \"crestron\" @@ -86045,10 +84276,8 @@ def index_crestron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86101,8 +84330,7 @@ def index_crestron_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86151,8 +84379,7 @@ def index_crestron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86170,7 +84397,7 @@ def index_crestron_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"crestron\" @@ -86210,10 +84437,8 @@ def index_crestron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86266,8 +84491,7 @@ def index_crestron_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86311,8 +84535,7 @@ def _index_crestron_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -86325,7 +84548,10 @@ def _index_crestron_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -86409,13 +84635,9 @@ def _index_crestron_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -86498,8 +84720,7 @@ def index_crowdsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86517,7 +84738,7 @@ def index_crowdsec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination: """Return vulnerability data stored in index \"crowdsec\" @@ -86557,10 +84778,8 @@ def index_crowdsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86613,8 +84832,7 @@ def index_crowdsec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86663,8 +84881,7 @@ def index_crowdsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86682,7 +84899,7 @@ def index_crowdsec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination]: """Return vulnerability data stored in index \"crowdsec\" @@ -86722,10 +84939,8 @@ def index_crowdsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86778,8 +84993,7 @@ def index_crowdsec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86828,8 +85042,7 @@ def index_crowdsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86847,7 +85060,7 @@ def index_crowdsec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"crowdsec\" @@ -86887,10 +85100,8 @@ def index_crowdsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86943,8 +85154,7 @@ def index_crowdsec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86988,8 +85198,7 @@ def _index_crowdsec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87002,7 +85211,10 @@ def _index_crowdsec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -87086,13 +85298,9 @@ def _index_crowdsec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -87175,8 +85383,7 @@ def index_curl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87194,7 +85401,7 @@ def index_curl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination: """Return vulnerability data stored in index \"curl\" @@ -87234,10 +85441,8 @@ def index_curl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87290,8 +85495,7 @@ def index_curl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87340,8 +85544,7 @@ def index_curl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87359,7 +85562,7 @@ def index_curl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination]: """Return vulnerability data stored in index \"curl\" @@ -87399,10 +85602,8 @@ def index_curl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87455,8 +85656,7 @@ def index_curl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87505,8 +85705,7 @@ def index_curl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87524,7 +85723,7 @@ def index_curl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"curl\" @@ -87564,10 +85763,8 @@ def index_curl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87620,8 +85817,7 @@ def index_curl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87665,8 +85861,7 @@ def _index_curl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87679,7 +85874,10 @@ def _index_curl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -87763,13 +85961,9 @@ def _index_curl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -87852,8 +86046,7 @@ def index_cwe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87871,7 +86064,7 @@ def index_cwe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCWEPaginatePagination: """Return vulnerability data stored in index \"cwe\" @@ -87911,10 +86104,8 @@ def index_cwe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87967,8 +86158,7 @@ def index_cwe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88017,8 +86207,7 @@ def index_cwe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88036,7 +86225,7 @@ def index_cwe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCWEPaginatePagination]: """Return vulnerability data stored in index \"cwe\" @@ -88076,10 +86265,8 @@ def index_cwe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88132,8 +86319,7 @@ def index_cwe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88182,8 +86368,7 @@ def index_cwe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88201,7 +86386,7 @@ def index_cwe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"cwe\" @@ -88241,10 +86426,8 @@ def index_cwe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88297,8 +86480,7 @@ def index_cwe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88342,8 +86524,7 @@ def _index_cwe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -88356,7 +86537,10 @@ def _index_cwe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -88440,13 +86624,9 @@ def _index_cwe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -88529,8 +86709,7 @@ def index_dahua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88548,7 +86727,7 @@ def index_dahua_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination: """Return vulnerability data stored in index \"dahua\" @@ -88588,10 +86767,8 @@ def index_dahua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88644,8 +86821,7 @@ def index_dahua_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88694,8 +86870,7 @@ def index_dahua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88713,7 +86888,7 @@ def index_dahua_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination]: """Return vulnerability data stored in index \"dahua\" @@ -88753,10 +86928,8 @@ def index_dahua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88809,8 +86982,7 @@ def index_dahua_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88859,8 +87031,7 @@ def index_dahua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88878,7 +87049,7 @@ def index_dahua_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dahua\" @@ -88918,10 +87089,8 @@ def index_dahua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88974,8 +87143,7 @@ def index_dahua_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89019,8 +87187,7 @@ def _index_dahua_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89033,7 +87200,10 @@ def _index_dahua_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -89117,13 +87287,9 @@ def _index_dahua_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -89206,8 +87372,7 @@ def index_danfoss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89225,7 +87390,7 @@ def index_danfoss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination: """Return vulnerability data stored in index \"danfoss\" @@ -89265,10 +87430,8 @@ def index_danfoss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89321,8 +87484,7 @@ def index_danfoss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89371,8 +87533,7 @@ def index_danfoss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89390,7 +87551,7 @@ def index_danfoss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination]: """Return vulnerability data stored in index \"danfoss\" @@ -89430,10 +87591,8 @@ def index_danfoss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89486,8 +87645,7 @@ def index_danfoss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89536,8 +87694,7 @@ def index_danfoss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89555,7 +87712,7 @@ def index_danfoss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"danfoss\" @@ -89595,10 +87752,8 @@ def index_danfoss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89651,8 +87806,7 @@ def index_danfoss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89696,8 +87850,7 @@ def _index_danfoss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89710,7 +87863,10 @@ def _index_danfoss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -89794,13 +87950,9 @@ def _index_danfoss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -89883,8 +88035,7 @@ def index_dassault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89902,7 +88053,7 @@ def index_dassault_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination: """Return vulnerability data stored in index \"dassault\" @@ -89942,10 +88093,8 @@ def index_dassault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89998,8 +88147,7 @@ def index_dassault_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90048,8 +88196,7 @@ def index_dassault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90067,7 +88214,7 @@ def index_dassault_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination]: """Return vulnerability data stored in index \"dassault\" @@ -90107,10 +88254,8 @@ def index_dassault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90163,8 +88308,7 @@ def index_dassault_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90213,8 +88357,7 @@ def index_dassault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90232,7 +88375,7 @@ def index_dassault_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dassault\" @@ -90272,10 +88415,8 @@ def index_dassault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90328,8 +88469,7 @@ def index_dassault_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90373,8 +88513,7 @@ def _index_dassault_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -90387,7 +88526,10 @@ def _index_dassault_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -90471,13 +88613,9 @@ def _index_dassault_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -90560,8 +88698,7 @@ def index_debian_dsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90579,7 +88716,7 @@ def index_debian_dsa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination: """Return vulnerability data stored in index \"debian-dsa\" @@ -90619,10 +88756,8 @@ def index_debian_dsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90675,8 +88810,7 @@ def index_debian_dsa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90725,8 +88859,7 @@ def index_debian_dsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90744,7 +88877,7 @@ def index_debian_dsa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"debian-dsa\" @@ -90784,10 +88917,8 @@ def index_debian_dsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90840,8 +88971,7 @@ def index_debian_dsa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90890,8 +89020,7 @@ def index_debian_dsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90909,7 +89038,7 @@ def index_debian_dsa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-dsa\" @@ -90949,10 +89078,8 @@ def index_debian_dsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91005,8 +89132,7 @@ def index_debian_dsa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91050,8 +89176,7 @@ def _index_debian_dsa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91064,7 +89189,10 @@ def _index_debian_dsa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -91148,13 +89276,9 @@ def _index_debian_dsa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -91237,8 +89361,7 @@ def index_debian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91256,7 +89379,7 @@ def index_debian_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination: """Return vulnerability data stored in index \"debian\" @@ -91296,10 +89419,8 @@ def index_debian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91352,8 +89473,7 @@ def index_debian_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91402,8 +89522,7 @@ def index_debian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91421,7 +89540,7 @@ def index_debian_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination]: """Return vulnerability data stored in index \"debian\" @@ -91461,10 +89580,8 @@ def index_debian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91517,8 +89634,7 @@ def index_debian_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91567,8 +89683,7 @@ def index_debian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91586,7 +89701,7 @@ def index_debian_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian\" @@ -91626,10 +89741,8 @@ def index_debian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91682,8 +89795,7 @@ def index_debian_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91727,8 +89839,7 @@ def _index_debian_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91741,7 +89852,10 @@ def _index_debian_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -91825,13 +89939,9 @@ def _index_debian_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -91914,8 +90024,7 @@ def index_debian_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91933,7 +90042,7 @@ def index_debian_packages_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination: """Return vulnerability data stored in index \"debian-packages\" @@ -91973,10 +90082,8 @@ def index_debian_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92029,8 +90136,7 @@ def index_debian_packages_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92079,8 +90185,7 @@ def index_debian_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92098,7 +90203,7 @@ def index_debian_packages_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination]: """Return vulnerability data stored in index \"debian-packages\" @@ -92138,10 +90243,8 @@ def index_debian_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92194,8 +90297,7 @@ def index_debian_packages_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92244,8 +90346,7 @@ def index_debian_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92263,7 +90364,7 @@ def index_debian_packages_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-packages\" @@ -92303,10 +90404,8 @@ def index_debian_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92359,8 +90458,7 @@ def index_debian_packages_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92404,8 +90502,7 @@ def _index_debian_packages_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -92418,7 +90515,10 @@ def _index_debian_packages_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -92502,13 +90602,9 @@ def _index_debian_packages_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -92591,8 +90687,7 @@ def index_debian_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92610,7 +90705,7 @@ def index_debian_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"debian-purls\" @@ -92650,10 +90745,8 @@ def index_debian_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92706,8 +90799,7 @@ def index_debian_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92756,8 +90848,7 @@ def index_debian_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92775,7 +90866,7 @@ def index_debian_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"debian-purls\" @@ -92815,10 +90906,8 @@ def index_debian_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92871,8 +90960,7 @@ def index_debian_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92921,8 +91009,7 @@ def index_debian_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92940,7 +91027,7 @@ def index_debian_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"debian-purls\" @@ -92980,10 +91067,8 @@ def index_debian_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93036,8 +91121,7 @@ def index_debian_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93081,8 +91165,7 @@ def _index_debian_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93095,7 +91178,10 @@ def _index_debian_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -93179,13 +91265,9 @@ def _index_debian_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -93268,8 +91350,7 @@ def index_dell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93287,7 +91368,7 @@ def index_dell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination: """Return vulnerability data stored in index \"dell\" @@ -93327,10 +91408,8 @@ def index_dell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93383,8 +91462,7 @@ def index_dell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93433,8 +91511,7 @@ def index_dell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93452,7 +91529,7 @@ def index_dell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination]: """Return vulnerability data stored in index \"dell\" @@ -93492,10 +91569,8 @@ def index_dell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93548,8 +91623,7 @@ def index_dell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93598,8 +91672,7 @@ def index_dell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93617,7 +91690,7 @@ def index_dell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dell\" @@ -93657,10 +91730,8 @@ def index_dell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93713,8 +91784,7 @@ def index_dell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93758,8 +91828,7 @@ def _index_dell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93772,7 +91841,10 @@ def _index_dell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -93856,13 +91928,9 @@ def _index_dell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -93945,8 +92013,7 @@ def index_delta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93964,7 +92031,7 @@ def index_delta_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"delta\" @@ -94004,10 +92071,8 @@ def index_delta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94060,8 +92125,7 @@ def index_delta_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94110,8 +92174,7 @@ def index_delta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94129,7 +92192,7 @@ def index_delta_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"delta\" @@ -94169,10 +92232,8 @@ def index_delta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94225,8 +92286,7 @@ def index_delta_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94275,8 +92335,7 @@ def index_delta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94294,7 +92353,7 @@ def index_delta_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"delta\" @@ -94334,10 +92393,8 @@ def index_delta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94390,8 +92447,7 @@ def index_delta_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94435,8 +92491,7 @@ def _index_delta_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -94449,7 +92504,10 @@ def _index_delta_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -94533,13 +92591,9 @@ def _index_delta_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -94622,8 +92676,7 @@ def index_dfn_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94641,7 +92694,7 @@ def index_dfn_cert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination: """Return vulnerability data stored in index \"dfn-cert\" @@ -94681,10 +92734,8 @@ def index_dfn_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94737,8 +92788,7 @@ def index_dfn_cert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94787,8 +92837,7 @@ def index_dfn_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94806,7 +92855,7 @@ def index_dfn_cert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination]: """Return vulnerability data stored in index \"dfn-cert\" @@ -94846,10 +92895,8 @@ def index_dfn_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94902,8 +92949,7 @@ def index_dfn_cert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94952,8 +92998,7 @@ def index_dfn_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94971,7 +93016,7 @@ def index_dfn_cert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dfn-cert\" @@ -95011,10 +93056,8 @@ def index_dfn_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95067,8 +93110,7 @@ def index_dfn_cert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95112,8 +93154,7 @@ def _index_dfn_cert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95126,7 +93167,10 @@ def _index_dfn_cert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -95210,13 +93254,9 @@ def _index_dfn_cert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -95299,8 +93339,7 @@ def index_django_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95318,7 +93357,7 @@ def index_django_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination: """Return vulnerability data stored in index \"django\" @@ -95358,10 +93397,8 @@ def index_django_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95414,8 +93451,7 @@ def index_django_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95464,8 +93500,7 @@ def index_django_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95483,7 +93518,7 @@ def index_django_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination]: """Return vulnerability data stored in index \"django\" @@ -95523,10 +93558,8 @@ def index_django_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95579,8 +93612,7 @@ def index_django_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95629,8 +93661,7 @@ def index_django_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95648,7 +93679,7 @@ def index_django_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"django\" @@ -95688,10 +93719,8 @@ def index_django_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95744,8 +93773,7 @@ def index_django_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95789,8 +93817,7 @@ def _index_django_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95803,7 +93830,10 @@ def _index_django_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -95887,13 +93917,9 @@ def _index_django_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -95976,8 +94002,7 @@ def index_dlink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95995,7 +94020,7 @@ def index_dlink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination: """Return vulnerability data stored in index \"dlink\" @@ -96035,10 +94060,8 @@ def index_dlink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96091,8 +94114,7 @@ def index_dlink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96141,8 +94163,7 @@ def index_dlink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96160,7 +94181,7 @@ def index_dlink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination]: """Return vulnerability data stored in index \"dlink\" @@ -96200,10 +94221,8 @@ def index_dlink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96256,8 +94275,7 @@ def index_dlink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96306,8 +94324,7 @@ def index_dlink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96325,7 +94342,7 @@ def index_dlink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dlink\" @@ -96365,10 +94382,8 @@ def index_dlink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96421,8 +94436,7 @@ def index_dlink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96466,8 +94480,7 @@ def _index_dlink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -96480,7 +94493,10 @@ def _index_dlink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -96564,13 +94580,9 @@ def _index_dlink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -96653,8 +94665,7 @@ def index_dnn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96672,7 +94683,7 @@ def index_dnn_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination: """Return vulnerability data stored in index \"dnn\" @@ -96712,10 +94723,8 @@ def index_dnn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96768,8 +94777,7 @@ def index_dnn_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96818,8 +94826,7 @@ def index_dnn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96837,7 +94844,7 @@ def index_dnn_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination]: """Return vulnerability data stored in index \"dnn\" @@ -96877,10 +94884,8 @@ def index_dnn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96933,8 +94938,7 @@ def index_dnn_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96983,8 +94987,7 @@ def index_dnn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97002,7 +95005,7 @@ def index_dnn_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dnn\" @@ -97042,10 +95045,8 @@ def index_dnn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97098,8 +95099,7 @@ def index_dnn_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97143,8 +95143,7 @@ def _index_dnn_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97157,7 +95156,10 @@ def _index_dnn_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -97241,13 +95243,9 @@ def _index_dnn_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -97330,8 +95328,7 @@ def index_dotcms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97349,7 +95346,7 @@ def index_dotcms_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination: """Return vulnerability data stored in index \"dotcms\" @@ -97389,10 +95386,8 @@ def index_dotcms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97445,8 +95440,7 @@ def index_dotcms_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97495,8 +95489,7 @@ def index_dotcms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97514,7 +95507,7 @@ def index_dotcms_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination]: """Return vulnerability data stored in index \"dotcms\" @@ -97554,10 +95547,8 @@ def index_dotcms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97610,8 +95601,7 @@ def index_dotcms_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97660,8 +95650,7 @@ def index_dotcms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97679,7 +95668,7 @@ def index_dotcms_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dotcms\" @@ -97719,10 +95708,8 @@ def index_dotcms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97775,8 +95762,7 @@ def index_dotcms_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97820,8 +95806,7 @@ def _index_dotcms_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97834,7 +95819,10 @@ def _index_dotcms_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -97918,13 +95906,9 @@ def _index_dotcms_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -98007,8 +95991,7 @@ def index_dragos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98026,7 +96009,7 @@ def index_dragos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination: """Return vulnerability data stored in index \"dragos\" @@ -98066,10 +96049,8 @@ def index_dragos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98122,8 +96103,7 @@ def index_dragos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98172,8 +96152,7 @@ def index_dragos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98191,7 +96170,7 @@ def index_dragos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"dragos\" @@ -98231,10 +96210,8 @@ def index_dragos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98287,8 +96264,7 @@ def index_dragos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98337,8 +96313,7 @@ def index_dragos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98356,7 +96331,7 @@ def index_dragos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"dragos\" @@ -98396,10 +96371,8 @@ def index_dragos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98452,8 +96425,7 @@ def index_dragos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98497,8 +96469,7 @@ def _index_dragos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -98511,7 +96482,10 @@ def _index_dragos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -98595,13 +96569,9 @@ def _index_dragos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -98684,8 +96654,7 @@ def index_draytek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98703,7 +96672,7 @@ def index_draytek_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination: """Return vulnerability data stored in index \"draytek\" @@ -98743,10 +96712,8 @@ def index_draytek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98799,8 +96766,7 @@ def index_draytek_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98849,8 +96815,7 @@ def index_draytek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98868,7 +96833,7 @@ def index_draytek_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination]: """Return vulnerability data stored in index \"draytek\" @@ -98908,10 +96873,8 @@ def index_draytek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98964,8 +96927,7 @@ def index_draytek_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99014,8 +96976,7 @@ def index_draytek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99033,7 +96994,7 @@ def index_draytek_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"draytek\" @@ -99073,10 +97034,8 @@ def index_draytek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99129,8 +97088,7 @@ def index_draytek_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99174,8 +97132,7 @@ def _index_draytek_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99188,7 +97145,10 @@ def _index_draytek_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -99272,13 +97232,9 @@ def _index_draytek_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -99361,8 +97317,7 @@ def index_drupal_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99380,7 +97335,7 @@ def index_drupal_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination: """Return vulnerability data stored in index \"drupal\" @@ -99420,10 +97375,8 @@ def index_drupal_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99476,8 +97429,7 @@ def index_drupal_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99526,8 +97478,7 @@ def index_drupal_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99545,7 +97496,7 @@ def index_drupal_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination]: """Return vulnerability data stored in index \"drupal\" @@ -99585,10 +97536,8 @@ def index_drupal_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99641,8 +97590,7 @@ def index_drupal_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99691,8 +97639,7 @@ def index_drupal_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99710,7 +97657,7 @@ def index_drupal_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"drupal\" @@ -99750,10 +97697,8 @@ def index_drupal_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99806,8 +97751,7 @@ def index_drupal_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99851,8 +97795,7 @@ def _index_drupal_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99865,7 +97808,10 @@ def _index_drupal_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -99949,13 +97895,9 @@ def _index_drupal_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -100038,8 +97980,7 @@ def index_eaton_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100057,7 +97998,7 @@ def index_eaton_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"eaton\" @@ -100097,10 +98038,8 @@ def index_eaton_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100153,8 +98092,7 @@ def index_eaton_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100203,8 +98141,7 @@ def index_eaton_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100222,7 +98159,7 @@ def index_eaton_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"eaton\" @@ -100262,10 +98199,8 @@ def index_eaton_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100318,8 +98253,7 @@ def index_eaton_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100368,8 +98302,7 @@ def index_eaton_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100387,7 +98320,7 @@ def index_eaton_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eaton\" @@ -100427,10 +98360,8 @@ def index_eaton_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100483,8 +98414,7 @@ def index_eaton_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100528,8 +98458,7 @@ def _index_eaton_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -100542,7 +98471,10 @@ def _index_eaton_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -100626,13 +98558,9 @@ def _index_eaton_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -100715,8 +98643,7 @@ def index_elastic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100734,7 +98661,7 @@ def index_elastic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination: """Return vulnerability data stored in index \"elastic\" @@ -100774,10 +98701,8 @@ def index_elastic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100830,8 +98755,7 @@ def index_elastic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100880,8 +98804,7 @@ def index_elastic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100899,7 +98822,7 @@ def index_elastic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination]: """Return vulnerability data stored in index \"elastic\" @@ -100939,10 +98862,8 @@ def index_elastic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100995,8 +98916,7 @@ def index_elastic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101045,8 +98965,7 @@ def index_elastic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101064,7 +98983,7 @@ def index_elastic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"elastic\" @@ -101104,10 +99023,8 @@ def index_elastic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101160,8 +99077,7 @@ def index_elastic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101205,8 +99121,7 @@ def _index_elastic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101219,7 +99134,10 @@ def _index_elastic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -101303,13 +99221,9 @@ def _index_elastic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -101392,8 +99306,7 @@ def index_elspec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101411,7 +99324,7 @@ def index_elspec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination: """Return vulnerability data stored in index \"elspec\" @@ -101451,10 +99364,8 @@ def index_elspec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101507,8 +99418,7 @@ def index_elspec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101557,8 +99467,7 @@ def index_elspec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101576,7 +99485,7 @@ def index_elspec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination]: """Return vulnerability data stored in index \"elspec\" @@ -101616,10 +99525,8 @@ def index_elspec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101672,8 +99579,7 @@ def index_elspec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101722,8 +99628,7 @@ def index_elspec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101741,7 +99646,7 @@ def index_elspec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"elspec\" @@ -101781,10 +99686,8 @@ def index_elspec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101837,8 +99740,7 @@ def index_elspec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101882,8 +99784,7 @@ def _index_elspec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101896,7 +99797,10 @@ def _index_elspec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -101980,13 +99884,9 @@ def _index_elspec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -102069,8 +99969,7 @@ def index_emerging_threats_snort_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102088,7 +99987,7 @@ def index_emerging_threats_snort_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102128,10 +100027,8 @@ def index_emerging_threats_snort_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102184,8 +100081,7 @@ def index_emerging_threats_snort_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102234,8 +100130,7 @@ def index_emerging_threats_snort_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102253,7 +100148,7 @@ def index_emerging_threats_snort_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination]: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102293,10 +100188,8 @@ def index_emerging_threats_snort_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102349,8 +100242,7 @@ def index_emerging_threats_snort_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102399,8 +100291,7 @@ def index_emerging_threats_snort_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102418,7 +100309,7 @@ def index_emerging_threats_snort_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"emerging-threats-snort\" @@ -102458,10 +100349,8 @@ def index_emerging_threats_snort_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102514,8 +100403,7 @@ def index_emerging_threats_snort_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102559,8 +100447,7 @@ def _index_emerging_threats_snort_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -102573,7 +100460,10 @@ def _index_emerging_threats_snort_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -102657,13 +100547,9 @@ def _index_emerging_threats_snort_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -102746,8 +100632,7 @@ def index_emerson_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102765,7 +100650,7 @@ def index_emerson_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination: """Return vulnerability data stored in index \"emerson\" @@ -102805,10 +100690,8 @@ def index_emerson_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102861,8 +100744,7 @@ def index_emerson_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102911,8 +100793,7 @@ def index_emerson_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102930,7 +100811,7 @@ def index_emerson_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"emerson\" @@ -102970,10 +100851,8 @@ def index_emerson_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103026,8 +100905,7 @@ def index_emerson_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103076,8 +100954,7 @@ def index_emerson_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103095,7 +100972,7 @@ def index_emerson_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"emerson\" @@ -103135,10 +101012,8 @@ def index_emerson_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103191,8 +101066,7 @@ def index_emerson_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103236,8 +101110,7 @@ def _index_emerson_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103250,7 +101123,10 @@ def _index_emerson_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -103334,13 +101210,9 @@ def _index_emerson_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -103423,8 +101295,7 @@ def index_endoflife_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103442,7 +101313,7 @@ def index_endoflife_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination: """Return vulnerability data stored in index \"endoflife\" @@ -103482,10 +101353,8 @@ def index_endoflife_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103538,8 +101407,7 @@ def index_endoflife_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103588,8 +101456,7 @@ def index_endoflife_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103607,7 +101474,7 @@ def index_endoflife_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination]: """Return vulnerability data stored in index \"endoflife\" @@ -103647,10 +101514,8 @@ def index_endoflife_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103703,8 +101568,7 @@ def index_endoflife_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103753,8 +101617,7 @@ def index_endoflife_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103772,7 +101635,7 @@ def index_endoflife_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"endoflife\" @@ -103812,10 +101675,8 @@ def index_endoflife_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103868,8 +101729,7 @@ def index_endoflife_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103913,8 +101773,7 @@ def _index_endoflife_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103927,7 +101786,10 @@ def _index_endoflife_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -104011,13 +101873,9 @@ def _index_endoflife_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -104100,8 +101958,7 @@ def index_endress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104119,7 +101976,7 @@ def index_endress_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination: """Return vulnerability data stored in index \"endress\" @@ -104159,10 +102016,8 @@ def index_endress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104215,8 +102070,7 @@ def index_endress_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104265,8 +102119,7 @@ def index_endress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104284,7 +102137,7 @@ def index_endress_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination]: """Return vulnerability data stored in index \"endress\" @@ -104324,10 +102177,8 @@ def index_endress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104380,8 +102231,7 @@ def index_endress_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104430,8 +102280,7 @@ def index_endress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104449,7 +102298,7 @@ def index_endress_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"endress\" @@ -104489,10 +102338,8 @@ def index_endress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104545,8 +102392,7 @@ def index_endress_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104590,8 +102436,7 @@ def _index_endress_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104604,7 +102449,10 @@ def _index_endress_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -104688,13 +102536,9 @@ def _index_endress_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -104777,8 +102621,7 @@ def index_eol_alibaba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104796,7 +102639,7 @@ def index_eol_alibaba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination: """Return vulnerability data stored in index \"eol-alibaba\" @@ -104836,10 +102679,8 @@ def index_eol_alibaba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104892,8 +102733,7 @@ def index_eol_alibaba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104942,8 +102782,7 @@ def index_eol_alibaba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104961,7 +102800,7 @@ def index_eol_alibaba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination]: """Return vulnerability data stored in index \"eol-alibaba\" @@ -105001,10 +102840,8 @@ def index_eol_alibaba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105057,8 +102894,7 @@ def index_eol_alibaba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105107,8 +102943,7 @@ def index_eol_alibaba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105126,7 +102961,7 @@ def index_eol_alibaba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol-alibaba\" @@ -105166,10 +103001,8 @@ def index_eol_alibaba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105222,8 +103055,7 @@ def index_eol_alibaba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105267,8 +103099,7 @@ def _index_eol_alibaba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105281,7 +103112,10 @@ def _index_eol_alibaba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -105365,13 +103199,9 @@ def _index_eol_alibaba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -105454,8 +103284,7 @@ def index_eol_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105473,7 +103302,7 @@ def index_eol_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination: """Return vulnerability data stored in index \"eol\" @@ -105513,10 +103342,8 @@ def index_eol_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105569,8 +103396,7 @@ def index_eol_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105619,8 +103445,7 @@ def index_eol_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105638,7 +103463,7 @@ def index_eol_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination]: """Return vulnerability data stored in index \"eol\" @@ -105678,10 +103503,8 @@ def index_eol_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105734,8 +103557,7 @@ def index_eol_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105784,8 +103606,7 @@ def index_eol_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105803,7 +103624,7 @@ def index_eol_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol\" @@ -105843,10 +103664,8 @@ def index_eol_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105899,8 +103718,7 @@ def index_eol_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105944,8 +103762,7 @@ def _index_eol_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105958,7 +103775,10 @@ def _index_eol_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -106042,13 +103862,9 @@ def _index_eol_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -106131,8 +103947,7 @@ def index_eol_microsoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106150,7 +103965,7 @@ def index_eol_microsoft_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106190,10 +104005,8 @@ def index_eol_microsoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106246,8 +104059,7 @@ def index_eol_microsoft_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106296,8 +104108,7 @@ def index_eol_microsoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106315,7 +104126,7 @@ def index_eol_microsoft_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination]: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106355,10 +104166,8 @@ def index_eol_microsoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106411,8 +104220,7 @@ def index_eol_microsoft_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106461,8 +104269,7 @@ def index_eol_microsoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106480,7 +104287,7 @@ def index_eol_microsoft_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"eol-microsoft\" @@ -106520,10 +104327,8 @@ def index_eol_microsoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106576,8 +104381,7 @@ def index_eol_microsoft_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106621,8 +104425,7 @@ def _index_eol_microsoft_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106635,7 +104438,10 @@ def _index_eol_microsoft_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -106719,13 +104525,9 @@ def _index_eol_microsoft_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -106808,8 +104610,7 @@ def index_epss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106827,7 +104628,7 @@ def index_epss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination: """Return vulnerability data stored in index \"epss\" @@ -106867,10 +104668,8 @@ def index_epss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106923,8 +104722,7 @@ def index_epss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106973,8 +104771,7 @@ def index_epss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106992,7 +104789,7 @@ def index_epss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination]: """Return vulnerability data stored in index \"epss\" @@ -107032,10 +104829,8 @@ def index_epss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107088,8 +104883,7 @@ def index_epss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107138,8 +104932,7 @@ def index_epss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107157,7 +104950,7 @@ def index_epss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"epss\" @@ -107197,10 +104990,8 @@ def index_epss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107253,8 +105044,7 @@ def index_epss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107298,8 +105088,7 @@ def _index_epss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107312,7 +105101,10 @@ def _index_epss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -107396,13 +105188,9 @@ def _index_epss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -107485,8 +105273,7 @@ def index_euvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107504,7 +105291,7 @@ def index_euvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination: """Return vulnerability data stored in index \"euvd\" @@ -107544,10 +105331,8 @@ def index_euvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107600,8 +105385,7 @@ def index_euvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107650,8 +105434,7 @@ def index_euvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107669,7 +105452,7 @@ def index_euvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination]: """Return vulnerability data stored in index \"euvd\" @@ -107709,10 +105492,8 @@ def index_euvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107765,8 +105546,7 @@ def index_euvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107815,8 +105595,7 @@ def index_euvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107834,7 +105613,7 @@ def index_euvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"euvd\" @@ -107874,10 +105653,8 @@ def index_euvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107930,8 +105707,7 @@ def index_euvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107975,8 +105751,7 @@ def _index_euvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107989,7 +105764,10 @@ def _index_euvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -108073,13 +105851,9 @@ def _index_euvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -108162,8 +105936,7 @@ def index_exodus_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108181,7 +105954,7 @@ def index_exodus_intel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination: """Return vulnerability data stored in index \"exodus-intel\" @@ -108221,10 +105994,8 @@ def index_exodus_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108277,8 +106048,7 @@ def index_exodus_intel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108327,8 +106097,7 @@ def index_exodus_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108346,7 +106115,7 @@ def index_exodus_intel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination]: """Return vulnerability data stored in index \"exodus-intel\" @@ -108386,10 +106155,8 @@ def index_exodus_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108442,8 +106209,7 @@ def index_exodus_intel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108492,8 +106258,7 @@ def index_exodus_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108511,7 +106276,7 @@ def index_exodus_intel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exodus-intel\" @@ -108551,10 +106316,8 @@ def index_exodus_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108607,8 +106370,7 @@ def index_exodus_intel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108652,8 +106414,7 @@ def _index_exodus_intel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108666,7 +106427,10 @@ def _index_exodus_intel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -108750,13 +106514,9 @@ def _index_exodus_intel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -108839,8 +106599,7 @@ def index_exploit_chains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108858,7 +106617,7 @@ def index_exploit_chains_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination: """Return vulnerability data stored in index \"exploit-chains\" @@ -108898,10 +106657,8 @@ def index_exploit_chains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108954,8 +106711,7 @@ def index_exploit_chains_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109004,8 +106760,7 @@ def index_exploit_chains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109023,7 +106778,7 @@ def index_exploit_chains_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitChainPaginatePagination]: """Return vulnerability data stored in index \"exploit-chains\" @@ -109063,10 +106818,8 @@ def index_exploit_chains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109119,8 +106872,7 @@ def index_exploit_chains_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109169,8 +106921,7 @@ def index_exploit_chains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109188,7 +106939,7 @@ def index_exploit_chains_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploit-chains\" @@ -109228,10 +106979,8 @@ def index_exploit_chains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109284,8 +107033,7 @@ def index_exploit_chains_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109329,8 +107077,7 @@ def _index_exploit_chains_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -109343,7 +107090,10 @@ def _index_exploit_chains_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -109427,13 +107177,9 @@ def _index_exploit_chains_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -109516,8 +107262,7 @@ def index_exploitdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109535,7 +107280,7 @@ def index_exploitdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination: """Return vulnerability data stored in index \"exploitdb\" @@ -109575,10 +107320,8 @@ def index_exploitdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109631,8 +107374,7 @@ def index_exploitdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109681,8 +107423,7 @@ def index_exploitdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109700,7 +107441,7 @@ def index_exploitdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination]: """Return vulnerability data stored in index \"exploitdb\" @@ -109740,10 +107481,8 @@ def index_exploitdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109796,8 +107535,7 @@ def index_exploitdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109846,8 +107584,7 @@ def index_exploitdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109865,7 +107602,7 @@ def index_exploitdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploitdb\" @@ -109905,10 +107642,8 @@ def index_exploitdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109961,8 +107696,7 @@ def index_exploitdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110006,8 +107740,7 @@ def _index_exploitdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110020,7 +107753,10 @@ def _index_exploitdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -110104,13 +107840,9 @@ def _index_exploitdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -110193,8 +107925,7 @@ def index_exploits_changelog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110212,7 +107943,7 @@ def index_exploits_changelog_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110252,10 +107983,8 @@ def index_exploits_changelog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110308,8 +108037,7 @@ def index_exploits_changelog_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110358,8 +108086,7 @@ def index_exploits_changelog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110377,7 +108104,7 @@ def index_exploits_changelog_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination]: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110417,10 +108144,8 @@ def index_exploits_changelog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110473,8 +108198,7 @@ def index_exploits_changelog_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110523,8 +108247,7 @@ def index_exploits_changelog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110542,7 +108265,7 @@ def index_exploits_changelog_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploits-changelog\" @@ -110582,10 +108305,8 @@ def index_exploits_changelog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110638,8 +108359,7 @@ def index_exploits_changelog_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110683,8 +108403,7 @@ def _index_exploits_changelog_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110697,7 +108416,10 @@ def _index_exploits_changelog_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -110781,13 +108503,9 @@ def _index_exploits_changelog_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -110870,8 +108588,7 @@ def index_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110889,7 +108606,7 @@ def index_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination: """Return vulnerability data stored in index \"exploits\" @@ -110929,10 +108646,8 @@ def index_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110985,8 +108700,7 @@ def index_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111035,8 +108749,7 @@ def index_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111054,7 +108767,7 @@ def index_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination]: """Return vulnerability data stored in index \"exploits\" @@ -111094,10 +108807,8 @@ def index_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111150,8 +108861,7 @@ def index_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111200,8 +108910,7 @@ def index_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111219,7 +108928,7 @@ def index_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"exploits\" @@ -111259,10 +108968,8 @@ def index_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111315,8 +109022,7 @@ def index_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111360,8 +109066,7 @@ def _index_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -111374,7 +109079,10 @@ def _index_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -111458,13 +109166,9 @@ def _index_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -111547,8 +109251,7 @@ def index_f5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111566,7 +109269,7 @@ def index_f5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination: """Return vulnerability data stored in index \"f5\" @@ -111606,10 +109309,8 @@ def index_f5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111662,8 +109363,7 @@ def index_f5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111712,8 +109412,7 @@ def index_f5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111731,7 +109430,7 @@ def index_f5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination]: """Return vulnerability data stored in index \"f5\" @@ -111771,10 +109470,8 @@ def index_f5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111827,8 +109524,7 @@ def index_f5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111877,8 +109573,7 @@ def index_f5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111896,7 +109591,7 @@ def index_f5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"f5\" @@ -111936,10 +109631,8 @@ def index_f5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111992,8 +109685,7 @@ def index_f5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112037,8 +109729,7 @@ def _index_f5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112051,7 +109742,10 @@ def _index_f5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -112135,13 +109829,9 @@ def _index_f5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -112224,8 +109914,7 @@ def index_f_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112243,7 +109932,7 @@ def index_f_secure_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination: """Return vulnerability data stored in index \"f-secure\" @@ -112283,10 +109972,8 @@ def index_f_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112339,8 +110026,7 @@ def index_f_secure_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112389,8 +110075,7 @@ def index_f_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112408,7 +110093,7 @@ def index_f_secure_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination]: """Return vulnerability data stored in index \"f-secure\" @@ -112448,10 +110133,8 @@ def index_f_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112504,8 +110187,7 @@ def index_f_secure_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112554,8 +110236,7 @@ def index_f_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112573,7 +110254,7 @@ def index_f_secure_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"f-secure\" @@ -112613,10 +110294,8 @@ def index_f_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112669,8 +110348,7 @@ def index_f_secure_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112714,8 +110392,7 @@ def _index_f_secure_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112728,7 +110405,10 @@ def _index_f_secure_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -112812,13 +110492,9 @@ def _index_f_secure_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -112901,8 +110577,7 @@ def index_fanuc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112920,7 +110595,7 @@ def index_fanuc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination: """Return vulnerability data stored in index \"fanuc\" @@ -112960,10 +110635,8 @@ def index_fanuc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113016,8 +110689,7 @@ def index_fanuc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113066,8 +110738,7 @@ def index_fanuc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113085,7 +110756,7 @@ def index_fanuc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination]: """Return vulnerability data stored in index \"fanuc\" @@ -113125,10 +110796,8 @@ def index_fanuc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113181,8 +110850,7 @@ def index_fanuc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113231,8 +110899,7 @@ def index_fanuc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113250,7 +110917,7 @@ def index_fanuc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fanuc\" @@ -113290,10 +110957,8 @@ def index_fanuc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113346,8 +111011,7 @@ def index_fanuc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113391,8 +111055,7 @@ def _index_fanuc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -113405,7 +111068,10 @@ def _index_fanuc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -113489,13 +111155,9 @@ def _index_fanuc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -113578,8 +111240,7 @@ def index_fastly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113597,7 +111258,7 @@ def index_fastly_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination: """Return vulnerability data stored in index \"fastly\" @@ -113637,10 +111298,8 @@ def index_fastly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113693,8 +111352,7 @@ def index_fastly_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113743,8 +111401,7 @@ def index_fastly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113762,7 +111419,7 @@ def index_fastly_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination]: """Return vulnerability data stored in index \"fastly\" @@ -113802,10 +111459,8 @@ def index_fastly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113858,8 +111513,7 @@ def index_fastly_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113908,8 +111562,7 @@ def index_fastly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113927,7 +111580,7 @@ def index_fastly_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fastly\" @@ -113967,10 +111620,8 @@ def index_fastly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114023,8 +111674,7 @@ def index_fastly_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114068,8 +111718,7 @@ def _index_fastly_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114082,7 +111731,10 @@ def _index_fastly_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -114166,13 +111818,9 @@ def _index_fastly_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -114255,8 +111903,7 @@ def index_fedora_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114274,7 +111921,7 @@ def index_fedora_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination: """Return vulnerability data stored in index \"fedora\" @@ -114314,10 +111961,8 @@ def index_fedora_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114370,8 +112015,7 @@ def index_fedora_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114420,8 +112064,7 @@ def index_fedora_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114439,7 +112082,7 @@ def index_fedora_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination]: """Return vulnerability data stored in index \"fedora\" @@ -114479,10 +112122,8 @@ def index_fedora_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114535,8 +112176,7 @@ def index_fedora_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114585,8 +112225,7 @@ def index_fedora_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114604,7 +112243,7 @@ def index_fedora_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fedora\" @@ -114644,10 +112283,8 @@ def index_fedora_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114700,8 +112337,7 @@ def index_fedora_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114745,8 +112381,7 @@ def _index_fedora_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114759,7 +112394,10 @@ def _index_fedora_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -114843,13 +112481,9 @@ def _index_fedora_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -114932,8 +112566,7 @@ def index_festo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114951,7 +112584,7 @@ def index_festo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination: """Return vulnerability data stored in index \"festo\" @@ -114991,10 +112624,8 @@ def index_festo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115047,8 +112678,7 @@ def index_festo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115097,8 +112727,7 @@ def index_festo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115116,7 +112745,7 @@ def index_festo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination]: """Return vulnerability data stored in index \"festo\" @@ -115156,10 +112785,8 @@ def index_festo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115212,8 +112839,7 @@ def index_festo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115262,8 +112888,7 @@ def index_festo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115281,7 +112906,7 @@ def index_festo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"festo\" @@ -115321,10 +112946,8 @@ def index_festo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115377,8 +113000,7 @@ def index_festo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115422,8 +113044,7 @@ def _index_festo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -115436,7 +113057,10 @@ def _index_festo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -115520,13 +113144,9 @@ def _index_festo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -115609,8 +113229,7 @@ def index_filecloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115628,7 +113247,7 @@ def index_filecloud_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination: """Return vulnerability data stored in index \"filecloud\" @@ -115668,10 +113287,8 @@ def index_filecloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115724,8 +113341,7 @@ def index_filecloud_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115774,8 +113390,7 @@ def index_filecloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115793,7 +113408,7 @@ def index_filecloud_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination]: """Return vulnerability data stored in index \"filecloud\" @@ -115833,10 +113448,8 @@ def index_filecloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115889,8 +113502,7 @@ def index_filecloud_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115939,8 +113551,7 @@ def index_filecloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115958,7 +113569,7 @@ def index_filecloud_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"filecloud\" @@ -115998,10 +113609,8 @@ def index_filecloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116054,8 +113663,7 @@ def index_filecloud_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116099,8 +113707,7 @@ def _index_filecloud_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116113,7 +113720,10 @@ def _index_filecloud_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -116197,13 +113807,9 @@ def _index_filecloud_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -116286,8 +113892,7 @@ def index_filezilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116305,7 +113910,7 @@ def index_filezilla_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination: """Return vulnerability data stored in index \"filezilla\" @@ -116345,10 +113950,8 @@ def index_filezilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116401,8 +114004,7 @@ def index_filezilla_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116451,8 +114053,7 @@ def index_filezilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116470,7 +114071,7 @@ def index_filezilla_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination]: """Return vulnerability data stored in index \"filezilla\" @@ -116510,10 +114111,8 @@ def index_filezilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116566,8 +114165,7 @@ def index_filezilla_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116616,8 +114214,7 @@ def index_filezilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116635,7 +114232,7 @@ def index_filezilla_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"filezilla\" @@ -116675,10 +114272,8 @@ def index_filezilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116731,8 +114326,7 @@ def index_filezilla_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116776,8 +114370,7 @@ def _index_filezilla_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116790,7 +114383,10 @@ def _index_filezilla_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -116874,13 +114470,9 @@ def _index_filezilla_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -116963,8 +114555,7 @@ def index_flatt_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116982,7 +114573,7 @@ def index_flatt_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination: """Return vulnerability data stored in index \"flatt-security\" @@ -117022,10 +114613,8 @@ def index_flatt_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117078,8 +114667,7 @@ def index_flatt_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117128,8 +114716,7 @@ def index_flatt_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117147,7 +114734,7 @@ def index_flatt_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination]: """Return vulnerability data stored in index \"flatt-security\" @@ -117187,10 +114774,8 @@ def index_flatt_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117243,8 +114828,7 @@ def index_flatt_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117293,8 +114877,7 @@ def index_flatt_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117312,7 +114895,7 @@ def index_flatt_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"flatt-security\" @@ -117352,10 +114935,8 @@ def index_flatt_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117408,8 +114989,7 @@ def index_flatt_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117453,8 +115033,7 @@ def _index_flatt_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -117467,7 +115046,10 @@ def _index_flatt_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -117551,13 +115133,9 @@ def _index_flatt_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -117640,8 +115218,7 @@ def index_forgerock_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117659,7 +115236,7 @@ def index_forgerock_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination: """Return vulnerability data stored in index \"forgerock\" @@ -117699,10 +115276,8 @@ def index_forgerock_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117755,8 +115330,7 @@ def index_forgerock_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117805,8 +115379,7 @@ def index_forgerock_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117824,7 +115397,7 @@ def index_forgerock_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination]: """Return vulnerability data stored in index \"forgerock\" @@ -117864,10 +115437,8 @@ def index_forgerock_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117920,8 +115491,7 @@ def index_forgerock_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117970,8 +115540,7 @@ def index_forgerock_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117989,7 +115558,7 @@ def index_forgerock_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"forgerock\" @@ -118029,10 +115598,8 @@ def index_forgerock_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118085,8 +115652,7 @@ def index_forgerock_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118130,8 +115696,7 @@ def _index_forgerock_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118144,7 +115709,10 @@ def _index_forgerock_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -118228,13 +115796,9 @@ def _index_forgerock_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -118317,8 +115881,7 @@ def index_fortinet_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118336,7 +115899,7 @@ def index_fortinet_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination: """Return vulnerability data stored in index \"fortinet\" @@ -118376,10 +115939,8 @@ def index_fortinet_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118432,8 +115993,7 @@ def index_fortinet_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118482,8 +116042,7 @@ def index_fortinet_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118501,7 +116060,7 @@ def index_fortinet_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"fortinet\" @@ -118541,10 +116100,8 @@ def index_fortinet_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118597,8 +116154,7 @@ def index_fortinet_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118647,8 +116203,7 @@ def index_fortinet_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118666,7 +116221,7 @@ def index_fortinet_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fortinet\" @@ -118706,10 +116261,8 @@ def index_fortinet_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118762,8 +116315,7 @@ def index_fortinet_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118807,8 +116359,7 @@ def _index_fortinet_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118821,7 +116372,10 @@ def _index_fortinet_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -118905,13 +116459,9 @@ def _index_fortinet_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -118994,8 +116544,7 @@ def index_fortinet_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119013,7 +116562,7 @@ def index_fortinet_ips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119053,10 +116602,8 @@ def index_fortinet_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119109,8 +116656,7 @@ def index_fortinet_ips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119159,8 +116705,7 @@ def index_fortinet_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119178,7 +116723,7 @@ def index_fortinet_ips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination]: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119218,10 +116763,8 @@ def index_fortinet_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119274,8 +116817,7 @@ def index_fortinet_ips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119324,8 +116866,7 @@ def index_fortinet_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119343,7 +116884,7 @@ def index_fortinet_ips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fortinet-ips\" @@ -119383,10 +116924,8 @@ def index_fortinet_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119439,8 +116978,7 @@ def index_fortinet_ips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119484,8 +117022,7 @@ def _index_fortinet_ips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -119498,7 +117035,10 @@ def _index_fortinet_ips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -119582,13 +117122,9 @@ def _index_fortinet_ips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -119671,8 +117207,7 @@ def index_foxit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119690,7 +117225,7 @@ def index_foxit_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination: """Return vulnerability data stored in index \"foxit\" @@ -119730,10 +117265,8 @@ def index_foxit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119786,8 +117319,7 @@ def index_foxit_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119836,8 +117368,7 @@ def index_foxit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119855,7 +117386,7 @@ def index_foxit_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination]: """Return vulnerability data stored in index \"foxit\" @@ -119895,10 +117426,8 @@ def index_foxit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119951,8 +117480,7 @@ def index_foxit_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120001,8 +117529,7 @@ def index_foxit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120020,7 +117547,7 @@ def index_foxit_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"foxit\" @@ -120060,10 +117587,8 @@ def index_foxit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120116,8 +117641,7 @@ def index_foxit_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120161,8 +117685,7 @@ def _index_foxit_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120175,7 +117698,10 @@ def _index_foxit_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -120259,13 +117785,9 @@ def _index_foxit_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -120348,8 +117870,7 @@ def index_freebsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120367,7 +117888,7 @@ def index_freebsd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination: """Return vulnerability data stored in index \"freebsd\" @@ -120407,10 +117928,8 @@ def index_freebsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120463,8 +117982,7 @@ def index_freebsd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120513,8 +118031,7 @@ def index_freebsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120532,7 +118049,7 @@ def index_freebsd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"freebsd\" @@ -120572,10 +118089,8 @@ def index_freebsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120628,8 +118143,7 @@ def index_freebsd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120678,8 +118192,7 @@ def index_freebsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120697,7 +118210,7 @@ def index_freebsd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"freebsd\" @@ -120737,10 +118250,8 @@ def index_freebsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120793,8 +118304,7 @@ def index_freebsd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120838,8 +118348,7 @@ def _index_freebsd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120852,7 +118361,10 @@ def _index_freebsd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -120936,13 +118448,9 @@ def _index_freebsd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -121025,8 +118533,7 @@ def index_fresenius_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121044,7 +118551,7 @@ def index_fresenius_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination: """Return vulnerability data stored in index \"fresenius\" @@ -121084,10 +118591,8 @@ def index_fresenius_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121140,8 +118645,7 @@ def index_fresenius_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121190,8 +118694,7 @@ def index_fresenius_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121209,7 +118712,7 @@ def index_fresenius_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination]: """Return vulnerability data stored in index \"fresenius\" @@ -121249,10 +118752,8 @@ def index_fresenius_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121305,8 +118806,7 @@ def index_fresenius_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121355,8 +118855,7 @@ def index_fresenius_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121374,7 +118873,7 @@ def index_fresenius_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"fresenius\" @@ -121414,10 +118913,8 @@ def index_fresenius_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121470,8 +118967,7 @@ def index_fresenius_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121515,8 +119011,7 @@ def _index_fresenius_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -121529,7 +119024,10 @@ def _index_fresenius_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -121613,13 +119111,9 @@ def _index_fresenius_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -121702,8 +119196,7 @@ def index_gallagher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121721,7 +119214,7 @@ def index_gallagher_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination: """Return vulnerability data stored in index \"gallagher\" @@ -121761,10 +119254,8 @@ def index_gallagher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121817,8 +119308,7 @@ def index_gallagher_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121867,8 +119357,7 @@ def index_gallagher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121886,7 +119375,7 @@ def index_gallagher_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination]: """Return vulnerability data stored in index \"gallagher\" @@ -121926,10 +119415,8 @@ def index_gallagher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121982,8 +119469,7 @@ def index_gallagher_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122032,8 +119518,7 @@ def index_gallagher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122051,7 +119536,7 @@ def index_gallagher_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gallagher\" @@ -122091,10 +119576,8 @@ def index_gallagher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122147,8 +119630,7 @@ def index_gallagher_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122192,8 +119674,7 @@ def _index_gallagher_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122206,7 +119687,10 @@ def _index_gallagher_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -122290,13 +119774,9 @@ def _index_gallagher_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -122379,8 +119859,7 @@ def index_gcp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122398,7 +119877,7 @@ def index_gcp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination: """Return vulnerability data stored in index \"gcp\" @@ -122438,10 +119917,8 @@ def index_gcp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122494,8 +119971,7 @@ def index_gcp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122544,8 +120020,7 @@ def index_gcp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122563,7 +120038,7 @@ def index_gcp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination]: """Return vulnerability data stored in index \"gcp\" @@ -122603,10 +120078,8 @@ def index_gcp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122659,8 +120132,7 @@ def index_gcp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122709,8 +120181,7 @@ def index_gcp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122728,7 +120199,7 @@ def index_gcp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gcp\" @@ -122768,10 +120239,8 @@ def index_gcp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122824,8 +120293,7 @@ def index_gcp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122869,8 +120337,7 @@ def _index_gcp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122883,7 +120350,10 @@ def _index_gcp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -122967,13 +120437,9 @@ def _index_gcp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -123056,8 +120522,7 @@ def index_ge_gas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123075,7 +120540,7 @@ def index_ge_gas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination: """Return vulnerability data stored in index \"ge-gas\" @@ -123115,10 +120580,8 @@ def index_ge_gas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123171,8 +120634,7 @@ def index_ge_gas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123221,8 +120683,7 @@ def index_ge_gas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123240,7 +120701,7 @@ def index_ge_gas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination]: """Return vulnerability data stored in index \"ge-gas\" @@ -123280,10 +120741,8 @@ def index_ge_gas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123336,8 +120795,7 @@ def index_ge_gas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123386,8 +120844,7 @@ def index_ge_gas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123405,7 +120862,7 @@ def index_ge_gas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ge-gas\" @@ -123445,10 +120902,8 @@ def index_ge_gas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123501,8 +120956,7 @@ def index_ge_gas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123546,8 +121000,7 @@ def _index_ge_gas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -123560,7 +121013,10 @@ def _index_ge_gas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -123644,13 +121100,9 @@ def _index_ge_gas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -123733,8 +121185,7 @@ def index_ge_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123752,7 +121203,7 @@ def index_ge_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ge-healthcare\" @@ -123792,10 +121243,8 @@ def index_ge_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123848,8 +121297,7 @@ def index_ge_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123898,8 +121346,7 @@ def index_ge_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123917,7 +121364,7 @@ def index_ge_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ge-healthcare\" @@ -123957,10 +121404,8 @@ def index_ge_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124013,8 +121458,7 @@ def index_ge_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124063,8 +121507,7 @@ def index_ge_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124082,7 +121525,7 @@ def index_ge_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ge-healthcare\" @@ -124122,10 +121565,8 @@ def index_ge_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124178,8 +121619,7 @@ def index_ge_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124223,8 +121663,7 @@ def _index_ge_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124237,7 +121676,10 @@ def _index_ge_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -124321,13 +121763,9 @@ def _index_ge_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -124410,8 +121848,7 @@ def index_gem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124429,7 +121866,7 @@ def index_gem_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"gem\" @@ -124469,10 +121906,8 @@ def index_gem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124525,8 +121960,7 @@ def index_gem_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124575,8 +122009,7 @@ def index_gem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124594,7 +122027,7 @@ def index_gem_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"gem\" @@ -124634,10 +122067,8 @@ def index_gem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124690,8 +122121,7 @@ def index_gem_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124740,8 +122170,7 @@ def index_gem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124759,7 +122188,7 @@ def index_gem_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gem\" @@ -124799,10 +122228,8 @@ def index_gem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124855,8 +122282,7 @@ def index_gem_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124900,8 +122326,7 @@ def _index_gem_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124914,7 +122339,10 @@ def _index_gem_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -124998,13 +122426,9 @@ def _index_gem_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -125087,8 +122511,7 @@ def index_gen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125106,7 +122529,7 @@ def index_gen_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination: """Return vulnerability data stored in index \"gen\" @@ -125146,10 +122569,8 @@ def index_gen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125202,8 +122623,7 @@ def index_gen_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125252,8 +122672,7 @@ def index_gen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125271,7 +122690,7 @@ def index_gen_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination]: """Return vulnerability data stored in index \"gen\" @@ -125311,10 +122730,8 @@ def index_gen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125367,8 +122784,7 @@ def index_gen_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125417,8 +122833,7 @@ def index_gen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125436,7 +122851,7 @@ def index_gen_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gen\" @@ -125476,10 +122891,8 @@ def index_gen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125532,8 +122945,7 @@ def index_gen_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125577,8 +122989,7 @@ def _index_gen_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125591,7 +123002,10 @@ def _index_gen_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -125675,13 +123089,9 @@ def _index_gen_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -125764,8 +123174,7 @@ def index_genetec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125783,7 +123192,7 @@ def index_genetec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination: """Return vulnerability data stored in index \"genetec\" @@ -125823,10 +123232,8 @@ def index_genetec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125879,8 +123286,7 @@ def index_genetec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125929,8 +123335,7 @@ def index_genetec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125948,7 +123353,7 @@ def index_genetec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination]: """Return vulnerability data stored in index \"genetec\" @@ -125988,10 +123393,8 @@ def index_genetec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126044,8 +123447,7 @@ def index_genetec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126094,8 +123496,7 @@ def index_genetec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126113,7 +123514,7 @@ def index_genetec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"genetec\" @@ -126153,10 +123554,8 @@ def index_genetec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126209,8 +123608,7 @@ def index_genetec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126254,8 +123652,7 @@ def _index_genetec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126268,7 +123665,10 @@ def _index_genetec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -126352,13 +123752,9 @@ def _index_genetec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -126441,8 +123837,7 @@ def index_ghsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126460,7 +123855,7 @@ def index_ghsa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination: """Return vulnerability data stored in index \"ghsa\" @@ -126500,10 +123895,8 @@ def index_ghsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126556,8 +123949,7 @@ def index_ghsa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126606,8 +123998,7 @@ def index_ghsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126625,7 +124016,7 @@ def index_ghsa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination]: """Return vulnerability data stored in index \"ghsa\" @@ -126665,10 +124056,8 @@ def index_ghsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126721,8 +124110,7 @@ def index_ghsa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126771,8 +124159,7 @@ def index_ghsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126790,7 +124177,7 @@ def index_ghsa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ghsa\" @@ -126830,10 +124217,8 @@ def index_ghsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126886,8 +124271,7 @@ def index_ghsa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126931,8 +124315,7 @@ def _index_ghsa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126945,7 +124328,10 @@ def _index_ghsa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -127029,13 +124415,9 @@ def _index_ghsa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -127118,8 +124500,7 @@ def index_gigabyte_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127137,7 +124518,7 @@ def index_gigabyte_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination: """Return vulnerability data stored in index \"gigabyte\" @@ -127177,10 +124558,8 @@ def index_gigabyte_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127233,8 +124612,7 @@ def index_gigabyte_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127283,8 +124661,7 @@ def index_gigabyte_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127302,7 +124679,7 @@ def index_gigabyte_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination]: """Return vulnerability data stored in index \"gigabyte\" @@ -127342,10 +124719,8 @@ def index_gigabyte_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127398,8 +124773,7 @@ def index_gigabyte_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127448,8 +124822,7 @@ def index_gigabyte_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127467,7 +124840,7 @@ def index_gigabyte_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gigabyte\" @@ -127507,10 +124880,8 @@ def index_gigabyte_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127563,8 +124934,7 @@ def index_gigabyte_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127608,8 +124978,7 @@ def _index_gigabyte_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127622,7 +124991,10 @@ def _index_gigabyte_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -127706,13 +125078,9 @@ def _index_gigabyte_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -127795,8 +125163,7 @@ def index_gitee_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127814,7 +125181,7 @@ def index_gitee_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination: """Return vulnerability data stored in index \"gitee-exploits\" @@ -127854,10 +125221,8 @@ def index_gitee_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127910,8 +125275,7 @@ def index_gitee_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127960,8 +125324,7 @@ def index_gitee_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127979,7 +125342,7 @@ def index_gitee_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination]: """Return vulnerability data stored in index \"gitee-exploits\" @@ -128019,10 +125382,8 @@ def index_gitee_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128075,8 +125436,7 @@ def index_gitee_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128125,8 +125485,7 @@ def index_gitee_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128144,7 +125503,7 @@ def index_gitee_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitee-exploits\" @@ -128184,10 +125543,8 @@ def index_gitee_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128240,8 +125597,7 @@ def index_gitee_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128285,8 +125641,7 @@ def _index_gitee_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128299,7 +125654,10 @@ def _index_gitee_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -128383,13 +125741,9 @@ def _index_gitee_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -128472,8 +125826,7 @@ def index_github_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128491,7 +125844,7 @@ def index_github_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination: """Return vulnerability data stored in index \"github-exploits\" @@ -128531,10 +125884,8 @@ def index_github_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128587,8 +125938,7 @@ def index_github_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128637,8 +125987,7 @@ def index_github_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128656,7 +126005,7 @@ def index_github_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination]: """Return vulnerability data stored in index \"github-exploits\" @@ -128696,10 +126045,8 @@ def index_github_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128752,8 +126099,7 @@ def index_github_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128802,8 +126148,7 @@ def index_github_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128821,7 +126166,7 @@ def index_github_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"github-exploits\" @@ -128861,10 +126206,8 @@ def index_github_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128917,8 +126260,7 @@ def index_github_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128962,8 +126304,7 @@ def _index_github_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128976,7 +126317,10 @@ def _index_github_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -129060,13 +126404,9 @@ def _index_github_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -129149,8 +126489,7 @@ def index_github_security_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129168,7 +126507,7 @@ def index_github_security_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129208,10 +126547,8 @@ def index_github_security_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129264,8 +126601,7 @@ def index_github_security_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129314,8 +126650,7 @@ def index_github_security_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129333,7 +126668,7 @@ def index_github_security_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination]: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129373,10 +126708,8 @@ def index_github_security_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129429,8 +126762,7 @@ def index_github_security_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129479,8 +126811,7 @@ def index_github_security_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129498,7 +126829,7 @@ def index_github_security_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"github-security-advisories\" @@ -129538,10 +126869,8 @@ def index_github_security_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129594,8 +126923,7 @@ def index_github_security_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129639,8 +126967,7 @@ def _index_github_security_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129653,7 +126980,10 @@ def _index_github_security_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -129737,13 +127067,9 @@ def _index_github_security_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -129826,8 +127152,7 @@ def index_gitlab_advisories_community_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129845,7 +127170,7 @@ def index_gitlab_advisories_community_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -129885,10 +127210,8 @@ def index_gitlab_advisories_community_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129941,8 +127264,7 @@ def index_gitlab_advisories_community_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129991,8 +127313,7 @@ def index_gitlab_advisories_community_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130010,7 +127331,7 @@ def index_gitlab_advisories_community_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -130050,10 +127371,8 @@ def index_gitlab_advisories_community_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130106,8 +127425,7 @@ def index_gitlab_advisories_community_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130156,8 +127474,7 @@ def index_gitlab_advisories_community_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130175,7 +127492,7 @@ def index_gitlab_advisories_community_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -130215,10 +127532,8 @@ def index_gitlab_advisories_community_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130271,8 +127586,7 @@ def index_gitlab_advisories_community_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130316,8 +127630,7 @@ def _index_gitlab_advisories_community_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -130330,7 +127643,10 @@ def _index_gitlab_advisories_community_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -130414,13 +127730,9 @@ def _index_gitlab_advisories_community_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -130503,8 +127815,7 @@ def index_gitlab_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130522,7 +127833,7 @@ def index_gitlab_exploits_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130562,10 +127873,8 @@ def index_gitlab_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130618,8 +127927,7 @@ def index_gitlab_exploits_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130668,8 +127976,7 @@ def index_gitlab_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130687,7 +127994,7 @@ def index_gitlab_exploits_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination]: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130727,10 +128034,8 @@ def index_gitlab_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130783,8 +128088,7 @@ def index_gitlab_exploits_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130833,8 +128137,7 @@ def index_gitlab_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130852,7 +128155,7 @@ def index_gitlab_exploits_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gitlab-exploits\" @@ -130892,10 +128195,8 @@ def index_gitlab_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130948,8 +128249,7 @@ def index_gitlab_exploits_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130993,8 +128293,7 @@ def _index_gitlab_exploits_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131007,7 +128306,10 @@ def _index_gitlab_exploits_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -131091,13 +128393,9 @@ def _index_gitlab_exploits_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -131180,8 +128478,7 @@ def index_glibc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131199,7 +128496,7 @@ def index_glibc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination: """Return vulnerability data stored in index \"glibc\" @@ -131239,10 +128536,8 @@ def index_glibc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131295,8 +128590,7 @@ def index_glibc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131345,8 +128639,7 @@ def index_glibc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131364,7 +128657,7 @@ def index_glibc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination]: """Return vulnerability data stored in index \"glibc\" @@ -131404,10 +128697,8 @@ def index_glibc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131460,8 +128751,7 @@ def index_glibc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131510,8 +128800,7 @@ def index_glibc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131529,7 +128818,7 @@ def index_glibc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"glibc\" @@ -131569,10 +128858,8 @@ def index_glibc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131625,8 +128912,7 @@ def index_glibc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131670,8 +128956,7 @@ def _index_glibc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131684,7 +128969,10 @@ def _index_glibc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -131768,13 +129056,9 @@ def _index_glibc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -131857,8 +129141,7 @@ def index_gmo_cybersecurity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131876,7 +129159,7 @@ def index_gmo_cybersecurity_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -131916,10 +129199,8 @@ def index_gmo_cybersecurity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131972,8 +129253,7 @@ def index_gmo_cybersecurity_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132022,8 +129302,7 @@ def index_gmo_cybersecurity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132041,7 +129320,7 @@ def index_gmo_cybersecurity_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination]: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -132081,10 +129360,8 @@ def index_gmo_cybersecurity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132137,8 +129414,7 @@ def index_gmo_cybersecurity_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132187,8 +129463,7 @@ def index_gmo_cybersecurity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132206,7 +129481,7 @@ def index_gmo_cybersecurity_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -132246,10 +129521,8 @@ def index_gmo_cybersecurity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132302,8 +129575,7 @@ def index_gmo_cybersecurity_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132347,8 +129619,7 @@ def _index_gmo_cybersecurity_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -132361,7 +129632,10 @@ def _index_gmo_cybersecurity_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -132445,13 +129719,9 @@ def _index_gmo_cybersecurity_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -132534,8 +129804,7 @@ def index_gnutls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132553,7 +129822,7 @@ def index_gnutls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination: """Return vulnerability data stored in index \"gnutls\" @@ -132593,10 +129862,8 @@ def index_gnutls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132649,8 +129916,7 @@ def index_gnutls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132699,8 +129965,7 @@ def index_gnutls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132718,7 +129983,7 @@ def index_gnutls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination]: """Return vulnerability data stored in index \"gnutls\" @@ -132758,10 +130023,8 @@ def index_gnutls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132814,8 +130077,7 @@ def index_gnutls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132864,8 +130126,7 @@ def index_gnutls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132883,7 +130144,7 @@ def index_gnutls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"gnutls\" @@ -132923,10 +130184,8 @@ def index_gnutls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132979,8 +130238,7 @@ def index_gnutls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133024,8 +130282,7 @@ def _index_gnutls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133038,7 +130295,10 @@ def _index_gnutls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -133122,13 +130382,9 @@ def _index_gnutls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -133211,8 +130467,7 @@ def index_go_vulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133230,7 +130485,7 @@ def index_go_vulndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination: """Return vulnerability data stored in index \"go-vulndb\" @@ -133270,10 +130525,8 @@ def index_go_vulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133326,8 +130579,7 @@ def index_go_vulndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133376,8 +130628,7 @@ def index_go_vulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133395,7 +130646,7 @@ def index_go_vulndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination]: """Return vulnerability data stored in index \"go-vulndb\" @@ -133435,10 +130686,8 @@ def index_go_vulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133491,8 +130740,7 @@ def index_go_vulndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133541,8 +130789,7 @@ def index_go_vulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133560,7 +130807,7 @@ def index_go_vulndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"go-vulndb\" @@ -133600,10 +130847,8 @@ def index_go_vulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133656,8 +130901,7 @@ def index_go_vulndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133701,8 +130945,7 @@ def _index_go_vulndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133715,7 +130958,10 @@ def _index_go_vulndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -133799,13 +131045,9 @@ def _index_go_vulndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -133888,8 +131130,7 @@ def index_golang_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133907,7 +131148,7 @@ def index_golang_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"golang\" @@ -133947,10 +131188,8 @@ def index_golang_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134003,8 +131242,7 @@ def index_golang_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134053,8 +131291,7 @@ def index_golang_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134072,7 +131309,7 @@ def index_golang_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"golang\" @@ -134112,10 +131349,8 @@ def index_golang_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134168,8 +131403,7 @@ def index_golang_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134218,8 +131452,7 @@ def index_golang_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134237,7 +131470,7 @@ def index_golang_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"golang\" @@ -134277,10 +131510,8 @@ def index_golang_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134333,8 +131564,7 @@ def index_golang_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134378,8 +131608,7 @@ def _index_golang_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -134392,7 +131621,10 @@ def _index_golang_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -134476,13 +131708,9 @@ def _index_golang_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -134565,8 +131793,7 @@ def index_google0day_itw_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134584,7 +131811,7 @@ def index_google0day_itw_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134624,10 +131851,8 @@ def index_google0day_itw_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134680,8 +131905,7 @@ def index_google0day_itw_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134730,8 +131954,7 @@ def index_google0day_itw_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134749,7 +131972,7 @@ def index_google0day_itw_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination]: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134789,10 +132012,8 @@ def index_google0day_itw_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134845,8 +132066,7 @@ def index_google0day_itw_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134895,8 +132115,7 @@ def index_google0day_itw_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134914,7 +132133,7 @@ def index_google0day_itw_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"google-0day-itw\" @@ -134954,10 +132173,8 @@ def index_google0day_itw_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135010,8 +132227,7 @@ def index_google0day_itw_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135055,8 +132271,7 @@ def _index_google0day_itw_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135069,7 +132284,10 @@ def _index_google0day_itw_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -135153,13 +132371,9 @@ def _index_google0day_itw_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -135242,8 +132456,7 @@ def index_google_container_optimized_os_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135261,7 +132474,7 @@ def index_google_container_optimized_os_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135301,10 +132514,8 @@ def index_google_container_optimized_os_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135357,8 +132568,7 @@ def index_google_container_optimized_os_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135407,8 +132617,7 @@ def index_google_container_optimized_os_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135426,7 +132635,7 @@ def index_google_container_optimized_os_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination]: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135466,10 +132675,8 @@ def index_google_container_optimized_os_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135522,8 +132729,7 @@ def index_google_container_optimized_os_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135572,8 +132778,7 @@ def index_google_container_optimized_os_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135591,7 +132796,7 @@ def index_google_container_optimized_os_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"google-container-optimized-os\" @@ -135631,10 +132836,8 @@ def index_google_container_optimized_os_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135687,8 +132890,7 @@ def index_google_container_optimized_os_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135732,8 +132934,7 @@ def _index_google_container_optimized_os_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135746,7 +132947,10 @@ def _index_google_container_optimized_os_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -135830,13 +133034,9 @@ def _index_google_container_optimized_os_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -135919,8 +133119,7 @@ def index_grafana_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135938,7 +133137,7 @@ def index_grafana_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination: """Return vulnerability data stored in index \"grafana\" @@ -135978,10 +133177,8 @@ def index_grafana_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136034,8 +133231,7 @@ def index_grafana_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136084,8 +133280,7 @@ def index_grafana_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136103,7 +133298,7 @@ def index_grafana_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination]: """Return vulnerability data stored in index \"grafana\" @@ -136143,10 +133338,8 @@ def index_grafana_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136199,8 +133392,7 @@ def index_grafana_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136249,8 +133441,7 @@ def index_grafana_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136268,7 +133459,7 @@ def index_grafana_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"grafana\" @@ -136308,10 +133499,8 @@ def index_grafana_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136364,8 +133553,7 @@ def index_grafana_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136409,8 +133597,7 @@ def _index_grafana_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -136423,7 +133610,10 @@ def _index_grafana_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -136507,13 +133697,9 @@ def _index_grafana_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -136596,8 +133782,7 @@ def index_greynoise_metadata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136615,7 +133800,7 @@ def index_greynoise_metadata_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136655,10 +133840,8 @@ def index_greynoise_metadata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136711,8 +133894,7 @@ def index_greynoise_metadata_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136761,8 +133943,7 @@ def index_greynoise_metadata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136780,7 +133961,7 @@ def index_greynoise_metadata_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination]: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136820,10 +134001,8 @@ def index_greynoise_metadata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136876,8 +134055,7 @@ def index_greynoise_metadata_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136926,8 +134104,7 @@ def index_greynoise_metadata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136945,7 +134122,7 @@ def index_greynoise_metadata_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"greynoise-metadata\" @@ -136985,10 +134162,8 @@ def index_greynoise_metadata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137041,8 +134216,7 @@ def index_greynoise_metadata_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137086,8 +134260,7 @@ def _index_greynoise_metadata_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137100,7 +134273,10 @@ def _index_greynoise_metadata_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -137184,13 +134360,9 @@ def _index_greynoise_metadata_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -137273,8 +134445,7 @@ def index_hackage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137292,7 +134463,7 @@ def index_hackage_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"hackage\" @@ -137332,10 +134503,8 @@ def index_hackage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137388,8 +134557,7 @@ def index_hackage_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137438,8 +134606,7 @@ def index_hackage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137457,7 +134624,7 @@ def index_hackage_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"hackage\" @@ -137497,10 +134664,8 @@ def index_hackage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137553,8 +134718,7 @@ def index_hackage_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137603,8 +134767,7 @@ def index_hackage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137622,7 +134785,7 @@ def index_hackage_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hackage\" @@ -137662,10 +134825,8 @@ def index_hackage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137718,8 +134879,7 @@ def index_hackage_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137763,8 +134923,7 @@ def _index_hackage_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137777,7 +134936,10 @@ def _index_hackage_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -137861,13 +135023,9 @@ def _index_hackage_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -137950,8 +135108,7 @@ def index_hacktivity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137969,7 +135126,7 @@ def index_hacktivity_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination: """Return vulnerability data stored in index \"hacktivity\" @@ -138009,10 +135166,8 @@ def index_hacktivity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138065,8 +135220,7 @@ def index_hacktivity_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138115,8 +135269,7 @@ def index_hacktivity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138134,7 +135287,7 @@ def index_hacktivity_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination]: """Return vulnerability data stored in index \"hacktivity\" @@ -138174,10 +135327,8 @@ def index_hacktivity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138230,8 +135381,7 @@ def index_hacktivity_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138280,8 +135430,7 @@ def index_hacktivity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138299,7 +135448,7 @@ def index_hacktivity_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hacktivity\" @@ -138339,10 +135488,8 @@ def index_hacktivity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138395,8 +135542,7 @@ def index_hacktivity_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138440,8 +135586,7 @@ def _index_hacktivity_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -138454,7 +135599,10 @@ def _index_hacktivity_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -138538,13 +135686,9 @@ def _index_hacktivity_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -138627,8 +135771,7 @@ def index_harmonyos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138646,7 +135789,7 @@ def index_harmonyos_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination: """Return vulnerability data stored in index \"harmonyos\" @@ -138686,10 +135829,8 @@ def index_harmonyos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138742,8 +135883,7 @@ def index_harmonyos_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138792,8 +135932,7 @@ def index_harmonyos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138811,7 +135950,7 @@ def index_harmonyos_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination]: """Return vulnerability data stored in index \"harmonyos\" @@ -138851,10 +135990,8 @@ def index_harmonyos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138907,8 +136044,7 @@ def index_harmonyos_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138957,8 +136093,7 @@ def index_harmonyos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138976,7 +136111,7 @@ def index_harmonyos_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"harmonyos\" @@ -139016,10 +136151,8 @@ def index_harmonyos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139072,8 +136205,7 @@ def index_harmonyos_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139117,8 +136249,7 @@ def _index_harmonyos_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139131,7 +136262,10 @@ def _index_harmonyos_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -139215,13 +136349,9 @@ def _index_harmonyos_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -139304,8 +136434,7 @@ def index_hashicorp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139323,7 +136452,7 @@ def index_hashicorp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination: """Return vulnerability data stored in index \"hashicorp\" @@ -139363,10 +136492,8 @@ def index_hashicorp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139419,8 +136546,7 @@ def index_hashicorp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139469,8 +136595,7 @@ def index_hashicorp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139488,7 +136613,7 @@ def index_hashicorp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination]: """Return vulnerability data stored in index \"hashicorp\" @@ -139528,10 +136653,8 @@ def index_hashicorp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139584,8 +136707,7 @@ def index_hashicorp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139634,8 +136756,7 @@ def index_hashicorp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139653,7 +136774,7 @@ def index_hashicorp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hashicorp\" @@ -139693,10 +136814,8 @@ def index_hashicorp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139749,8 +136868,7 @@ def index_hashicorp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139794,8 +136912,7 @@ def _index_hashicorp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139808,7 +136925,10 @@ def _index_hashicorp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -139892,13 +137012,9 @@ def _index_hashicorp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -139981,8 +137097,7 @@ def index_haskell_sadb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140000,7 +137115,7 @@ def index_haskell_sadb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140040,10 +137155,8 @@ def index_haskell_sadb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140096,8 +137209,7 @@ def index_haskell_sadb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140146,8 +137258,7 @@ def index_haskell_sadb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140165,7 +137276,7 @@ def index_haskell_sadb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140205,10 +137316,8 @@ def index_haskell_sadb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140261,8 +137370,7 @@ def index_haskell_sadb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140311,8 +137419,7 @@ def index_haskell_sadb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140330,7 +137437,7 @@ def index_haskell_sadb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"haskell-sadb\" @@ -140370,10 +137477,8 @@ def index_haskell_sadb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140426,8 +137531,7 @@ def index_haskell_sadb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140471,8 +137575,7 @@ def _index_haskell_sadb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -140485,7 +137588,10 @@ def _index_haskell_sadb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -140569,13 +137675,9 @@ def _index_haskell_sadb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -140658,8 +137760,7 @@ def index_hcl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140677,7 +137778,7 @@ def index_hcl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination: """Return vulnerability data stored in index \"hcl\" @@ -140717,10 +137818,8 @@ def index_hcl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140773,8 +137872,7 @@ def index_hcl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140823,8 +137921,7 @@ def index_hcl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140842,7 +137939,7 @@ def index_hcl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination]: """Return vulnerability data stored in index \"hcl\" @@ -140882,10 +137979,8 @@ def index_hcl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140938,8 +138033,7 @@ def index_hcl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140988,8 +138082,7 @@ def index_hcl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141007,7 +138100,7 @@ def index_hcl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hcl\" @@ -141047,10 +138140,8 @@ def index_hcl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141103,8 +138194,7 @@ def index_hcl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141148,8 +138238,7 @@ def _index_hcl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141162,7 +138251,10 @@ def _index_hcl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -141246,13 +138338,9 @@ def _index_hcl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -141335,8 +138423,7 @@ def index_hex_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141354,7 +138441,7 @@ def index_hex_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"hex\" @@ -141394,10 +138481,8 @@ def index_hex_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141450,8 +138535,7 @@ def index_hex_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141500,8 +138584,7 @@ def index_hex_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141519,7 +138602,7 @@ def index_hex_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"hex\" @@ -141559,10 +138642,8 @@ def index_hex_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141615,8 +138696,7 @@ def index_hex_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141665,8 +138745,7 @@ def index_hex_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141684,7 +138763,7 @@ def index_hex_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hex\" @@ -141724,10 +138803,8 @@ def index_hex_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141780,8 +138857,7 @@ def index_hex_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141825,8 +138901,7 @@ def _index_hex_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141839,7 +138914,10 @@ def _index_hex_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -141923,13 +139001,9 @@ def _index_hex_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -142012,8 +139086,7 @@ def index_hikvision_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142031,7 +139104,7 @@ def index_hikvision_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination: """Return vulnerability data stored in index \"hikvision\" @@ -142071,10 +139144,8 @@ def index_hikvision_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142127,8 +139198,7 @@ def index_hikvision_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142177,8 +139247,7 @@ def index_hikvision_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142196,7 +139265,7 @@ def index_hikvision_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination]: """Return vulnerability data stored in index \"hikvision\" @@ -142236,10 +139305,8 @@ def index_hikvision_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142292,8 +139359,7 @@ def index_hikvision_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142342,8 +139408,7 @@ def index_hikvision_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142361,7 +139426,7 @@ def index_hikvision_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hikvision\" @@ -142401,10 +139466,8 @@ def index_hikvision_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142457,8 +139520,7 @@ def index_hikvision_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142502,8 +139564,7 @@ def _index_hikvision_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -142516,7 +139577,10 @@ def _index_hikvision_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -142600,13 +139664,9 @@ def _index_hikvision_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -142689,8 +139749,7 @@ def index_hillrom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142708,7 +139767,7 @@ def index_hillrom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination: """Return vulnerability data stored in index \"hillrom\" @@ -142748,10 +139807,8 @@ def index_hillrom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142804,8 +139861,7 @@ def index_hillrom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142854,8 +139910,7 @@ def index_hillrom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142873,7 +139928,7 @@ def index_hillrom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"hillrom\" @@ -142913,10 +139968,8 @@ def index_hillrom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142969,8 +140022,7 @@ def index_hillrom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143019,8 +140071,7 @@ def index_hillrom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143038,7 +140089,7 @@ def index_hillrom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hillrom\" @@ -143078,10 +140129,8 @@ def index_hillrom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143134,8 +140183,7 @@ def index_hillrom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143179,8 +140227,7 @@ def _index_hillrom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143193,7 +140240,10 @@ def _index_hillrom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -143277,13 +140327,9 @@ def _index_hillrom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -143366,8 +140412,7 @@ def index_hitachi_energy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143385,7 +140430,7 @@ def index_hitachi_energy_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143425,10 +140470,8 @@ def index_hitachi_energy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143481,8 +140524,7 @@ def index_hitachi_energy_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143531,8 +140573,7 @@ def index_hitachi_energy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143550,7 +140591,7 @@ def index_hitachi_energy_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination]: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143590,10 +140631,8 @@ def index_hitachi_energy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143646,8 +140685,7 @@ def index_hitachi_energy_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143696,8 +140734,7 @@ def index_hitachi_energy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143715,7 +140752,7 @@ def index_hitachi_energy_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hitachi-energy\" @@ -143755,10 +140792,8 @@ def index_hitachi_energy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143811,8 +140846,7 @@ def index_hitachi_energy_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143856,8 +140890,7 @@ def _index_hitachi_energy_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143870,7 +140903,10 @@ def _index_hitachi_energy_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -143954,13 +140990,9 @@ def _index_hitachi_energy_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -144043,8 +141075,7 @@ def index_hitachi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144062,7 +141093,7 @@ def index_hitachi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination: """Return vulnerability data stored in index \"hitachi\" @@ -144102,10 +141133,8 @@ def index_hitachi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144158,8 +141187,7 @@ def index_hitachi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144208,8 +141236,7 @@ def index_hitachi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144227,7 +141254,7 @@ def index_hitachi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination]: """Return vulnerability data stored in index \"hitachi\" @@ -144267,10 +141294,8 @@ def index_hitachi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144323,8 +141348,7 @@ def index_hitachi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144373,8 +141397,7 @@ def index_hitachi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144392,7 +141415,7 @@ def index_hitachi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hitachi\" @@ -144432,10 +141455,8 @@ def index_hitachi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144488,8 +141509,7 @@ def index_hitachi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144533,8 +141553,7 @@ def _index_hitachi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -144547,7 +141566,10 @@ def _index_hitachi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -144631,13 +141653,9 @@ def _index_hitachi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -144720,8 +141738,7 @@ def index_hkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144739,7 +141756,7 @@ def index_hkcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination: """Return vulnerability data stored in index \"hkcert\" @@ -144779,10 +141796,8 @@ def index_hkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144835,8 +141850,7 @@ def index_hkcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144885,8 +141899,7 @@ def index_hkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144904,7 +141917,7 @@ def index_hkcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination]: """Return vulnerability data stored in index \"hkcert\" @@ -144944,10 +141957,8 @@ def index_hkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145000,8 +142011,7 @@ def index_hkcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145050,8 +142060,7 @@ def index_hkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145069,7 +142078,7 @@ def index_hkcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hkcert\" @@ -145109,10 +142118,8 @@ def index_hkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145165,8 +142172,7 @@ def index_hkcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145210,8 +142216,7 @@ def _index_hkcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145224,7 +142229,10 @@ def _index_hkcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -145308,13 +142316,9 @@ def _index_hkcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -145397,8 +142401,7 @@ def index_hms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145416,7 +142419,7 @@ def index_hms_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination: """Return vulnerability data stored in index \"hms\" @@ -145456,10 +142459,8 @@ def index_hms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145512,8 +142513,7 @@ def index_hms_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145562,8 +142562,7 @@ def index_hms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145581,7 +142580,7 @@ def index_hms_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination]: """Return vulnerability data stored in index \"hms\" @@ -145621,10 +142620,8 @@ def index_hms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145677,8 +142674,7 @@ def index_hms_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145727,8 +142723,7 @@ def index_hms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145746,7 +142741,7 @@ def index_hms_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hms\" @@ -145786,10 +142781,8 @@ def index_hms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145842,8 +142835,7 @@ def index_hms_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145887,8 +142879,7 @@ def _index_hms_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145901,7 +142892,10 @@ def _index_hms_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -145985,13 +142979,9 @@ def _index_hms_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -146074,8 +143064,7 @@ def index_honeywell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146093,7 +143082,7 @@ def index_honeywell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination: """Return vulnerability data stored in index \"honeywell\" @@ -146133,10 +143122,8 @@ def index_honeywell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146189,8 +143176,7 @@ def index_honeywell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146239,8 +143225,7 @@ def index_honeywell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146258,7 +143243,7 @@ def index_honeywell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination]: """Return vulnerability data stored in index \"honeywell\" @@ -146298,10 +143283,8 @@ def index_honeywell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146354,8 +143337,7 @@ def index_honeywell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146404,8 +143386,7 @@ def index_honeywell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146423,7 +143404,7 @@ def index_honeywell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"honeywell\" @@ -146463,10 +143444,8 @@ def index_honeywell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146519,8 +143498,7 @@ def index_honeywell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146564,8 +143542,7 @@ def _index_honeywell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -146578,7 +143555,10 @@ def _index_honeywell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -146662,13 +143642,9 @@ def _index_honeywell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -146751,8 +143727,7 @@ def index_hp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146770,7 +143745,7 @@ def index_hp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: """Return vulnerability data stored in index \"hp\" @@ -146810,10 +143785,8 @@ def index_hp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146866,8 +143839,7 @@ def index_hp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146916,8 +143888,7 @@ def index_hp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146935,7 +143906,7 @@ def index_hp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: """Return vulnerability data stored in index \"hp\" @@ -146975,10 +143946,8 @@ def index_hp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147031,8 +144000,7 @@ def index_hp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147081,8 +144049,7 @@ def index_hp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147100,7 +144067,7 @@ def index_hp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hp\" @@ -147140,10 +144107,8 @@ def index_hp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147196,8 +144161,7 @@ def index_hp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147241,8 +144205,7 @@ def _index_hp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147255,7 +144218,10 @@ def _index_hp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -147339,13 +144305,9 @@ def _index_hp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -147428,8 +144390,7 @@ def index_hpe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147447,7 +144408,7 @@ def index_hpe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: """Return vulnerability data stored in index \"hpe\" @@ -147487,10 +144448,8 @@ def index_hpe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147543,8 +144502,7 @@ def index_hpe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147593,8 +144551,7 @@ def index_hpe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147612,7 +144569,7 @@ def index_hpe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: """Return vulnerability data stored in index \"hpe\" @@ -147652,10 +144609,8 @@ def index_hpe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147708,8 +144663,7 @@ def index_hpe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147758,8 +144712,7 @@ def index_hpe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147777,7 +144730,7 @@ def index_hpe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"hpe\" @@ -147817,10 +144770,8 @@ def index_hpe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147873,8 +144824,7 @@ def index_hpe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147918,8 +144868,7 @@ def _index_hpe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147932,7 +144881,10 @@ def _index_hpe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -148016,13 +144968,9 @@ def _index_hpe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -148105,8 +145053,7 @@ def index_huawei_euleros_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148124,7 +145071,7 @@ def index_huawei_euleros_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148164,10 +145111,8 @@ def index_huawei_euleros_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148220,8 +145165,7 @@ def index_huawei_euleros_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148270,8 +145214,7 @@ def index_huawei_euleros_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148289,7 +145232,7 @@ def index_huawei_euleros_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148329,10 +145272,8 @@ def index_huawei_euleros_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148385,8 +145326,7 @@ def index_huawei_euleros_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148435,8 +145375,7 @@ def index_huawei_euleros_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148454,7 +145393,7 @@ def index_huawei_euleros_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-euleros\" @@ -148494,10 +145433,8 @@ def index_huawei_euleros_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148550,8 +145487,7 @@ def index_huawei_euleros_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148595,8 +145531,7 @@ def _index_huawei_euleros_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148609,7 +145544,10 @@ def _index_huawei_euleros_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -148693,13 +145631,9 @@ def _index_huawei_euleros_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -148782,8 +145716,7 @@ def index_huawei_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148801,7 +145734,7 @@ def index_huawei_ips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: """Return vulnerability data stored in index \"huawei-ips\" @@ -148841,10 +145774,8 @@ def index_huawei_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148897,8 +145828,7 @@ def index_huawei_ips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148947,8 +145877,7 @@ def index_huawei_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148966,7 +145895,7 @@ def index_huawei_ips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: """Return vulnerability data stored in index \"huawei-ips\" @@ -149006,10 +145935,8 @@ def index_huawei_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149062,8 +145989,7 @@ def index_huawei_ips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149112,8 +146038,7 @@ def index_huawei_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149131,7 +146056,7 @@ def index_huawei_ips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-ips\" @@ -149171,10 +146096,8 @@ def index_huawei_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149227,8 +146150,7 @@ def index_huawei_ips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149272,8 +146194,7 @@ def _index_huawei_ips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149286,7 +146207,10 @@ def _index_huawei_ips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -149370,13 +146294,9 @@ def _index_huawei_ips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -149459,8 +146379,7 @@ def index_huawei_psirt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149478,7 +146397,7 @@ def index_huawei_psirt_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149518,10 +146437,8 @@ def index_huawei_psirt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149574,8 +146491,7 @@ def index_huawei_psirt_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149624,8 +146540,7 @@ def index_huawei_psirt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149643,7 +146558,7 @@ def index_huawei_psirt_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149683,10 +146598,8 @@ def index_huawei_psirt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149739,8 +146652,7 @@ def index_huawei_psirt_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149789,8 +146701,7 @@ def index_huawei_psirt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149808,7 +146719,7 @@ def index_huawei_psirt_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"huawei-psirt\" @@ -149848,10 +146759,8 @@ def index_huawei_psirt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149904,8 +146813,7 @@ def index_huawei_psirt_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149949,8 +146857,7 @@ def _index_huawei_psirt_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149963,7 +146870,10 @@ def _index_huawei_psirt_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -150047,13 +146957,9 @@ def _index_huawei_psirt_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -150136,8 +147042,7 @@ def index_iava_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150155,7 +147060,7 @@ def index_iava_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: """Return vulnerability data stored in index \"iava\" @@ -150195,10 +147100,8 @@ def index_iava_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150251,8 +147154,7 @@ def index_iava_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150301,8 +147203,7 @@ def index_iava_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150320,7 +147221,7 @@ def index_iava_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: """Return vulnerability data stored in index \"iava\" @@ -150360,10 +147261,8 @@ def index_iava_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150416,8 +147315,7 @@ def index_iava_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150466,8 +147364,7 @@ def index_iava_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150485,7 +147382,7 @@ def index_iava_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"iava\" @@ -150525,10 +147422,8 @@ def index_iava_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150581,8 +147476,7 @@ def index_iava_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150626,8 +147520,7 @@ def _index_iava_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150640,7 +147533,10 @@ def _index_iava_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -150724,13 +147620,9 @@ def _index_iava_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -150813,8 +147705,7 @@ def index_ibm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150832,7 +147723,7 @@ def index_ibm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: """Return vulnerability data stored in index \"ibm\" @@ -150872,10 +147763,8 @@ def index_ibm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150928,8 +147817,7 @@ def index_ibm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150978,8 +147866,7 @@ def index_ibm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150997,7 +147884,7 @@ def index_ibm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: """Return vulnerability data stored in index \"ibm\" @@ -151037,10 +147924,8 @@ def index_ibm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151093,8 +147978,7 @@ def index_ibm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151143,8 +148027,7 @@ def index_ibm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151162,7 +148045,7 @@ def index_ibm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ibm\" @@ -151202,10 +148085,8 @@ def index_ibm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151258,8 +148139,7 @@ def index_ibm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151303,8 +148183,7 @@ def _index_ibm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151317,7 +148196,10 @@ def _index_ibm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -151401,13 +148283,9 @@ def _index_ibm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -151490,8 +148368,7 @@ def index_idemia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151509,7 +148386,7 @@ def index_idemia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: """Return vulnerability data stored in index \"idemia\" @@ -151549,10 +148426,8 @@ def index_idemia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151605,8 +148480,7 @@ def index_idemia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151655,8 +148529,7 @@ def index_idemia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151674,7 +148547,7 @@ def index_idemia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: """Return vulnerability data stored in index \"idemia\" @@ -151714,10 +148587,8 @@ def index_idemia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151770,8 +148641,7 @@ def index_idemia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151820,8 +148690,7 @@ def index_idemia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151839,7 +148708,7 @@ def index_idemia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"idemia\" @@ -151879,10 +148748,8 @@ def index_idemia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151935,8 +148802,7 @@ def index_idemia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151980,8 +148846,7 @@ def _index_idemia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151994,7 +148859,10 @@ def _index_idemia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -152078,13 +148946,9 @@ def _index_idemia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -152167,8 +149031,7 @@ def index_igel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152186,7 +149049,7 @@ def index_igel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: """Return vulnerability data stored in index \"igel\" @@ -152226,10 +149089,8 @@ def index_igel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152282,8 +149143,7 @@ def index_igel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152332,8 +149192,7 @@ def index_igel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152351,7 +149210,7 @@ def index_igel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: """Return vulnerability data stored in index \"igel\" @@ -152391,10 +149250,8 @@ def index_igel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152447,8 +149304,7 @@ def index_igel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152497,8 +149353,7 @@ def index_igel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152516,7 +149371,7 @@ def index_igel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"igel\" @@ -152556,10 +149411,8 @@ def index_igel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152612,8 +149465,7 @@ def index_igel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152657,8 +149509,7 @@ def _index_igel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152671,7 +149522,10 @@ def _index_igel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -152755,13 +149609,9 @@ def _index_igel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -152844,8 +149694,7 @@ def index_il_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152863,7 +149712,7 @@ def index_il_alerts_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: """Return vulnerability data stored in index \"il-alerts\" @@ -152903,10 +149752,8 @@ def index_il_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152959,8 +149806,7 @@ def index_il_alerts_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153009,8 +149855,7 @@ def index_il_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153028,7 +149873,7 @@ def index_il_alerts_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: """Return vulnerability data stored in index \"il-alerts\" @@ -153068,10 +149913,8 @@ def index_il_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153124,8 +149967,7 @@ def index_il_alerts_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153174,8 +150016,7 @@ def index_il_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153193,7 +150034,7 @@ def index_il_alerts_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"il-alerts\" @@ -153233,10 +150074,8 @@ def index_il_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153289,8 +150128,7 @@ def index_il_alerts_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153334,8 +150172,7 @@ def _index_il_alerts_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -153348,7 +150185,10 @@ def _index_il_alerts_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -153432,13 +150272,9 @@ def _index_il_alerts_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -153521,8 +150357,7 @@ def index_il_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153540,7 +150375,7 @@ def index_il_vulnerabilities_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153580,10 +150415,8 @@ def index_il_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153636,8 +150469,7 @@ def index_il_vulnerabilities_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153686,8 +150518,7 @@ def index_il_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153705,7 +150536,7 @@ def index_il_vulnerabilities_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153745,10 +150576,8 @@ def index_il_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153801,8 +150630,7 @@ def index_il_vulnerabilities_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153851,8 +150679,7 @@ def index_il_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153870,7 +150697,7 @@ def index_il_vulnerabilities_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"il-vulnerabilities\" @@ -153910,10 +150737,8 @@ def index_il_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153966,8 +150791,7 @@ def index_il_vulnerabilities_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154011,8 +150835,7 @@ def _index_il_vulnerabilities_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154025,7 +150848,10 @@ def _index_il_vulnerabilities_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -154109,13 +150935,9 @@ def _index_il_vulnerabilities_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -154198,8 +151020,7 @@ def index_incibe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154217,7 +151038,7 @@ def index_incibe_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: """Return vulnerability data stored in index \"incibe\" @@ -154257,10 +151078,8 @@ def index_incibe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154313,8 +151132,7 @@ def index_incibe_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154363,8 +151181,7 @@ def index_incibe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154382,7 +151199,7 @@ def index_incibe_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"incibe\" @@ -154422,10 +151239,8 @@ def index_incibe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154478,8 +151293,7 @@ def index_incibe_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154528,8 +151342,7 @@ def index_incibe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154547,7 +151360,7 @@ def index_incibe_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"incibe\" @@ -154587,10 +151400,8 @@ def index_incibe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154643,8 +151454,7 @@ def index_incibe_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154688,8 +151498,7 @@ def _index_incibe_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154702,7 +151511,10 @@ def _index_incibe_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -154786,13 +151598,9 @@ def _index_incibe_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -154875,8 +151683,7 @@ def index_initial_access_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154894,7 +151701,7 @@ def index_initial_access_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: """Return vulnerability data stored in index \"initial-access\" @@ -154934,10 +151741,8 @@ def index_initial_access_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154990,8 +151795,7 @@ def index_initial_access_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155040,8 +151844,7 @@ def index_initial_access_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155059,7 +151862,7 @@ def index_initial_access_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: """Return vulnerability data stored in index \"initial-access\" @@ -155099,10 +151902,8 @@ def index_initial_access_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155155,8 +151956,7 @@ def index_initial_access_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155205,8 +152005,7 @@ def index_initial_access_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155224,7 +152023,7 @@ def index_initial_access_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"initial-access\" @@ -155264,10 +152063,8 @@ def index_initial_access_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155320,8 +152117,7 @@ def index_initial_access_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155365,8 +152161,7 @@ def _index_initial_access_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -155379,7 +152174,10 @@ def _index_initial_access_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -155463,13 +152261,9 @@ def _index_initial_access_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -155552,8 +152346,7 @@ def index_initial_access_git_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155571,7 +152364,7 @@ def index_initial_access_git_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: """Return vulnerability data stored in index \"initial-access-git\" @@ -155611,10 +152404,8 @@ def index_initial_access_git_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155667,8 +152458,7 @@ def index_initial_access_git_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155717,8 +152507,7 @@ def index_initial_access_git_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155736,7 +152525,7 @@ def index_initial_access_git_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: """Return vulnerability data stored in index \"initial-access-git\" @@ -155776,10 +152565,8 @@ def index_initial_access_git_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155832,8 +152619,7 @@ def index_initial_access_git_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155882,8 +152668,7 @@ def index_initial_access_git_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155901,7 +152686,7 @@ def index_initial_access_git_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"initial-access-git\" @@ -155941,10 +152726,8 @@ def index_initial_access_git_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155997,8 +152780,7 @@ def index_initial_access_git_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156042,8 +152824,7 @@ def _index_initial_access_git_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156056,7 +152837,10 @@ def _index_initial_access_git_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -156140,13 +152924,9 @@ def _index_initial_access_git_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -156229,8 +153009,7 @@ def index_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156248,7 +153027,7 @@ def index_intel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: """Return vulnerability data stored in index \"intel\" @@ -156288,10 +153067,8 @@ def index_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156344,8 +153121,7 @@ def index_intel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156394,8 +153170,7 @@ def index_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156413,7 +153188,7 @@ def index_intel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: """Return vulnerability data stored in index \"intel\" @@ -156453,10 +153228,8 @@ def index_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156509,8 +153282,7 @@ def index_intel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156559,8 +153331,7 @@ def index_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156578,7 +153349,7 @@ def index_intel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"intel\" @@ -156618,10 +153389,8 @@ def index_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156674,8 +153443,7 @@ def index_intel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156719,8 +153487,7 @@ def _index_intel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156733,7 +153500,10 @@ def _index_intel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -156817,13 +153587,9 @@ def _index_intel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -156911,8 +153677,7 @@ def index_ipintel10d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156930,7 +153695,7 @@ def index_ipintel10d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-10d\" @@ -156980,10 +153745,8 @@ def index_ipintel10d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157041,8 +153804,7 @@ def index_ipintel10d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157096,8 +153858,7 @@ def index_ipintel10d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157115,7 +153876,7 @@ def index_ipintel10d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-10d\" @@ -157165,10 +153926,8 @@ def index_ipintel10d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157226,8 +153985,7 @@ def index_ipintel10d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157281,8 +154039,7 @@ def index_ipintel10d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157300,7 +154057,7 @@ def index_ipintel10d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-10d\" @@ -157350,10 +154107,8 @@ def index_ipintel10d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157411,8 +154166,7 @@ def index_ipintel10d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157461,8 +154215,7 @@ def _index_ipintel10d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -157475,7 +154228,10 @@ def _index_ipintel10d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -157579,13 +154335,9 @@ def _index_ipintel10d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -157673,8 +154425,7 @@ def index_ipintel30d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157692,7 +154443,7 @@ def index_ipintel30d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-30d\" @@ -157742,10 +154493,8 @@ def index_ipintel30d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157803,8 +154552,7 @@ def index_ipintel30d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157858,8 +154606,7 @@ def index_ipintel30d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157877,7 +154624,7 @@ def index_ipintel30d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-30d\" @@ -157927,10 +154674,8 @@ def index_ipintel30d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157988,8 +154733,7 @@ def index_ipintel30d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158043,8 +154787,7 @@ def index_ipintel30d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158062,7 +154805,7 @@ def index_ipintel30d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-30d\" @@ -158112,10 +154855,8 @@ def index_ipintel30d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158173,8 +154914,7 @@ def index_ipintel30d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158223,8 +154963,7 @@ def _index_ipintel30d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158237,7 +154976,10 @@ def _index_ipintel30d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -158341,13 +155083,9 @@ def _index_ipintel30d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -158435,8 +155173,7 @@ def index_ipintel3d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158454,7 +155191,7 @@ def index_ipintel3d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158504,10 +155241,8 @@ def index_ipintel3d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158565,8 +155300,7 @@ def index_ipintel3d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158620,8 +155354,7 @@ def index_ipintel3d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158639,7 +155372,7 @@ def index_ipintel3d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158689,10 +155422,8 @@ def index_ipintel3d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158750,8 +155481,7 @@ def index_ipintel3d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158805,8 +155535,7 @@ def index_ipintel3d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158824,7 +155553,7 @@ def index_ipintel3d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-3d\" @@ -158874,10 +155603,8 @@ def index_ipintel3d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158935,8 +155662,7 @@ def index_ipintel3d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158985,8 +155711,7 @@ def _index_ipintel3d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158999,7 +155724,10 @@ def _index_ipintel3d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -159103,13 +155831,9 @@ def _index_ipintel3d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -159197,8 +155921,7 @@ def index_ipintel90d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159216,7 +155939,7 @@ def index_ipintel90d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159266,10 +155989,8 @@ def index_ipintel90d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159327,8 +156048,7 @@ def index_ipintel90d_get( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159382,8 +156102,7 @@ def index_ipintel90d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159401,7 +156120,7 @@ def index_ipintel90d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159451,10 +156170,8 @@ def index_ipintel90d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159512,8 +156229,7 @@ def index_ipintel90d_get_with_http_info( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159567,8 +156283,7 @@ def index_ipintel90d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159586,7 +156301,7 @@ def index_ipintel90d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ipintel-90d\" @@ -159636,10 +156351,8 @@ def index_ipintel90d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159697,8 +156410,7 @@ def index_ipintel90d_get_without_preload_content( kind=kind, hostname=hostname, matches=matches, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159747,8 +156459,7 @@ def _index_ipintel90d_get_serialize( kind, hostname, matches, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159761,7 +156472,10 @@ def _index_ipintel90d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -159865,13 +156579,9 @@ def _index_ipintel90d_get_serialize( _query_params.append(('matches', matches)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -159954,8 +156664,7 @@ def index_istio_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159973,7 +156682,7 @@ def index_istio_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: """Return vulnerability data stored in index \"istio\" @@ -160013,10 +156722,8 @@ def index_istio_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160069,8 +156776,7 @@ def index_istio_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160119,8 +156825,7 @@ def index_istio_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160138,7 +156843,7 @@ def index_istio_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: """Return vulnerability data stored in index \"istio\" @@ -160178,10 +156883,8 @@ def index_istio_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160234,8 +156937,7 @@ def index_istio_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160284,8 +156986,7 @@ def index_istio_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160303,7 +157004,7 @@ def index_istio_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"istio\" @@ -160343,10 +157044,8 @@ def index_istio_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160399,8 +157098,7 @@ def index_istio_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160444,8 +157142,7 @@ def _index_istio_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -160458,7 +157155,10 @@ def _index_istio_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -160542,13 +157242,9 @@ def _index_istio_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -160631,8 +157327,7 @@ def index_ivanti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160650,7 +157345,7 @@ def index_ivanti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: """Return vulnerability data stored in index \"ivanti\" @@ -160690,10 +157385,8 @@ def index_ivanti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160746,8 +157439,7 @@ def index_ivanti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160796,8 +157488,7 @@ def index_ivanti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160815,7 +157506,7 @@ def index_ivanti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: """Return vulnerability data stored in index \"ivanti\" @@ -160855,10 +157546,8 @@ def index_ivanti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160911,8 +157600,7 @@ def index_ivanti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160961,8 +157649,7 @@ def index_ivanti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160980,7 +157667,7 @@ def index_ivanti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ivanti\" @@ -161020,10 +157707,8 @@ def index_ivanti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161076,8 +157761,7 @@ def index_ivanti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161121,8 +157805,7 @@ def _index_ivanti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161135,7 +157818,10 @@ def _index_ivanti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -161219,13 +157905,9 @@ def _index_ivanti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -161308,8 +157990,7 @@ def index_ivanti_rss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161327,7 +158008,7 @@ def index_ivanti_rss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161367,10 +158048,8 @@ def index_ivanti_rss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161423,8 +158102,7 @@ def index_ivanti_rss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161473,8 +158151,7 @@ def index_ivanti_rss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161492,7 +158169,7 @@ def index_ivanti_rss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161532,10 +158209,8 @@ def index_ivanti_rss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161588,8 +158263,7 @@ def index_ivanti_rss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161638,8 +158312,7 @@ def index_ivanti_rss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161657,7 +158330,7 @@ def index_ivanti_rss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ivanti-rss\" @@ -161697,10 +158370,8 @@ def index_ivanti_rss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161753,8 +158424,7 @@ def index_ivanti_rss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161798,8 +158468,7 @@ def _index_ivanti_rss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161812,7 +158481,10 @@ def _index_ivanti_rss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -161896,13 +158568,9 @@ def _index_ivanti_rss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -161985,8 +158653,7 @@ def index_jenkins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162004,7 +158671,7 @@ def index_jenkins_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: """Return vulnerability data stored in index \"jenkins\" @@ -162044,10 +158711,8 @@ def index_jenkins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162100,8 +158765,7 @@ def index_jenkins_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162150,8 +158814,7 @@ def index_jenkins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162169,7 +158832,7 @@ def index_jenkins_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: """Return vulnerability data stored in index \"jenkins\" @@ -162209,10 +158872,8 @@ def index_jenkins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162265,8 +158926,7 @@ def index_jenkins_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162315,8 +158975,7 @@ def index_jenkins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162334,7 +158993,7 @@ def index_jenkins_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jenkins\" @@ -162374,10 +159033,8 @@ def index_jenkins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162430,8 +159087,7 @@ def index_jenkins_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162475,8 +159131,7 @@ def _index_jenkins_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -162489,7 +159144,10 @@ def _index_jenkins_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -162573,13 +159231,9 @@ def _index_jenkins_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -162662,8 +159316,7 @@ def index_jetbrains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162681,7 +159334,7 @@ def index_jetbrains_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: """Return vulnerability data stored in index \"jetbrains\" @@ -162721,10 +159374,8 @@ def index_jetbrains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162777,8 +159428,7 @@ def index_jetbrains_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162827,8 +159477,7 @@ def index_jetbrains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162846,7 +159495,7 @@ def index_jetbrains_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: """Return vulnerability data stored in index \"jetbrains\" @@ -162886,10 +159535,8 @@ def index_jetbrains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162942,8 +159589,7 @@ def index_jetbrains_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162992,8 +159638,7 @@ def index_jetbrains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163011,7 +159656,7 @@ def index_jetbrains_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jetbrains\" @@ -163051,10 +159696,8 @@ def index_jetbrains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163107,8 +159750,7 @@ def index_jetbrains_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163152,8 +159794,7 @@ def _index_jetbrains_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163166,7 +159807,10 @@ def _index_jetbrains_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -163250,13 +159894,9 @@ def _index_jetbrains_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -163339,8 +159979,7 @@ def index_jfrog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163358,7 +159997,7 @@ def index_jfrog_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: """Return vulnerability data stored in index \"jfrog\" @@ -163398,10 +160037,8 @@ def index_jfrog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163454,8 +160091,7 @@ def index_jfrog_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163504,8 +160140,7 @@ def index_jfrog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163523,7 +160158,7 @@ def index_jfrog_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: """Return vulnerability data stored in index \"jfrog\" @@ -163563,10 +160198,8 @@ def index_jfrog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163619,8 +160252,7 @@ def index_jfrog_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163669,8 +160301,7 @@ def index_jfrog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163688,7 +160319,7 @@ def index_jfrog_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jfrog\" @@ -163728,10 +160359,8 @@ def index_jfrog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163784,8 +160413,7 @@ def index_jfrog_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163829,8 +160457,7 @@ def _index_jfrog_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163843,7 +160470,10 @@ def _index_jfrog_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -163927,13 +160557,9 @@ def _index_jfrog_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -164016,8 +160642,7 @@ def index_jnj_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164035,7 +160660,7 @@ def index_jnj_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: """Return vulnerability data stored in index \"jnj\" @@ -164075,10 +160700,8 @@ def index_jnj_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164131,8 +160754,7 @@ def index_jnj_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164181,8 +160803,7 @@ def index_jnj_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164200,7 +160821,7 @@ def index_jnj_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"jnj\" @@ -164240,10 +160861,8 @@ def index_jnj_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164296,8 +160915,7 @@ def index_jnj_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164346,8 +160964,7 @@ def index_jnj_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164365,7 +160982,7 @@ def index_jnj_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jnj\" @@ -164405,10 +161022,8 @@ def index_jnj_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164461,8 +161076,7 @@ def index_jnj_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164506,8 +161120,7 @@ def _index_jnj_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -164520,7 +161133,10 @@ def _index_jnj_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -164604,13 +161220,9 @@ def _index_jnj_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -164693,8 +161305,7 @@ def index_johnson_controls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164712,7 +161323,7 @@ def index_johnson_controls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: """Return vulnerability data stored in index \"johnson-controls\" @@ -164752,10 +161363,8 @@ def index_johnson_controls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164808,8 +161417,7 @@ def index_johnson_controls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164858,8 +161466,7 @@ def index_johnson_controls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164877,7 +161484,7 @@ def index_johnson_controls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: """Return vulnerability data stored in index \"johnson-controls\" @@ -164917,10 +161524,8 @@ def index_johnson_controls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164973,8 +161578,7 @@ def index_johnson_controls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165023,8 +161627,7 @@ def index_johnson_controls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165042,7 +161645,7 @@ def index_johnson_controls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"johnson-controls\" @@ -165082,10 +161685,8 @@ def index_johnson_controls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165138,8 +161739,7 @@ def index_johnson_controls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165183,8 +161783,7 @@ def _index_johnson_controls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165197,7 +161796,10 @@ def _index_johnson_controls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -165281,13 +161883,9 @@ def _index_johnson_controls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -165370,8 +161968,7 @@ def index_juniper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165389,7 +161986,7 @@ def index_juniper_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: """Return vulnerability data stored in index \"juniper\" @@ -165429,10 +162026,8 @@ def index_juniper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165485,8 +162080,7 @@ def index_juniper_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165535,8 +162129,7 @@ def index_juniper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165554,7 +162147,7 @@ def index_juniper_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: """Return vulnerability data stored in index \"juniper\" @@ -165594,10 +162187,8 @@ def index_juniper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165650,8 +162241,7 @@ def index_juniper_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165700,8 +162290,7 @@ def index_juniper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165719,7 +162308,7 @@ def index_juniper_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"juniper\" @@ -165759,10 +162348,8 @@ def index_juniper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165815,8 +162402,7 @@ def index_juniper_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165860,8 +162446,7 @@ def _index_juniper_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165874,7 +162459,10 @@ def _index_juniper_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -165958,13 +162546,9 @@ def _index_juniper_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -166047,8 +162631,7 @@ def index_jvn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166066,7 +162649,7 @@ def index_jvn_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: """Return vulnerability data stored in index \"jvn\" @@ -166106,10 +162689,8 @@ def index_jvn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166162,8 +162743,7 @@ def index_jvn_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166212,8 +162792,7 @@ def index_jvn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166231,7 +162810,7 @@ def index_jvn_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: """Return vulnerability data stored in index \"jvn\" @@ -166271,10 +162850,8 @@ def index_jvn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166327,8 +162904,7 @@ def index_jvn_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166377,8 +162953,7 @@ def index_jvn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166396,7 +162971,7 @@ def index_jvn_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jvn\" @@ -166436,10 +163011,8 @@ def index_jvn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166492,8 +163065,7 @@ def index_jvn_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166537,8 +163109,7 @@ def _index_jvn_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -166551,7 +163122,10 @@ def _index_jvn_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -166635,13 +163209,9 @@ def _index_jvn_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -166724,8 +163294,7 @@ def index_jvndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166743,7 +163312,7 @@ def index_jvndb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: """Return vulnerability data stored in index \"jvndb\" @@ -166783,10 +163352,8 @@ def index_jvndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166839,8 +163406,7 @@ def index_jvndb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166889,8 +163455,7 @@ def index_jvndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166908,7 +163473,7 @@ def index_jvndb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: """Return vulnerability data stored in index \"jvndb\" @@ -166948,10 +163513,8 @@ def index_jvndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167004,8 +163567,7 @@ def index_jvndb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167054,8 +163616,7 @@ def index_jvndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167073,7 +163634,7 @@ def index_jvndb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"jvndb\" @@ -167113,10 +163674,8 @@ def index_jvndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167169,8 +163728,7 @@ def index_jvndb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167214,8 +163772,7 @@ def _index_jvndb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167228,7 +163785,10 @@ def _index_jvndb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -167312,13 +163872,9 @@ def _index_jvndb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -167401,8 +163957,7 @@ def index_kaspersky_ics_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167420,7 +163975,7 @@ def index_kaspersky_ics_cert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167460,10 +164015,8 @@ def index_kaspersky_ics_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167516,8 +164069,7 @@ def index_kaspersky_ics_cert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167566,8 +164118,7 @@ def index_kaspersky_ics_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167585,7 +164136,7 @@ def index_kaspersky_ics_cert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167625,10 +164176,8 @@ def index_kaspersky_ics_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167681,8 +164230,7 @@ def index_kaspersky_ics_cert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167731,8 +164279,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167750,7 +164297,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -167790,10 +164337,8 @@ def index_kaspersky_ics_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167846,8 +164391,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167891,8 +164435,7 @@ def _index_kaspersky_ics_cert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167905,7 +164448,10 @@ def _index_kaspersky_ics_cert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -167989,13 +164535,9 @@ def _index_kaspersky_ics_cert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -168078,8 +164620,7 @@ def index_korelogic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168097,7 +164638,7 @@ def index_korelogic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: """Return vulnerability data stored in index \"korelogic\" @@ -168137,10 +164678,8 @@ def index_korelogic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168193,8 +164732,7 @@ def index_korelogic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168243,8 +164781,7 @@ def index_korelogic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168262,7 +164799,7 @@ def index_korelogic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: """Return vulnerability data stored in index \"korelogic\" @@ -168302,10 +164839,8 @@ def index_korelogic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168358,8 +164893,7 @@ def index_korelogic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168408,8 +164942,7 @@ def index_korelogic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168427,7 +164960,7 @@ def index_korelogic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"korelogic\" @@ -168467,10 +165000,8 @@ def index_korelogic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168523,8 +165054,7 @@ def index_korelogic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168568,8 +165098,7 @@ def _index_korelogic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -168582,7 +165111,10 @@ def _index_korelogic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -168666,13 +165198,9 @@ def _index_korelogic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -168755,8 +165283,7 @@ def index_krcert_security_notices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168774,7 +165301,7 @@ def index_krcert_security_notices_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -168814,10 +165341,8 @@ def index_krcert_security_notices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168870,8 +165395,7 @@ def index_krcert_security_notices_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168920,8 +165444,7 @@ def index_krcert_security_notices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168939,7 +165462,7 @@ def index_krcert_security_notices_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -168979,10 +165502,8 @@ def index_krcert_security_notices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169035,8 +165556,7 @@ def index_krcert_security_notices_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169085,8 +165605,7 @@ def index_krcert_security_notices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169104,7 +165623,7 @@ def index_krcert_security_notices_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"krcert-security-notices\" @@ -169144,10 +165663,8 @@ def index_krcert_security_notices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169200,8 +165717,7 @@ def index_krcert_security_notices_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169245,8 +165761,7 @@ def _index_krcert_security_notices_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169259,7 +165774,10 @@ def _index_krcert_security_notices_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -169343,13 +165861,9 @@ def _index_krcert_security_notices_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -169432,8 +165946,7 @@ def index_krcert_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169451,7 +165964,7 @@ def index_krcert_vulnerabilities_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169491,10 +166004,8 @@ def index_krcert_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169547,8 +166058,7 @@ def index_krcert_vulnerabilities_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169597,8 +166107,7 @@ def index_krcert_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169616,7 +166125,7 @@ def index_krcert_vulnerabilities_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169656,10 +166165,8 @@ def index_krcert_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169712,8 +166219,7 @@ def index_krcert_vulnerabilities_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169762,8 +166268,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169781,7 +166286,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -169821,10 +166326,8 @@ def index_krcert_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169877,8 +166380,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169922,8 +166424,7 @@ def _index_krcert_vulnerabilities_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169936,7 +166437,10 @@ def _index_krcert_vulnerabilities_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -170020,13 +166524,9 @@ def _index_krcert_vulnerabilities_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -170109,8 +166609,7 @@ def index_kubernetes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170128,7 +166627,7 @@ def index_kubernetes_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: """Return vulnerability data stored in index \"kubernetes\" @@ -170168,10 +166667,8 @@ def index_kubernetes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170224,8 +166721,7 @@ def index_kubernetes_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170274,8 +166770,7 @@ def index_kubernetes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170293,7 +166788,7 @@ def index_kubernetes_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: """Return vulnerability data stored in index \"kubernetes\" @@ -170333,10 +166828,8 @@ def index_kubernetes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170389,8 +166882,7 @@ def index_kubernetes_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170439,8 +166931,7 @@ def index_kubernetes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170458,7 +166949,7 @@ def index_kubernetes_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kubernetes\" @@ -170498,10 +166989,8 @@ def index_kubernetes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170554,8 +167043,7 @@ def index_kubernetes_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170599,8 +167087,7 @@ def _index_kubernetes_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170613,7 +167100,10 @@ def _index_kubernetes_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -170697,13 +167187,9 @@ def _index_kubernetes_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -170786,8 +167272,7 @@ def index_kunbus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170805,7 +167290,7 @@ def index_kunbus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: """Return vulnerability data stored in index \"kunbus\" @@ -170845,10 +167330,8 @@ def index_kunbus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170901,8 +167384,7 @@ def index_kunbus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170951,8 +167433,7 @@ def index_kunbus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170970,7 +167451,7 @@ def index_kunbus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: """Return vulnerability data stored in index \"kunbus\" @@ -171010,10 +167491,8 @@ def index_kunbus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171066,8 +167545,7 @@ def index_kunbus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171116,8 +167594,7 @@ def index_kunbus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171135,7 +167612,7 @@ def index_kunbus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"kunbus\" @@ -171175,10 +167652,8 @@ def index_kunbus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171231,8 +167706,7 @@ def index_kunbus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171276,8 +167750,7 @@ def _index_kunbus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171290,7 +167763,10 @@ def _index_kunbus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -171374,13 +167850,9 @@ def _index_kunbus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -171463,8 +167935,7 @@ def index_lantronix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171482,7 +167953,7 @@ def index_lantronix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: """Return vulnerability data stored in index \"lantronix\" @@ -171522,10 +167993,8 @@ def index_lantronix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171578,8 +168047,7 @@ def index_lantronix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171628,8 +168096,7 @@ def index_lantronix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171647,7 +168114,7 @@ def index_lantronix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: """Return vulnerability data stored in index \"lantronix\" @@ -171687,10 +168154,8 @@ def index_lantronix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171743,8 +168208,7 @@ def index_lantronix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171793,8 +168257,7 @@ def index_lantronix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171812,7 +168275,7 @@ def index_lantronix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lantronix\" @@ -171852,10 +168315,8 @@ def index_lantronix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171908,8 +168369,7 @@ def index_lantronix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171953,8 +168413,7 @@ def _index_lantronix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171967,7 +168426,10 @@ def _index_lantronix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -172051,13 +168513,9 @@ def _index_lantronix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -172140,8 +168598,7 @@ def index_lenovo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172159,7 +168616,7 @@ def index_lenovo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: """Return vulnerability data stored in index \"lenovo\" @@ -172199,10 +168656,8 @@ def index_lenovo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172255,8 +168710,7 @@ def index_lenovo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172305,8 +168759,7 @@ def index_lenovo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172324,7 +168777,7 @@ def index_lenovo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: """Return vulnerability data stored in index \"lenovo\" @@ -172364,10 +168817,8 @@ def index_lenovo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172420,8 +168871,7 @@ def index_lenovo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172470,8 +168920,7 @@ def index_lenovo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172489,7 +168938,7 @@ def index_lenovo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lenovo\" @@ -172529,10 +168978,8 @@ def index_lenovo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172585,8 +169032,7 @@ def index_lenovo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172630,8 +169076,7 @@ def _index_lenovo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172644,7 +169089,10 @@ def _index_lenovo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -172728,13 +169176,9 @@ def _index_lenovo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -172817,8 +169261,7 @@ def index_lexmark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172836,7 +169279,7 @@ def index_lexmark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: """Return vulnerability data stored in index \"lexmark\" @@ -172876,10 +169319,8 @@ def index_lexmark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172932,8 +169373,7 @@ def index_lexmark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172982,8 +169422,7 @@ def index_lexmark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173001,7 +169440,7 @@ def index_lexmark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"lexmark\" @@ -173041,10 +169480,8 @@ def index_lexmark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173097,8 +169534,7 @@ def index_lexmark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173147,8 +169583,7 @@ def index_lexmark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173166,7 +169601,7 @@ def index_lexmark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lexmark\" @@ -173206,10 +169641,8 @@ def index_lexmark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173262,8 +169695,7 @@ def index_lexmark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173307,8 +169739,7 @@ def _index_lexmark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173321,7 +169752,10 @@ def _index_lexmark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -173405,13 +169839,9 @@ def _index_lexmark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -173494,8 +169924,7 @@ def index_lg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173513,7 +169942,7 @@ def index_lg_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: """Return vulnerability data stored in index \"lg\" @@ -173553,10 +169982,8 @@ def index_lg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173609,8 +170036,7 @@ def index_lg_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173659,8 +170085,7 @@ def index_lg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173678,7 +170103,7 @@ def index_lg_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: """Return vulnerability data stored in index \"lg\" @@ -173718,10 +170143,8 @@ def index_lg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173774,8 +170197,7 @@ def index_lg_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173824,8 +170246,7 @@ def index_lg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173843,7 +170264,7 @@ def index_lg_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lg\" @@ -173883,10 +170304,8 @@ def index_lg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173939,8 +170358,7 @@ def index_lg_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173984,8 +170402,7 @@ def _index_lg_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173998,7 +170415,10 @@ def _index_lg_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -174082,13 +170502,9 @@ def _index_lg_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -174171,8 +170587,7 @@ def index_libre_office_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174190,7 +170605,7 @@ def index_libre_office_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: """Return vulnerability data stored in index \"libre-office\" @@ -174230,10 +170645,8 @@ def index_libre_office_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174286,8 +170699,7 @@ def index_libre_office_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174336,8 +170748,7 @@ def index_libre_office_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174355,7 +170766,7 @@ def index_libre_office_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: """Return vulnerability data stored in index \"libre-office\" @@ -174395,10 +170806,8 @@ def index_libre_office_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174451,8 +170860,7 @@ def index_libre_office_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174501,8 +170909,7 @@ def index_libre_office_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174520,7 +170927,7 @@ def index_libre_office_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"libre-office\" @@ -174560,10 +170967,8 @@ def index_libre_office_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174616,8 +171021,7 @@ def index_libre_office_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174661,8 +171065,7 @@ def _index_libre_office_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174675,7 +171078,10 @@ def _index_libre_office_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -174759,13 +171165,9 @@ def _index_libre_office_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -174848,8 +171250,7 @@ def index_linux_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174867,7 +171268,7 @@ def index_linux_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: """Return vulnerability data stored in index \"linux\" @@ -174907,10 +171308,8 @@ def index_linux_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174963,8 +171362,7 @@ def index_linux_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175013,8 +171411,7 @@ def index_linux_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175032,7 +171429,7 @@ def index_linux_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: """Return vulnerability data stored in index \"linux\" @@ -175072,10 +171469,8 @@ def index_linux_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175128,8 +171523,7 @@ def index_linux_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175178,8 +171572,7 @@ def index_linux_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175197,7 +171590,7 @@ def index_linux_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"linux\" @@ -175237,10 +171630,8 @@ def index_linux_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175293,8 +171684,7 @@ def index_linux_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175338,8 +171728,7 @@ def _index_linux_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -175352,7 +171741,10 @@ def _index_linux_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -175436,13 +171828,9 @@ def _index_linux_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -175525,8 +171913,7 @@ def index_lol_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175544,7 +171931,7 @@ def index_lol_advs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: """Return vulnerability data stored in index \"lol-advs\" @@ -175584,10 +171971,8 @@ def index_lol_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175640,8 +172025,7 @@ def index_lol_advs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175690,8 +172074,7 @@ def index_lol_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175709,7 +172092,7 @@ def index_lol_advs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: """Return vulnerability data stored in index \"lol-advs\" @@ -175749,10 +172132,8 @@ def index_lol_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175805,8 +172186,7 @@ def index_lol_advs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175855,8 +172235,7 @@ def index_lol_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175874,7 +172253,7 @@ def index_lol_advs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"lol-advs\" @@ -175914,10 +172293,8 @@ def index_lol_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175970,8 +172347,7 @@ def index_lol_advs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176015,8 +172391,7 @@ def _index_lol_advs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176029,7 +172404,10 @@ def _index_lol_advs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -176113,13 +172491,9 @@ def _index_lol_advs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -176202,8 +172576,7 @@ def index_m_files_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176221,7 +172594,7 @@ def index_m_files_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: """Return vulnerability data stored in index \"m-files\" @@ -176261,10 +172634,8 @@ def index_m_files_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176317,8 +172688,7 @@ def index_m_files_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176367,8 +172737,7 @@ def index_m_files_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176386,7 +172755,7 @@ def index_m_files_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: """Return vulnerability data stored in index \"m-files\" @@ -176426,10 +172795,8 @@ def index_m_files_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176482,8 +172849,7 @@ def index_m_files_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176532,8 +172898,7 @@ def index_m_files_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176551,7 +172916,7 @@ def index_m_files_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"m-files\" @@ -176591,10 +172956,8 @@ def index_m_files_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176647,8 +173010,7 @@ def index_m_files_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176692,8 +173054,7 @@ def _index_m_files_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176706,7 +173067,10 @@ def _index_m_files_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -176790,13 +173154,9 @@ def _index_m_files_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -176879,8 +173239,7 @@ def index_macert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176898,7 +173257,7 @@ def index_macert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: """Return vulnerability data stored in index \"macert\" @@ -176938,10 +173297,8 @@ def index_macert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176994,8 +173351,7 @@ def index_macert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177044,8 +173400,7 @@ def index_macert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177063,7 +173418,7 @@ def index_macert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: """Return vulnerability data stored in index \"macert\" @@ -177103,10 +173458,8 @@ def index_macert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177159,8 +173512,7 @@ def index_macert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177209,8 +173561,7 @@ def index_macert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177228,7 +173579,7 @@ def index_macert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"macert\" @@ -177268,10 +173619,8 @@ def index_macert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177324,8 +173673,7 @@ def index_macert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177369,8 +173717,7 @@ def _index_macert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -177383,7 +173730,10 @@ def _index_macert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -177467,13 +173817,9 @@ def _index_macert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -177556,8 +173902,7 @@ def index_malicious_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177575,7 +173920,7 @@ def index_malicious_packages_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: """Return vulnerability data stored in index \"malicious-packages\" @@ -177615,10 +173960,8 @@ def index_malicious_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177671,8 +174014,7 @@ def index_malicious_packages_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177721,8 +174063,7 @@ def index_malicious_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177740,7 +174081,7 @@ def index_malicious_packages_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: """Return vulnerability data stored in index \"malicious-packages\" @@ -177780,10 +174121,8 @@ def index_malicious_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177836,8 +174175,7 @@ def index_malicious_packages_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177886,8 +174224,7 @@ def index_malicious_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177905,7 +174242,7 @@ def index_malicious_packages_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"malicious-packages\" @@ -177945,10 +174282,8 @@ def index_malicious_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178001,8 +174336,7 @@ def index_malicious_packages_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178046,8 +174380,7 @@ def _index_malicious_packages_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178060,7 +174393,10 @@ def _index_malicious_packages_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -178144,13 +174480,9 @@ def _index_malicious_packages_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -178233,8 +174565,7 @@ def index_manageengine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178252,7 +174583,7 @@ def index_manageengine_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: """Return vulnerability data stored in index \"manageengine\" @@ -178292,10 +174623,8 @@ def index_manageengine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178348,8 +174677,7 @@ def index_manageengine_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178398,8 +174726,7 @@ def index_manageengine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178417,7 +174744,7 @@ def index_manageengine_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"manageengine\" @@ -178457,10 +174784,8 @@ def index_manageengine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178513,8 +174838,7 @@ def index_manageengine_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178563,8 +174887,7 @@ def index_manageengine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178582,7 +174905,7 @@ def index_manageengine_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"manageengine\" @@ -178622,10 +174945,8 @@ def index_manageengine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178678,8 +174999,7 @@ def index_manageengine_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178723,8 +175043,7 @@ def _index_manageengine_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178737,7 +175056,10 @@ def _index_manageengine_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -178821,13 +175143,9 @@ def _index_manageengine_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -178910,8 +175228,7 @@ def index_maven_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178929,7 +175246,7 @@ def index_maven_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"maven\" @@ -178969,10 +175286,8 @@ def index_maven_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179025,8 +175340,7 @@ def index_maven_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179075,8 +175389,7 @@ def index_maven_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179094,7 +175407,7 @@ def index_maven_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"maven\" @@ -179134,10 +175447,8 @@ def index_maven_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179190,8 +175501,7 @@ def index_maven_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179240,8 +175550,7 @@ def index_maven_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179259,7 +175568,7 @@ def index_maven_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"maven\" @@ -179299,10 +175608,8 @@ def index_maven_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179355,8 +175662,7 @@ def index_maven_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179400,8 +175706,7 @@ def _index_maven_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -179414,7 +175719,10 @@ def _index_maven_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -179498,13 +175806,9 @@ def _index_maven_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -179587,8 +175891,7 @@ def index_mbed_tls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179606,7 +175909,7 @@ def index_mbed_tls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: """Return vulnerability data stored in index \"mbed-tls\" @@ -179646,10 +175949,8 @@ def index_mbed_tls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179702,8 +176003,7 @@ def index_mbed_tls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179752,8 +176052,7 @@ def index_mbed_tls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179771,7 +176070,7 @@ def index_mbed_tls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: """Return vulnerability data stored in index \"mbed-tls\" @@ -179811,10 +176110,8 @@ def index_mbed_tls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179867,8 +176164,7 @@ def index_mbed_tls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179917,8 +176213,7 @@ def index_mbed_tls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179936,7 +176231,7 @@ def index_mbed_tls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mbed-tls\" @@ -179976,10 +176271,8 @@ def index_mbed_tls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180032,8 +176325,7 @@ def index_mbed_tls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180077,8 +176369,7 @@ def _index_mbed_tls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180091,7 +176382,10 @@ def _index_mbed_tls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -180175,13 +176469,9 @@ def _index_mbed_tls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -180264,8 +176554,7 @@ def index_mcafee_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180283,7 +176572,7 @@ def index_mcafee_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: """Return vulnerability data stored in index \"mcafee\" @@ -180323,10 +176612,8 @@ def index_mcafee_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180379,8 +176666,7 @@ def index_mcafee_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180429,8 +176715,7 @@ def index_mcafee_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180448,7 +176733,7 @@ def index_mcafee_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: """Return vulnerability data stored in index \"mcafee\" @@ -180488,10 +176773,8 @@ def index_mcafee_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180544,8 +176827,7 @@ def index_mcafee_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180594,8 +176876,7 @@ def index_mcafee_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180613,7 +176894,7 @@ def index_mcafee_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mcafee\" @@ -180653,10 +176934,8 @@ def index_mcafee_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180709,8 +176988,7 @@ def index_mcafee_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180754,8 +177032,7 @@ def _index_mcafee_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180768,7 +177045,10 @@ def _index_mcafee_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -180852,13 +177132,9 @@ def _index_mcafee_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -180941,8 +177217,7 @@ def index_mediatek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180960,7 +177235,7 @@ def index_mediatek_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: """Return vulnerability data stored in index \"mediatek\" @@ -181000,10 +177275,8 @@ def index_mediatek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181056,8 +177329,7 @@ def index_mediatek_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181106,8 +177378,7 @@ def index_mediatek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181125,7 +177396,7 @@ def index_mediatek_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: """Return vulnerability data stored in index \"mediatek\" @@ -181165,10 +177436,8 @@ def index_mediatek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181221,8 +177490,7 @@ def index_mediatek_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181271,8 +177539,7 @@ def index_mediatek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181290,7 +177557,7 @@ def index_mediatek_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mediatek\" @@ -181330,10 +177597,8 @@ def index_mediatek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181386,8 +177651,7 @@ def index_mediatek_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181431,8 +177695,7 @@ def _index_mediatek_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -181445,7 +177708,10 @@ def _index_mediatek_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -181529,13 +177795,9 @@ def _index_mediatek_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -181618,8 +177880,7 @@ def index_medtronic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181637,7 +177898,7 @@ def index_medtronic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: """Return vulnerability data stored in index \"medtronic\" @@ -181677,10 +177938,8 @@ def index_medtronic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181733,8 +177992,7 @@ def index_medtronic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181783,8 +178041,7 @@ def index_medtronic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181802,7 +178059,7 @@ def index_medtronic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"medtronic\" @@ -181842,10 +178099,8 @@ def index_medtronic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181898,8 +178153,7 @@ def index_medtronic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181948,8 +178202,7 @@ def index_medtronic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181967,7 +178220,7 @@ def index_medtronic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"medtronic\" @@ -182007,10 +178260,8 @@ def index_medtronic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182063,8 +178314,7 @@ def index_medtronic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182108,8 +178358,7 @@ def _index_medtronic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182122,7 +178371,10 @@ def _index_medtronic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -182206,13 +178458,9 @@ def _index_medtronic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -182295,8 +178543,7 @@ def index_mendix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182314,7 +178561,7 @@ def index_mendix_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: """Return vulnerability data stored in index \"mendix\" @@ -182354,10 +178601,8 @@ def index_mendix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182410,8 +178655,7 @@ def index_mendix_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182460,8 +178704,7 @@ def index_mendix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182479,7 +178722,7 @@ def index_mendix_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: """Return vulnerability data stored in index \"mendix\" @@ -182519,10 +178762,8 @@ def index_mendix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182575,8 +178816,7 @@ def index_mendix_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182625,8 +178865,7 @@ def index_mendix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182644,7 +178883,7 @@ def index_mendix_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mendix\" @@ -182684,10 +178923,8 @@ def index_mendix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182740,8 +178977,7 @@ def index_mendix_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182785,8 +179021,7 @@ def _index_mendix_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182799,7 +179034,10 @@ def _index_mendix_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -182883,13 +179121,9 @@ def _index_mendix_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -182972,8 +179206,7 @@ def index_meta_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182991,7 +179224,7 @@ def index_meta_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: """Return vulnerability data stored in index \"meta-advisories\" @@ -183031,10 +179264,8 @@ def index_meta_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183087,8 +179318,7 @@ def index_meta_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183137,8 +179367,7 @@ def index_meta_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183156,7 +179385,7 @@ def index_meta_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: """Return vulnerability data stored in index \"meta-advisories\" @@ -183196,10 +179425,8 @@ def index_meta_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183252,8 +179479,7 @@ def index_meta_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183302,8 +179528,7 @@ def index_meta_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183321,7 +179546,7 @@ def index_meta_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"meta-advisories\" @@ -183361,10 +179586,8 @@ def index_meta_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183417,8 +179640,7 @@ def index_meta_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183462,8 +179684,7 @@ def _index_meta_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -183476,7 +179697,10 @@ def _index_meta_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -183560,13 +179784,9 @@ def _index_meta_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -183649,8 +179869,7 @@ def index_metasploit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183668,7 +179887,7 @@ def index_metasploit_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: """Return vulnerability data stored in index \"metasploit\" @@ -183708,10 +179927,8 @@ def index_metasploit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183764,8 +179981,7 @@ def index_metasploit_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183814,8 +180030,7 @@ def index_metasploit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183833,7 +180048,7 @@ def index_metasploit_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: """Return vulnerability data stored in index \"metasploit\" @@ -183873,10 +180088,8 @@ def index_metasploit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183929,8 +180142,7 @@ def index_metasploit_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183979,8 +180191,7 @@ def index_metasploit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183998,7 +180209,7 @@ def index_metasploit_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"metasploit\" @@ -184038,10 +180249,8 @@ def index_metasploit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184094,8 +180303,7 @@ def index_metasploit_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184139,8 +180347,7 @@ def _index_metasploit_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184153,7 +180360,10 @@ def _index_metasploit_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -184237,13 +180447,9 @@ def _index_metasploit_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -184326,8 +180532,7 @@ def index_microsoft_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184345,7 +180550,7 @@ def index_microsoft_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184385,10 +180590,8 @@ def index_microsoft_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184441,8 +180644,7 @@ def index_microsoft_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184491,8 +180693,7 @@ def index_microsoft_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184510,7 +180711,7 @@ def index_microsoft_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184550,10 +180751,8 @@ def index_microsoft_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184606,8 +180805,7 @@ def index_microsoft_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184656,8 +180854,7 @@ def index_microsoft_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184675,7 +180872,7 @@ def index_microsoft_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-csaf\" @@ -184715,10 +180912,8 @@ def index_microsoft_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184771,8 +180966,7 @@ def index_microsoft_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184816,8 +181010,7 @@ def _index_microsoft_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184830,7 +181023,10 @@ def _index_microsoft_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -184914,13 +181110,9 @@ def _index_microsoft_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -185003,8 +181195,7 @@ def index_microsoft_cvrf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185022,7 +181213,7 @@ def index_microsoft_cvrf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185062,10 +181253,8 @@ def index_microsoft_cvrf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185118,8 +181307,7 @@ def index_microsoft_cvrf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185168,8 +181356,7 @@ def index_microsoft_cvrf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185187,7 +181374,7 @@ def index_microsoft_cvrf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185227,10 +181414,8 @@ def index_microsoft_cvrf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185283,8 +181468,7 @@ def index_microsoft_cvrf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185333,8 +181517,7 @@ def index_microsoft_cvrf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185352,7 +181535,7 @@ def index_microsoft_cvrf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-cvrf\" @@ -185392,10 +181575,8 @@ def index_microsoft_cvrf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185448,8 +181629,7 @@ def index_microsoft_cvrf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185493,8 +181673,7 @@ def _index_microsoft_cvrf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -185507,7 +181686,10 @@ def _index_microsoft_cvrf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -185591,13 +181773,9 @@ def _index_microsoft_cvrf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -185680,8 +181858,7 @@ def index_microsoft_driver_block_list_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185699,7 +181876,7 @@ def index_microsoft_driver_block_list_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -185739,10 +181916,8 @@ def index_microsoft_driver_block_list_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185795,8 +181970,7 @@ def index_microsoft_driver_block_list_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185845,8 +182019,7 @@ def index_microsoft_driver_block_list_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185864,7 +182037,7 @@ def index_microsoft_driver_block_list_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -185904,10 +182077,8 @@ def index_microsoft_driver_block_list_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185960,8 +182131,7 @@ def index_microsoft_driver_block_list_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186010,8 +182180,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186029,7 +182198,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -186069,10 +182238,8 @@ def index_microsoft_driver_block_list_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186125,8 +182292,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186170,8 +182336,7 @@ def _index_microsoft_driver_block_list_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186184,7 +182349,10 @@ def _index_microsoft_driver_block_list_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -186268,13 +182436,9 @@ def _index_microsoft_driver_block_list_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -186357,8 +182521,7 @@ def index_microsoft_kb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186376,7 +182539,7 @@ def index_microsoft_kb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186416,10 +182579,8 @@ def index_microsoft_kb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186472,8 +182633,7 @@ def index_microsoft_kb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186522,8 +182682,7 @@ def index_microsoft_kb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186541,7 +182700,7 @@ def index_microsoft_kb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186581,10 +182740,8 @@ def index_microsoft_kb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186637,8 +182794,7 @@ def index_microsoft_kb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186687,8 +182843,7 @@ def index_microsoft_kb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186706,7 +182861,7 @@ def index_microsoft_kb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"microsoft-kb\" @@ -186746,10 +182901,8 @@ def index_microsoft_kb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186802,8 +182955,7 @@ def index_microsoft_kb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186847,8 +182999,7 @@ def _index_microsoft_kb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186861,7 +183012,10 @@ def _index_microsoft_kb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -186945,13 +183099,9 @@ def _index_microsoft_kb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -187034,8 +183184,7 @@ def index_mikrotik_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187053,7 +183202,7 @@ def index_mikrotik_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: """Return vulnerability data stored in index \"mikrotik\" @@ -187093,10 +183242,8 @@ def index_mikrotik_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187149,8 +183296,7 @@ def index_mikrotik_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187199,8 +183345,7 @@ def index_mikrotik_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187218,7 +183363,7 @@ def index_mikrotik_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: """Return vulnerability data stored in index \"mikrotik\" @@ -187258,10 +183403,8 @@ def index_mikrotik_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187314,8 +183457,7 @@ def index_mikrotik_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187364,8 +183506,7 @@ def index_mikrotik_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187383,7 +183524,7 @@ def index_mikrotik_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mikrotik\" @@ -187423,10 +183564,8 @@ def index_mikrotik_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187479,8 +183618,7 @@ def index_mikrotik_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187524,8 +183662,7 @@ def _index_mikrotik_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -187538,7 +183675,10 @@ def _index_mikrotik_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -187622,13 +183762,9 @@ def _index_mikrotik_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -187711,8 +183847,7 @@ def index_mindray_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187730,7 +183865,7 @@ def index_mindray_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: """Return vulnerability data stored in index \"mindray\" @@ -187770,10 +183905,8 @@ def index_mindray_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187826,8 +183959,7 @@ def index_mindray_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187876,8 +184008,7 @@ def index_mindray_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187895,7 +184026,7 @@ def index_mindray_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: """Return vulnerability data stored in index \"mindray\" @@ -187935,10 +184066,8 @@ def index_mindray_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187991,8 +184120,7 @@ def index_mindray_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188041,8 +184169,7 @@ def index_mindray_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188060,7 +184187,7 @@ def index_mindray_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mindray\" @@ -188100,10 +184227,8 @@ def index_mindray_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188156,8 +184281,7 @@ def index_mindray_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188201,8 +184325,7 @@ def _index_mindray_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188215,7 +184338,10 @@ def _index_mindray_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -188299,13 +184425,9 @@ def _index_mindray_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -188388,8 +184510,7 @@ def index_misp_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188407,7 +184528,7 @@ def index_misp_threat_actors_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188447,10 +184568,8 @@ def index_misp_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188503,8 +184622,7 @@ def index_misp_threat_actors_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188553,8 +184671,7 @@ def index_misp_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188572,7 +184689,7 @@ def index_misp_threat_actors_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188612,10 +184729,8 @@ def index_misp_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188668,8 +184783,7 @@ def index_misp_threat_actors_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188718,8 +184832,7 @@ def index_misp_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188737,7 +184850,7 @@ def index_misp_threat_actors_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"misp-threat-actors\" @@ -188777,10 +184890,8 @@ def index_misp_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188833,8 +184944,7 @@ def index_misp_threat_actors_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188878,8 +184988,7 @@ def _index_misp_threat_actors_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188892,7 +185001,10 @@ def _index_misp_threat_actors_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -188976,13 +185088,9 @@ def _index_misp_threat_actors_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -189065,8 +185173,7 @@ def index_mitel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189084,7 +185191,7 @@ def index_mitel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: """Return vulnerability data stored in index \"mitel\" @@ -189124,10 +185231,8 @@ def index_mitel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189180,8 +185285,7 @@ def index_mitel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189230,8 +185334,7 @@ def index_mitel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189249,7 +185352,7 @@ def index_mitel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: """Return vulnerability data stored in index \"mitel\" @@ -189289,10 +185392,8 @@ def index_mitel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189345,8 +185446,7 @@ def index_mitel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189395,8 +185495,7 @@ def index_mitel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189414,7 +185513,7 @@ def index_mitel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitel\" @@ -189454,10 +185553,8 @@ def index_mitel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189510,8 +185607,7 @@ def index_mitel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189555,8 +185651,7 @@ def _index_mitel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -189569,7 +185664,10 @@ def _index_mitel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -189653,13 +185751,9 @@ def _index_mitel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -189742,8 +185836,7 @@ def index_mitre_attack_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189761,7 +185854,7 @@ def index_mitre_attack_cve_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -189801,10 +185894,8 @@ def index_mitre_attack_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189857,8 +185948,7 @@ def index_mitre_attack_cve_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189907,8 +185997,7 @@ def index_mitre_attack_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189926,7 +186015,7 @@ def index_mitre_attack_cve_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -189966,10 +186055,8 @@ def index_mitre_attack_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190022,8 +186109,7 @@ def index_mitre_attack_cve_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190072,8 +186158,7 @@ def index_mitre_attack_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190091,7 +186176,7 @@ def index_mitre_attack_cve_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitre-attack-cve\" @@ -190131,10 +186216,8 @@ def index_mitre_attack_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190187,8 +186270,7 @@ def index_mitre_attack_cve_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190232,8 +186314,7 @@ def _index_mitre_attack_cve_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190246,7 +186327,10 @@ def _index_mitre_attack_cve_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -190330,13 +186414,9 @@ def _index_mitre_attack_cve_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -190419,8 +186499,7 @@ def index_mitre_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190438,7 +186517,7 @@ def index_mitre_cvelist_v5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190478,10 +186557,8 @@ def index_mitre_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190534,8 +186611,7 @@ def index_mitre_cvelist_v5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190584,8 +186660,7 @@ def index_mitre_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190603,7 +186678,7 @@ def index_mitre_cvelist_v5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190643,10 +186718,8 @@ def index_mitre_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190699,8 +186772,7 @@ def index_mitre_cvelist_v5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190749,8 +186821,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190768,7 +186839,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -190808,10 +186879,8 @@ def index_mitre_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190864,8 +186933,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190909,8 +186977,7 @@ def _index_mitre_cvelist_v5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190923,7 +186990,10 @@ def _index_mitre_cvelist_v5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -191007,13 +187077,9 @@ def _index_mitre_cvelist_v5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -191096,8 +187162,7 @@ def index_mitsubishi_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191115,7 +187180,7 @@ def index_mitsubishi_electric_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191155,10 +187220,8 @@ def index_mitsubishi_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191211,8 +187274,7 @@ def index_mitsubishi_electric_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191261,8 +187323,7 @@ def index_mitsubishi_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191280,7 +187341,7 @@ def index_mitsubishi_electric_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191320,10 +187381,8 @@ def index_mitsubishi_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191376,8 +187435,7 @@ def index_mitsubishi_electric_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191426,8 +187484,7 @@ def index_mitsubishi_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191445,7 +187502,7 @@ def index_mitsubishi_electric_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mitsubishi-electric\" @@ -191485,10 +187542,8 @@ def index_mitsubishi_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191541,8 +187596,7 @@ def index_mitsubishi_electric_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191586,8 +187640,7 @@ def _index_mitsubishi_electric_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191600,7 +187653,10 @@ def _index_mitsubishi_electric_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -191684,13 +187740,9 @@ def _index_mitsubishi_electric_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -191773,8 +187825,7 @@ def index_mongodb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191792,7 +187843,7 @@ def index_mongodb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: """Return vulnerability data stored in index \"mongodb\" @@ -191832,10 +187883,8 @@ def index_mongodb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191888,8 +187937,7 @@ def index_mongodb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191938,8 +187986,7 @@ def index_mongodb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191957,7 +188004,7 @@ def index_mongodb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: """Return vulnerability data stored in index \"mongodb\" @@ -191997,10 +188044,8 @@ def index_mongodb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192053,8 +188098,7 @@ def index_mongodb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192103,8 +188147,7 @@ def index_mongodb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192122,7 +188165,7 @@ def index_mongodb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mongodb\" @@ -192162,10 +188205,8 @@ def index_mongodb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192218,8 +188259,7 @@ def index_mongodb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192263,8 +188303,7 @@ def _index_mongodb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192277,7 +188316,10 @@ def _index_mongodb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -192361,13 +188403,9 @@ def _index_mongodb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -192450,8 +188488,7 @@ def index_moxa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192469,7 +188506,7 @@ def index_moxa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"moxa\" @@ -192509,10 +188546,8 @@ def index_moxa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192565,8 +188600,7 @@ def index_moxa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192615,8 +188649,7 @@ def index_moxa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192634,7 +188667,7 @@ def index_moxa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"moxa\" @@ -192674,10 +188707,8 @@ def index_moxa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192730,8 +188761,7 @@ def index_moxa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192780,8 +188810,7 @@ def index_moxa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192799,7 +188828,7 @@ def index_moxa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"moxa\" @@ -192839,10 +188868,8 @@ def index_moxa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192895,8 +188922,7 @@ def index_moxa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192940,8 +188966,7 @@ def _index_moxa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192954,7 +188979,10 @@ def _index_moxa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -193038,13 +189066,9 @@ def _index_moxa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -193127,8 +189151,7 @@ def index_mozilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193146,7 +189169,7 @@ def index_mozilla_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"mozilla\" @@ -193186,10 +189209,8 @@ def index_mozilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193242,8 +189263,7 @@ def index_mozilla_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193292,8 +189312,7 @@ def index_mozilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193311,7 +189330,7 @@ def index_mozilla_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"mozilla\" @@ -193351,10 +189370,8 @@ def index_mozilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193407,8 +189424,7 @@ def index_mozilla_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193457,8 +189473,7 @@ def index_mozilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193476,7 +189491,7 @@ def index_mozilla_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"mozilla\" @@ -193516,10 +189531,8 @@ def index_mozilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193572,8 +189585,7 @@ def index_mozilla_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193617,8 +189629,7 @@ def _index_mozilla_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193631,7 +189642,10 @@ def _index_mozilla_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -193715,13 +189729,9 @@ def _index_mozilla_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -193804,8 +189814,7 @@ def index_naver_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193823,7 +189832,7 @@ def index_naver_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: """Return vulnerability data stored in index \"naver\" @@ -193863,10 +189872,8 @@ def index_naver_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193919,8 +189926,7 @@ def index_naver_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193969,8 +189975,7 @@ def index_naver_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193988,7 +189993,7 @@ def index_naver_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: """Return vulnerability data stored in index \"naver\" @@ -194028,10 +190033,8 @@ def index_naver_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194084,8 +190087,7 @@ def index_naver_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194134,8 +190136,7 @@ def index_naver_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194153,7 +190154,7 @@ def index_naver_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"naver\" @@ -194193,10 +190194,8 @@ def index_naver_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194249,8 +190248,7 @@ def index_naver_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194294,8 +190292,7 @@ def _index_naver_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194308,7 +190305,10 @@ def _index_naver_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -194392,13 +190392,9 @@ def _index_naver_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -194481,8 +190477,7 @@ def index_ncsc_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194500,7 +190495,7 @@ def index_ncsc_cves_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194540,10 +190535,8 @@ def index_ncsc_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194596,8 +190589,7 @@ def index_ncsc_cves_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194646,8 +190638,7 @@ def index_ncsc_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194665,7 +190656,7 @@ def index_ncsc_cves_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194705,10 +190696,8 @@ def index_ncsc_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194761,8 +190750,7 @@ def index_ncsc_cves_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194811,8 +190799,7 @@ def index_ncsc_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194830,7 +190817,7 @@ def index_ncsc_cves_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ncsc-cves\" @@ -194870,10 +190857,8 @@ def index_ncsc_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194926,8 +190911,7 @@ def index_ncsc_cves_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194971,8 +190955,7 @@ def _index_ncsc_cves_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194985,7 +190968,10 @@ def _index_ncsc_cves_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -195069,13 +191055,9 @@ def _index_ncsc_cves_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -195158,8 +191140,7 @@ def index_ncsc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195177,7 +191158,7 @@ def index_ncsc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: """Return vulnerability data stored in index \"ncsc\" @@ -195217,10 +191198,8 @@ def index_ncsc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195273,8 +191252,7 @@ def index_ncsc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195323,8 +191301,7 @@ def index_ncsc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195342,7 +191319,7 @@ def index_ncsc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: """Return vulnerability data stored in index \"ncsc\" @@ -195382,10 +191359,8 @@ def index_ncsc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195438,8 +191413,7 @@ def index_ncsc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195488,8 +191462,7 @@ def index_ncsc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195507,7 +191480,7 @@ def index_ncsc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ncsc\" @@ -195547,10 +191520,8 @@ def index_ncsc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195603,8 +191574,7 @@ def index_ncsc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195648,8 +191618,7 @@ def _index_ncsc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195662,7 +191631,10 @@ def _index_ncsc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -195746,13 +191718,9 @@ def _index_ncsc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -195835,8 +191803,7 @@ def index_nec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195854,7 +191821,7 @@ def index_nec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: """Return vulnerability data stored in index \"nec\" @@ -195894,10 +191861,8 @@ def index_nec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195950,8 +191915,7 @@ def index_nec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196000,8 +191964,7 @@ def index_nec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196019,7 +191982,7 @@ def index_nec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: """Return vulnerability data stored in index \"nec\" @@ -196059,10 +192022,8 @@ def index_nec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196115,8 +192076,7 @@ def index_nec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196165,8 +192125,7 @@ def index_nec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196184,7 +192143,7 @@ def index_nec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nec\" @@ -196224,10 +192183,8 @@ def index_nec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196280,8 +192237,7 @@ def index_nec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196325,8 +192281,7 @@ def _index_nec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -196339,7 +192294,10 @@ def _index_nec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -196423,13 +192381,9 @@ def _index_nec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -196512,8 +192466,7 @@ def index_nessus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196531,7 +192484,7 @@ def index_nessus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: """Return vulnerability data stored in index \"nessus\" @@ -196571,10 +192524,8 @@ def index_nessus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196627,8 +192578,7 @@ def index_nessus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196677,8 +192627,7 @@ def index_nessus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196696,7 +192645,7 @@ def index_nessus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: """Return vulnerability data stored in index \"nessus\" @@ -196736,10 +192685,8 @@ def index_nessus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196792,8 +192739,7 @@ def index_nessus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196842,8 +192788,7 @@ def index_nessus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196861,7 +192806,7 @@ def index_nessus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nessus\" @@ -196901,10 +192846,8 @@ def index_nessus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196957,8 +192900,7 @@ def index_nessus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197002,8 +192944,7 @@ def _index_nessus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197016,7 +192957,10 @@ def _index_nessus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -197100,13 +193044,9 @@ def _index_nessus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -197189,8 +193129,7 @@ def index_netapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197208,7 +193147,7 @@ def index_netapp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: """Return vulnerability data stored in index \"netapp\" @@ -197248,10 +193187,8 @@ def index_netapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197304,8 +193241,7 @@ def index_netapp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197354,8 +193290,7 @@ def index_netapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197373,7 +193308,7 @@ def index_netapp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: """Return vulnerability data stored in index \"netapp\" @@ -197413,10 +193348,8 @@ def index_netapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197469,8 +193402,7 @@ def index_netapp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197519,8 +193451,7 @@ def index_netapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197538,7 +193469,7 @@ def index_netapp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netapp\" @@ -197578,10 +193509,8 @@ def index_netapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197634,8 +193563,7 @@ def index_netapp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197679,8 +193607,7 @@ def _index_netapp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197693,7 +193620,10 @@ def _index_netapp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -197777,13 +193707,9 @@ def _index_netapp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -197866,8 +193792,7 @@ def index_netatalk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197885,7 +193810,7 @@ def index_netatalk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: """Return vulnerability data stored in index \"netatalk\" @@ -197925,10 +193850,8 @@ def index_netatalk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197981,8 +193904,7 @@ def index_netatalk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198031,8 +193953,7 @@ def index_netatalk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198050,7 +193971,7 @@ def index_netatalk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: """Return vulnerability data stored in index \"netatalk\" @@ -198090,10 +194011,8 @@ def index_netatalk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198146,8 +194065,7 @@ def index_netatalk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198196,8 +194114,7 @@ def index_netatalk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198215,7 +194132,7 @@ def index_netatalk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netatalk\" @@ -198255,10 +194172,8 @@ def index_netatalk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198311,8 +194226,7 @@ def index_netatalk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198356,8 +194270,7 @@ def _index_netatalk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -198370,7 +194283,10 @@ def _index_netatalk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -198454,13 +194370,9 @@ def _index_netatalk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -198543,8 +194455,7 @@ def index_netgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198562,7 +194473,7 @@ def index_netgate_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: """Return vulnerability data stored in index \"netgate\" @@ -198602,10 +194513,8 @@ def index_netgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198658,8 +194567,7 @@ def index_netgate_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198708,8 +194616,7 @@ def index_netgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198727,7 +194634,7 @@ def index_netgate_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: """Return vulnerability data stored in index \"netgate\" @@ -198767,10 +194674,8 @@ def index_netgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198823,8 +194728,7 @@ def index_netgate_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198873,8 +194777,7 @@ def index_netgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198892,7 +194795,7 @@ def index_netgate_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netgate\" @@ -198932,10 +194835,8 @@ def index_netgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198988,8 +194889,7 @@ def index_netgate_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199033,8 +194933,7 @@ def _index_netgate_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199047,7 +194946,10 @@ def _index_netgate_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -199131,13 +195033,9 @@ def _index_netgate_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -199220,8 +195118,7 @@ def index_netgear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199239,7 +195136,7 @@ def index_netgear_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: """Return vulnerability data stored in index \"netgear\" @@ -199279,10 +195176,8 @@ def index_netgear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199335,8 +195230,7 @@ def index_netgear_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199385,8 +195279,7 @@ def index_netgear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199404,7 +195297,7 @@ def index_netgear_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: """Return vulnerability data stored in index \"netgear\" @@ -199444,10 +195337,8 @@ def index_netgear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199500,8 +195391,7 @@ def index_netgear_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199550,8 +195440,7 @@ def index_netgear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199569,7 +195458,7 @@ def index_netgear_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netgear\" @@ -199609,10 +195498,8 @@ def index_netgear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199665,8 +195552,7 @@ def index_netgear_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199710,8 +195596,7 @@ def _index_netgear_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199724,7 +195609,10 @@ def _index_netgear_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -199808,13 +195696,9 @@ def _index_netgear_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -199897,8 +195781,7 @@ def index_netskope_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199916,7 +195799,7 @@ def index_netskope_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: """Return vulnerability data stored in index \"netskope\" @@ -199956,10 +195839,8 @@ def index_netskope_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200012,8 +195893,7 @@ def index_netskope_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200062,8 +195942,7 @@ def index_netskope_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200081,7 +195960,7 @@ def index_netskope_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: """Return vulnerability data stored in index \"netskope\" @@ -200121,10 +196000,8 @@ def index_netskope_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200177,8 +196054,7 @@ def index_netskope_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200227,8 +196103,7 @@ def index_netskope_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200246,7 +196121,7 @@ def index_netskope_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"netskope\" @@ -200286,10 +196161,8 @@ def index_netskope_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200342,8 +196215,7 @@ def index_netskope_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200387,8 +196259,7 @@ def _index_netskope_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -200401,7 +196272,10 @@ def _index_netskope_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -200485,13 +196359,9 @@ def _index_netskope_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -200574,8 +196444,7 @@ def index_nexpose_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200593,7 +196462,7 @@ def index_nexpose_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: """Return vulnerability data stored in index \"nexpose\" @@ -200633,10 +196502,8 @@ def index_nexpose_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200689,8 +196556,7 @@ def index_nexpose_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200739,8 +196605,7 @@ def index_nexpose_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200758,7 +196623,7 @@ def index_nexpose_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: """Return vulnerability data stored in index \"nexpose\" @@ -200798,10 +196663,8 @@ def index_nexpose_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200854,8 +196717,7 @@ def index_nexpose_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200904,8 +196766,7 @@ def index_nexpose_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200923,7 +196784,7 @@ def index_nexpose_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nexpose\" @@ -200963,10 +196824,8 @@ def index_nexpose_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201019,8 +196878,7 @@ def index_nexpose_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201064,8 +196922,7 @@ def _index_nexpose_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201078,7 +196935,10 @@ def _index_nexpose_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -201162,13 +197022,9 @@ def _index_nexpose_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -201251,8 +197107,7 @@ def index_nginx_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201270,7 +197125,7 @@ def index_nginx_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: """Return vulnerability data stored in index \"nginx\" @@ -201310,10 +197165,8 @@ def index_nginx_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201366,8 +197219,7 @@ def index_nginx_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201416,8 +197268,7 @@ def index_nginx_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201435,7 +197286,7 @@ def index_nginx_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"nginx\" @@ -201475,10 +197326,8 @@ def index_nginx_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201531,8 +197380,7 @@ def index_nginx_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201581,8 +197429,7 @@ def index_nginx_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201600,7 +197447,7 @@ def index_nginx_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nginx\" @@ -201640,10 +197487,8 @@ def index_nginx_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201696,8 +197541,7 @@ def index_nginx_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201741,8 +197585,7 @@ def _index_nginx_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201755,7 +197598,10 @@ def _index_nginx_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -201839,13 +197685,9 @@ def _index_nginx_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -201928,8 +197770,7 @@ def index_nhs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201947,7 +197788,7 @@ def index_nhs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: """Return vulnerability data stored in index \"nhs\" @@ -201987,10 +197828,8 @@ def index_nhs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202043,8 +197882,7 @@ def index_nhs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202093,8 +197931,7 @@ def index_nhs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202112,7 +197949,7 @@ def index_nhs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: """Return vulnerability data stored in index \"nhs\" @@ -202152,10 +197989,8 @@ def index_nhs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202208,8 +198043,7 @@ def index_nhs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202258,8 +198092,7 @@ def index_nhs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202277,7 +198110,7 @@ def index_nhs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nhs\" @@ -202317,10 +198150,8 @@ def index_nhs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202373,8 +198204,7 @@ def index_nhs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202418,8 +198248,7 @@ def _index_nhs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -202432,7 +198261,10 @@ def _index_nhs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -202516,13 +198348,9 @@ def _index_nhs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -202605,8 +198433,7 @@ def index_ni_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202624,7 +198451,7 @@ def index_ni_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: """Return vulnerability data stored in index \"ni\" @@ -202664,10 +198491,8 @@ def index_ni_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202720,8 +198545,7 @@ def index_ni_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202770,8 +198594,7 @@ def index_ni_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202789,7 +198612,7 @@ def index_ni_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: """Return vulnerability data stored in index \"ni\" @@ -202829,10 +198652,8 @@ def index_ni_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202885,8 +198706,7 @@ def index_ni_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202935,8 +198755,7 @@ def index_ni_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202954,7 +198773,7 @@ def index_ni_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ni\" @@ -202994,10 +198813,8 @@ def index_ni_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203050,8 +198867,7 @@ def index_ni_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203095,8 +198911,7 @@ def _index_ni_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203109,7 +198924,10 @@ def _index_ni_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -203193,13 +199011,9 @@ def _index_ni_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -203282,8 +199096,7 @@ def index_nist_nvd2_cpematch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203301,7 +199114,7 @@ def index_nist_nvd2_cpematch_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203341,10 +199154,8 @@ def index_nist_nvd2_cpematch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203397,8 +199208,7 @@ def index_nist_nvd2_cpematch_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203447,8 +199257,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203466,7 +199275,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203506,10 +199315,8 @@ def index_nist_nvd2_cpematch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203562,8 +199369,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203612,8 +199418,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203631,7 +199436,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -203671,10 +199476,8 @@ def index_nist_nvd2_cpematch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203727,8 +199530,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203772,8 +199574,7 @@ def _index_nist_nvd2_cpematch_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203786,7 +199587,10 @@ def _index_nist_nvd2_cpematch_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -203870,13 +199674,9 @@ def _index_nist_nvd2_cpematch_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -203959,8 +199759,7 @@ def index_nist_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203978,7 +199777,7 @@ def index_nist_nvd2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204018,10 +199817,8 @@ def index_nist_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204074,8 +199871,7 @@ def index_nist_nvd2_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204124,8 +199920,7 @@ def index_nist_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204143,7 +199938,7 @@ def index_nist_nvd2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204183,10 +199978,8 @@ def index_nist_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204239,8 +200032,7 @@ def index_nist_nvd2_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204289,8 +200081,7 @@ def index_nist_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204308,7 +200099,7 @@ def index_nist_nvd2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2\" @@ -204348,10 +200139,8 @@ def index_nist_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204404,8 +200193,7 @@ def index_nist_nvd2_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204449,8 +200237,7 @@ def _index_nist_nvd2_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -204463,7 +200250,10 @@ def _index_nist_nvd2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -204547,13 +200337,9 @@ def _index_nist_nvd2_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -204636,8 +200422,7 @@ def index_nist_nvd2_sources_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204655,7 +200440,7 @@ def index_nist_nvd2_sources_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -204695,10 +200480,8 @@ def index_nist_nvd2_sources_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204751,8 +200534,7 @@ def index_nist_nvd2_sources_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204801,8 +200583,7 @@ def index_nist_nvd2_sources_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204820,7 +200601,7 @@ def index_nist_nvd2_sources_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -204860,10 +200641,8 @@ def index_nist_nvd2_sources_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204916,8 +200695,7 @@ def index_nist_nvd2_sources_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204966,8 +200744,7 @@ def index_nist_nvd2_sources_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204985,7 +200762,7 @@ def index_nist_nvd2_sources_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -205025,10 +200802,8 @@ def index_nist_nvd2_sources_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205081,8 +200856,7 @@ def index_nist_nvd2_sources_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205126,8 +200900,7 @@ def _index_nist_nvd2_sources_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205140,7 +200913,10 @@ def _index_nist_nvd2_sources_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -205224,13 +201000,9 @@ def _index_nist_nvd2_sources_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -205313,8 +201085,7 @@ def index_nist_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205332,7 +201103,7 @@ def index_nist_nvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: """Return vulnerability data stored in index \"nist-nvd\" @@ -205372,10 +201143,8 @@ def index_nist_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205428,8 +201197,7 @@ def index_nist_nvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205478,8 +201246,7 @@ def index_nist_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205497,7 +201264,7 @@ def index_nist_nvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: """Return vulnerability data stored in index \"nist-nvd\" @@ -205537,10 +201304,8 @@ def index_nist_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205593,8 +201358,7 @@ def index_nist_nvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205643,8 +201407,7 @@ def index_nist_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205662,7 +201425,7 @@ def index_nist_nvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nist-nvd\" @@ -205702,10 +201465,8 @@ def index_nist_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205758,8 +201519,7 @@ def index_nist_nvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205803,8 +201563,7 @@ def _index_nist_nvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205817,7 +201576,10 @@ def _index_nist_nvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -205901,13 +201663,9 @@ def _index_nist_nvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -205990,8 +201748,7 @@ def index_node_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206009,7 +201766,7 @@ def index_node_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: """Return vulnerability data stored in index \"node-security\" @@ -206049,10 +201806,8 @@ def index_node_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206105,8 +201860,7 @@ def index_node_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206155,8 +201909,7 @@ def index_node_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206174,7 +201927,7 @@ def index_node_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: """Return vulnerability data stored in index \"node-security\" @@ -206214,10 +201967,8 @@ def index_node_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206270,8 +202021,7 @@ def index_node_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206320,8 +202070,7 @@ def index_node_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206339,7 +202088,7 @@ def index_node_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"node-security\" @@ -206379,10 +202128,8 @@ def index_node_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206435,8 +202182,7 @@ def index_node_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206480,8 +202226,7 @@ def _index_node_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -206494,7 +202239,10 @@ def _index_node_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -206578,13 +202326,9 @@ def _index_node_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -206667,8 +202411,7 @@ def index_nodejs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206686,7 +202429,7 @@ def index_nodejs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: """Return vulnerability data stored in index \"nodejs\" @@ -206726,10 +202469,8 @@ def index_nodejs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206782,8 +202523,7 @@ def index_nodejs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206832,8 +202572,7 @@ def index_nodejs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206851,7 +202590,7 @@ def index_nodejs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: """Return vulnerability data stored in index \"nodejs\" @@ -206891,10 +202630,8 @@ def index_nodejs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206947,8 +202684,7 @@ def index_nodejs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206997,8 +202733,7 @@ def index_nodejs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207016,7 +202751,7 @@ def index_nodejs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nodejs\" @@ -207056,10 +202791,8 @@ def index_nodejs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207112,8 +202845,7 @@ def index_nodejs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207157,8 +202889,7 @@ def _index_nodejs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207171,7 +202902,10 @@ def _index_nodejs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -207255,13 +202989,9 @@ def _index_nodejs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -207344,8 +203074,7 @@ def index_nokia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207363,7 +203092,7 @@ def index_nokia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: """Return vulnerability data stored in index \"nokia\" @@ -207403,10 +203132,8 @@ def index_nokia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207459,8 +203186,7 @@ def index_nokia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207509,8 +203235,7 @@ def index_nokia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207528,7 +203253,7 @@ def index_nokia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: """Return vulnerability data stored in index \"nokia\" @@ -207568,10 +203293,8 @@ def index_nokia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207624,8 +203347,7 @@ def index_nokia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207674,8 +203396,7 @@ def index_nokia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207693,7 +203414,7 @@ def index_nokia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nokia\" @@ -207733,10 +203454,8 @@ def index_nokia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207789,8 +203508,7 @@ def index_nokia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207834,8 +203552,7 @@ def _index_nokia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207848,7 +203565,10 @@ def _index_nokia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -207932,13 +203652,9 @@ def _index_nokia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -208021,8 +203737,7 @@ def index_notepadplusplus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208040,7 +203755,7 @@ def index_notepadplusplus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208080,10 +203795,8 @@ def index_notepadplusplus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208136,8 +203849,7 @@ def index_notepadplusplus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208186,8 +203898,7 @@ def index_notepadplusplus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208205,7 +203916,7 @@ def index_notepadplusplus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208245,10 +203956,8 @@ def index_notepadplusplus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208301,8 +204010,7 @@ def index_notepadplusplus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208351,8 +204059,7 @@ def index_notepadplusplus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208370,7 +204077,7 @@ def index_notepadplusplus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"notepadplusplus\" @@ -208410,10 +204117,8 @@ def index_notepadplusplus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208466,8 +204171,7 @@ def index_notepadplusplus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208511,8 +204215,7 @@ def _index_notepadplusplus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -208525,7 +204228,10 @@ def _index_notepadplusplus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -208609,13 +204315,9 @@ def _index_notepadplusplus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -208698,8 +204400,7 @@ def index_nozomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208717,7 +204418,7 @@ def index_nozomi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: """Return vulnerability data stored in index \"nozomi\" @@ -208757,10 +204458,8 @@ def index_nozomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208813,8 +204512,7 @@ def index_nozomi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208863,8 +204561,7 @@ def index_nozomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208882,7 +204579,7 @@ def index_nozomi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: """Return vulnerability data stored in index \"nozomi\" @@ -208922,10 +204619,8 @@ def index_nozomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208978,8 +204673,7 @@ def index_nozomi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209028,8 +204722,7 @@ def index_nozomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209047,7 +204740,7 @@ def index_nozomi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nozomi\" @@ -209087,10 +204780,8 @@ def index_nozomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209143,8 +204834,7 @@ def index_nozomi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209188,8 +204878,7 @@ def _index_nozomi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209202,7 +204891,10 @@ def _index_nozomi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -209286,13 +204978,9 @@ def _index_nozomi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -209375,8 +205063,7 @@ def index_npm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209394,7 +205081,7 @@ def index_npm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"npm\" @@ -209434,10 +205121,8 @@ def index_npm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209490,8 +205175,7 @@ def index_npm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209540,8 +205224,7 @@ def index_npm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209559,7 +205242,7 @@ def index_npm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"npm\" @@ -209599,10 +205282,8 @@ def index_npm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209655,8 +205336,7 @@ def index_npm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209705,8 +205385,7 @@ def index_npm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209724,7 +205403,7 @@ def index_npm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"npm\" @@ -209764,10 +205443,8 @@ def index_npm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209820,8 +205497,7 @@ def index_npm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209865,8 +205541,7 @@ def _index_npm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209879,7 +205554,10 @@ def _index_npm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -209963,13 +205641,9 @@ def _index_npm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -210052,8 +205726,7 @@ def index_ntp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210071,7 +205744,7 @@ def index_ntp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: """Return vulnerability data stored in index \"ntp\" @@ -210111,10 +205784,8 @@ def index_ntp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210167,8 +205838,7 @@ def index_ntp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210217,8 +205887,7 @@ def index_ntp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210236,7 +205905,7 @@ def index_ntp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: """Return vulnerability data stored in index \"ntp\" @@ -210276,10 +205945,8 @@ def index_ntp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210332,8 +205999,7 @@ def index_ntp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210382,8 +206048,7 @@ def index_ntp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210401,7 +206066,7 @@ def index_ntp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ntp\" @@ -210441,10 +206106,8 @@ def index_ntp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210497,8 +206160,7 @@ def index_ntp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210542,8 +206204,7 @@ def _index_ntp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -210556,7 +206217,10 @@ def _index_ntp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -210640,13 +206304,9 @@ def _index_ntp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -210729,8 +206389,7 @@ def index_nuclei_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210748,7 +206407,7 @@ def index_nuclei_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: """Return vulnerability data stored in index \"nuclei\" @@ -210788,10 +206447,8 @@ def index_nuclei_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210844,8 +206501,7 @@ def index_nuclei_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210894,8 +206550,7 @@ def index_nuclei_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210913,7 +206568,7 @@ def index_nuclei_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: """Return vulnerability data stored in index \"nuclei\" @@ -210953,10 +206608,8 @@ def index_nuclei_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211009,8 +206662,7 @@ def index_nuclei_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211059,8 +206711,7 @@ def index_nuclei_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211078,7 +206729,7 @@ def index_nuclei_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nuclei\" @@ -211118,10 +206769,8 @@ def index_nuclei_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211174,8 +206823,7 @@ def index_nuclei_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211219,8 +206867,7 @@ def _index_nuclei_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211233,7 +206880,10 @@ def _index_nuclei_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -211317,13 +206967,9 @@ def _index_nuclei_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -211406,8 +207052,7 @@ def index_nuget_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211425,7 +207070,7 @@ def index_nuget_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"nuget\" @@ -211465,10 +207110,8 @@ def index_nuget_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211521,8 +207164,7 @@ def index_nuget_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211571,8 +207213,7 @@ def index_nuget_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211590,7 +207231,7 @@ def index_nuget_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"nuget\" @@ -211630,10 +207271,8 @@ def index_nuget_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211686,8 +207325,7 @@ def index_nuget_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211736,8 +207374,7 @@ def index_nuget_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211755,7 +207392,7 @@ def index_nuget_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nuget\" @@ -211795,10 +207432,8 @@ def index_nuget_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211851,8 +207486,7 @@ def index_nuget_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211896,8 +207530,7 @@ def _index_nuget_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211910,7 +207543,10 @@ def _index_nuget_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -211994,13 +207630,9 @@ def _index_nuget_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -212083,8 +207715,7 @@ def index_nvd_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212102,7 +207733,7 @@ def index_nvd_cpe_dictionary_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212142,10 +207773,8 @@ def index_nvd_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212198,8 +207827,7 @@ def index_nvd_cpe_dictionary_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212248,8 +207876,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212267,7 +207894,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212307,10 +207934,8 @@ def index_nvd_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212363,8 +207988,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212413,8 +208037,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212432,7 +208055,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -212472,10 +208095,8 @@ def index_nvd_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212528,8 +208149,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212573,8 +208193,7 @@ def _index_nvd_cpe_dictionary_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -212587,7 +208206,10 @@ def _index_nvd_cpe_dictionary_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -212671,13 +208293,9 @@ def _index_nvd_cpe_dictionary_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -212760,8 +208378,7 @@ def index_nvidia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212779,7 +208396,7 @@ def index_nvidia_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: """Return vulnerability data stored in index \"nvidia\" @@ -212819,10 +208436,8 @@ def index_nvidia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212875,8 +208490,7 @@ def index_nvidia_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212925,8 +208539,7 @@ def index_nvidia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212944,7 +208557,7 @@ def index_nvidia_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: """Return vulnerability data stored in index \"nvidia\" @@ -212984,10 +208597,8 @@ def index_nvidia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213040,8 +208651,7 @@ def index_nvidia_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213090,8 +208700,7 @@ def index_nvidia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213109,7 +208718,7 @@ def index_nvidia_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nvidia\" @@ -213149,10 +208758,8 @@ def index_nvidia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213205,8 +208812,7 @@ def index_nvidia_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213250,8 +208856,7 @@ def _index_nvidia_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213264,7 +208869,10 @@ def _index_nvidia_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -213348,13 +208956,9 @@ def _index_nvidia_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -213437,8 +209041,7 @@ def index_nz_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213456,7 +209059,7 @@ def index_nz_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: """Return vulnerability data stored in index \"nz-advisories\" @@ -213496,10 +209099,8 @@ def index_nz_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213552,8 +209153,7 @@ def index_nz_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213602,8 +209202,7 @@ def index_nz_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213621,7 +209220,7 @@ def index_nz_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"nz-advisories\" @@ -213661,10 +209260,8 @@ def index_nz_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213717,8 +209314,7 @@ def index_nz_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213767,8 +209363,7 @@ def index_nz_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213786,7 +209381,7 @@ def index_nz_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"nz-advisories\" @@ -213826,10 +209421,8 @@ def index_nz_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213882,8 +209475,7 @@ def index_nz_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213927,8 +209519,7 @@ def _index_nz_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213941,7 +209532,10 @@ def _index_nz_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -214025,13 +209619,9 @@ def _index_nz_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -214114,8 +209704,7 @@ def index_octopus_deploy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214133,7 +209722,7 @@ def index_octopus_deploy_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214173,10 +209762,8 @@ def index_octopus_deploy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214229,8 +209816,7 @@ def index_octopus_deploy_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214279,8 +209865,7 @@ def index_octopus_deploy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214298,7 +209883,7 @@ def index_octopus_deploy_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214338,10 +209923,8 @@ def index_octopus_deploy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214394,8 +209977,7 @@ def index_octopus_deploy_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214444,8 +210026,7 @@ def index_octopus_deploy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214463,7 +210044,7 @@ def index_octopus_deploy_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"octopus-deploy\" @@ -214503,10 +210084,8 @@ def index_octopus_deploy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214559,8 +210138,7 @@ def index_octopus_deploy_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214604,8 +210182,7 @@ def _index_octopus_deploy_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214618,7 +210195,10 @@ def _index_octopus_deploy_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -214702,13 +210282,9 @@ def _index_octopus_deploy_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -214791,8 +210367,7 @@ def index_okta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214810,7 +210385,7 @@ def index_okta_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: """Return vulnerability data stored in index \"okta\" @@ -214850,10 +210425,8 @@ def index_okta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214906,8 +210479,7 @@ def index_okta_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214956,8 +210528,7 @@ def index_okta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214975,7 +210546,7 @@ def index_okta_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: """Return vulnerability data stored in index \"okta\" @@ -215015,10 +210586,8 @@ def index_okta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215071,8 +210640,7 @@ def index_okta_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215121,8 +210689,7 @@ def index_okta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215140,7 +210707,7 @@ def index_okta_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"okta\" @@ -215180,10 +210747,8 @@ def index_okta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215236,8 +210801,7 @@ def index_okta_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215281,8 +210845,7 @@ def _index_okta_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215295,7 +210858,10 @@ def _index_okta_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -215379,13 +210945,9 @@ def _index_okta_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -215468,8 +211030,7 @@ def index_omron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215487,7 +211048,7 @@ def index_omron_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: """Return vulnerability data stored in index \"omron\" @@ -215527,10 +211088,8 @@ def index_omron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215583,8 +211142,7 @@ def index_omron_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215633,8 +211191,7 @@ def index_omron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215652,7 +211209,7 @@ def index_omron_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: """Return vulnerability data stored in index \"omron\" @@ -215692,10 +211249,8 @@ def index_omron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215748,8 +211303,7 @@ def index_omron_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215798,8 +211352,7 @@ def index_omron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215817,7 +211370,7 @@ def index_omron_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"omron\" @@ -215857,10 +211410,8 @@ def index_omron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215913,8 +211464,7 @@ def index_omron_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215958,8 +211508,7 @@ def _index_omron_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215972,7 +211521,10 @@ def _index_omron_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -216056,13 +211608,9 @@ def _index_omron_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -216145,8 +211693,7 @@ def index_one_e_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216164,7 +211711,7 @@ def index_one_e_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: """Return vulnerability data stored in index \"one-e\" @@ -216204,10 +211751,8 @@ def index_one_e_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216260,8 +211805,7 @@ def index_one_e_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216310,8 +211854,7 @@ def index_one_e_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216329,7 +211872,7 @@ def index_one_e_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: """Return vulnerability data stored in index \"one-e\" @@ -216369,10 +211912,8 @@ def index_one_e_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216425,8 +211966,7 @@ def index_one_e_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216475,8 +212015,7 @@ def index_one_e_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216494,7 +212033,7 @@ def index_one_e_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"one-e\" @@ -216534,10 +212073,8 @@ def index_one_e_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216590,8 +212127,7 @@ def index_one_e_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216635,8 +212171,7 @@ def _index_one_e_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216649,7 +212184,10 @@ def _index_one_e_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -216733,13 +212271,9 @@ def _index_one_e_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -216822,8 +212356,7 @@ def index_opam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216841,7 +212374,7 @@ def index_opam_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"opam\" @@ -216881,10 +212414,8 @@ def index_opam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216937,8 +212468,7 @@ def index_opam_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216987,8 +212517,7 @@ def index_opam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217006,7 +212535,7 @@ def index_opam_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"opam\" @@ -217046,10 +212575,8 @@ def index_opam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217102,8 +212629,7 @@ def index_opam_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217152,8 +212678,7 @@ def index_opam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217171,7 +212696,7 @@ def index_opam_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"opam\" @@ -217211,10 +212736,8 @@ def index_opam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217267,8 +212790,7 @@ def index_opam_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217312,8 +212834,7 @@ def _index_opam_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -217326,7 +212847,10 @@ def _index_opam_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -217410,13 +212934,9 @@ def _index_opam_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -217499,8 +213019,7 @@ def index_open_cvdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217518,7 +213037,7 @@ def index_open_cvdb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: """Return vulnerability data stored in index \"open-cvdb\" @@ -217558,10 +213077,8 @@ def index_open_cvdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217614,8 +213131,7 @@ def index_open_cvdb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217664,8 +213180,7 @@ def index_open_cvdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217683,7 +213198,7 @@ def index_open_cvdb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: """Return vulnerability data stored in index \"open-cvdb\" @@ -217723,10 +213238,8 @@ def index_open_cvdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217779,8 +213292,7 @@ def index_open_cvdb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217829,8 +213341,7 @@ def index_open_cvdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217848,7 +213359,7 @@ def index_open_cvdb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"open-cvdb\" @@ -217888,10 +213399,8 @@ def index_open_cvdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217944,8 +213453,7 @@ def index_open_cvdb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217989,8 +213497,7 @@ def _index_open_cvdb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218003,7 +213510,10 @@ def _index_open_cvdb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -218087,13 +213597,9 @@ def _index_open_cvdb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -218176,8 +213682,7 @@ def index_openbsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218195,7 +213700,7 @@ def index_openbsd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: """Return vulnerability data stored in index \"openbsd\" @@ -218235,10 +213740,8 @@ def index_openbsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218291,8 +213794,7 @@ def index_openbsd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218341,8 +213843,7 @@ def index_openbsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218360,7 +213861,7 @@ def index_openbsd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: """Return vulnerability data stored in index \"openbsd\" @@ -218400,10 +213901,8 @@ def index_openbsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218456,8 +213955,7 @@ def index_openbsd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218506,8 +214004,7 @@ def index_openbsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218525,7 +214022,7 @@ def index_openbsd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openbsd\" @@ -218565,10 +214062,8 @@ def index_openbsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218621,8 +214116,7 @@ def index_openbsd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218666,8 +214160,7 @@ def _index_openbsd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218680,7 +214173,10 @@ def _index_openbsd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -218764,13 +214260,9 @@ def _index_openbsd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -218853,8 +214345,7 @@ def index_opengear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218872,7 +214363,7 @@ def index_opengear_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: """Return vulnerability data stored in index \"opengear\" @@ -218912,10 +214403,8 @@ def index_opengear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218968,8 +214457,7 @@ def index_opengear_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219018,8 +214506,7 @@ def index_opengear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219037,7 +214524,7 @@ def index_opengear_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: """Return vulnerability data stored in index \"opengear\" @@ -219077,10 +214564,8 @@ def index_opengear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219133,8 +214618,7 @@ def index_opengear_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219183,8 +214667,7 @@ def index_opengear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219202,7 +214685,7 @@ def index_opengear_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"opengear\" @@ -219242,10 +214725,8 @@ def index_opengear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219298,8 +214779,7 @@ def index_opengear_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219343,8 +214823,7 @@ def _index_opengear_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -219357,7 +214836,10 @@ def _index_opengear_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -219441,13 +214923,9 @@ def _index_opengear_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -219530,8 +215008,7 @@ def index_openjdk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219549,7 +215026,7 @@ def index_openjdk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: """Return vulnerability data stored in index \"openjdk\" @@ -219589,10 +215066,8 @@ def index_openjdk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219645,8 +215120,7 @@ def index_openjdk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219695,8 +215169,7 @@ def index_openjdk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219714,7 +215187,7 @@ def index_openjdk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: """Return vulnerability data stored in index \"openjdk\" @@ -219754,10 +215227,8 @@ def index_openjdk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219810,8 +215281,7 @@ def index_openjdk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219860,8 +215330,7 @@ def index_openjdk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219879,7 +215348,7 @@ def index_openjdk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openjdk\" @@ -219919,10 +215388,8 @@ def index_openjdk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219975,8 +215442,7 @@ def index_openjdk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220020,8 +215486,7 @@ def _index_openjdk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220034,7 +215499,10 @@ def _index_openjdk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -220118,13 +215586,9 @@ def _index_openjdk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -220207,8 +215671,7 @@ def index_openssh_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220226,7 +215689,7 @@ def index_openssh_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: """Return vulnerability data stored in index \"openssh\" @@ -220266,10 +215729,8 @@ def index_openssh_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220322,8 +215783,7 @@ def index_openssh_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220372,8 +215832,7 @@ def index_openssh_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220391,7 +215850,7 @@ def index_openssh_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: """Return vulnerability data stored in index \"openssh\" @@ -220431,10 +215890,8 @@ def index_openssh_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220487,8 +215944,7 @@ def index_openssh_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220537,8 +215993,7 @@ def index_openssh_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220556,7 +216011,7 @@ def index_openssh_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openssh\" @@ -220596,10 +216051,8 @@ def index_openssh_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220652,8 +216105,7 @@ def index_openssh_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220697,8 +216149,7 @@ def _index_openssh_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220711,7 +216162,10 @@ def _index_openssh_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -220795,13 +216249,9 @@ def _index_openssh_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -220884,8 +216334,7 @@ def index_openssl_secadv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220903,7 +216352,7 @@ def index_openssl_secadv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: """Return vulnerability data stored in index \"openssl-secadv\" @@ -220943,10 +216392,8 @@ def index_openssl_secadv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220999,8 +216446,7 @@ def index_openssl_secadv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221049,8 +216495,7 @@ def index_openssl_secadv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221068,7 +216513,7 @@ def index_openssl_secadv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: """Return vulnerability data stored in index \"openssl-secadv\" @@ -221108,10 +216553,8 @@ def index_openssl_secadv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221164,8 +216607,7 @@ def index_openssl_secadv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221214,8 +216656,7 @@ def index_openssl_secadv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221233,7 +216674,7 @@ def index_openssl_secadv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openssl-secadv\" @@ -221273,10 +216714,8 @@ def index_openssl_secadv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221329,8 +216768,7 @@ def index_openssl_secadv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221374,8 +216812,7 @@ def _index_openssl_secadv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -221388,7 +216825,10 @@ def _index_openssl_secadv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -221472,13 +216912,9 @@ def _index_openssl_secadv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -221561,8 +216997,7 @@ def index_openstack_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221580,7 +217015,7 @@ def index_openstack_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: """Return vulnerability data stored in index \"openstack\" @@ -221620,10 +217055,8 @@ def index_openstack_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221676,8 +217109,7 @@ def index_openstack_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221726,8 +217158,7 @@ def index_openstack_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221745,7 +217176,7 @@ def index_openstack_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: """Return vulnerability data stored in index \"openstack\" @@ -221785,10 +217216,8 @@ def index_openstack_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221841,8 +217270,7 @@ def index_openstack_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221891,8 +217319,7 @@ def index_openstack_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221910,7 +217337,7 @@ def index_openstack_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openstack\" @@ -221950,10 +217377,8 @@ def index_openstack_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222006,8 +217431,7 @@ def index_openstack_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222051,8 +217475,7 @@ def _index_openstack_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222065,7 +217488,10 @@ def _index_openstack_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -222149,13 +217575,9 @@ def _index_openstack_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -222238,8 +217660,7 @@ def index_openwrt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222257,7 +217678,7 @@ def index_openwrt_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: """Return vulnerability data stored in index \"openwrt\" @@ -222297,10 +217718,8 @@ def index_openwrt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222353,8 +217772,7 @@ def index_openwrt_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222403,8 +217821,7 @@ def index_openwrt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222422,7 +217839,7 @@ def index_openwrt_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: """Return vulnerability data stored in index \"openwrt\" @@ -222462,10 +217879,8 @@ def index_openwrt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222518,8 +217933,7 @@ def index_openwrt_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222568,8 +217982,7 @@ def index_openwrt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222587,7 +218000,7 @@ def index_openwrt_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"openwrt\" @@ -222627,10 +218040,8 @@ def index_openwrt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222683,8 +218094,7 @@ def index_openwrt_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222728,8 +218138,7 @@ def _index_openwrt_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222742,7 +218151,10 @@ def _index_openwrt_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -222826,13 +218238,9 @@ def _index_openwrt_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -222915,8 +218323,7 @@ def index_oracle_cpu_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222934,7 +218341,7 @@ def index_oracle_cpu_csaf_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -222974,10 +218381,8 @@ def index_oracle_cpu_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223030,8 +218435,7 @@ def index_oracle_cpu_csaf_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223080,8 +218484,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223099,7 +218502,7 @@ def index_oracle_cpu_csaf_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -223139,10 +218542,8 @@ def index_oracle_cpu_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223195,8 +218596,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223245,8 +218645,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223264,7 +218663,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -223304,10 +218703,8 @@ def index_oracle_cpu_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223360,8 +218757,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223405,8 +218801,7 @@ def _index_oracle_cpu_csaf_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -223419,7 +218814,10 @@ def _index_oracle_cpu_csaf_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -223503,13 +218901,9 @@ def _index_oracle_cpu_csaf_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -223592,8 +218986,7 @@ def index_oracle_cpu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223611,7 +219004,7 @@ def index_oracle_cpu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223651,10 +219044,8 @@ def index_oracle_cpu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223707,8 +219098,7 @@ def index_oracle_cpu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223757,8 +219147,7 @@ def index_oracle_cpu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223776,7 +219165,7 @@ def index_oracle_cpu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223816,10 +219205,8 @@ def index_oracle_cpu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223872,8 +219259,7 @@ def index_oracle_cpu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223922,8 +219308,7 @@ def index_oracle_cpu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223941,7 +219326,7 @@ def index_oracle_cpu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle-cpu\" @@ -223981,10 +219366,8 @@ def index_oracle_cpu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224037,8 +219420,7 @@ def index_oracle_cpu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224082,8 +219464,7 @@ def _index_oracle_cpu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224096,7 +219477,10 @@ def _index_oracle_cpu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -224180,13 +219564,9 @@ def _index_oracle_cpu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -224269,8 +219649,7 @@ def index_oracle_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224288,7 +219667,7 @@ def index_oracle_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: """Return vulnerability data stored in index \"oracle\" @@ -224328,10 +219707,8 @@ def index_oracle_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224384,8 +219761,7 @@ def index_oracle_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224434,8 +219810,7 @@ def index_oracle_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224453,7 +219828,7 @@ def index_oracle_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: """Return vulnerability data stored in index \"oracle\" @@ -224493,10 +219868,8 @@ def index_oracle_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224549,8 +219922,7 @@ def index_oracle_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224599,8 +219971,7 @@ def index_oracle_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224618,7 +219989,7 @@ def index_oracle_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"oracle\" @@ -224658,10 +220029,8 @@ def index_oracle_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224714,8 +220083,7 @@ def index_oracle_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224759,8 +220127,7 @@ def _index_oracle_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224773,7 +220140,10 @@ def _index_oracle_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -224857,13 +220227,9 @@ def _index_oracle_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -224946,8 +220312,7 @@ def index_osv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224965,7 +220330,7 @@ def index_osv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: """Return vulnerability data stored in index \"osv\" @@ -225005,10 +220370,8 @@ def index_osv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225061,8 +220424,7 @@ def index_osv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225111,8 +220473,7 @@ def index_osv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225130,7 +220491,7 @@ def index_osv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: """Return vulnerability data stored in index \"osv\" @@ -225170,10 +220531,8 @@ def index_osv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225226,8 +220585,7 @@ def index_osv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225276,8 +220634,7 @@ def index_osv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225295,7 +220652,7 @@ def index_osv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"osv\" @@ -225335,10 +220692,8 @@ def index_osv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225391,8 +220746,7 @@ def index_osv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225436,8 +220790,7 @@ def _index_osv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -225450,7 +220803,10 @@ def _index_osv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -225534,13 +220890,9 @@ def _index_osv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -225623,8 +220975,7 @@ def index_otrs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225642,7 +220993,7 @@ def index_otrs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: """Return vulnerability data stored in index \"otrs\" @@ -225682,10 +221033,8 @@ def index_otrs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225738,8 +221087,7 @@ def index_otrs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225788,8 +221136,7 @@ def index_otrs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225807,7 +221154,7 @@ def index_otrs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: """Return vulnerability data stored in index \"otrs\" @@ -225847,10 +221194,8 @@ def index_otrs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225903,8 +221248,7 @@ def index_otrs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225953,8 +221297,7 @@ def index_otrs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225972,7 +221315,7 @@ def index_otrs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"otrs\" @@ -226012,10 +221355,8 @@ def index_otrs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226068,8 +221409,7 @@ def index_otrs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226113,8 +221453,7 @@ def _index_otrs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226127,7 +221466,10 @@ def _index_otrs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -226211,13 +221553,9 @@ def _index_otrs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -226300,8 +221638,7 @@ def index_owncloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226319,7 +221656,7 @@ def index_owncloud_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: """Return vulnerability data stored in index \"owncloud\" @@ -226359,10 +221696,8 @@ def index_owncloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226415,8 +221750,7 @@ def index_owncloud_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226465,8 +221799,7 @@ def index_owncloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226484,7 +221817,7 @@ def index_owncloud_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: """Return vulnerability data stored in index \"owncloud\" @@ -226524,10 +221857,8 @@ def index_owncloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226580,8 +221911,7 @@ def index_owncloud_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226630,8 +221960,7 @@ def index_owncloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226649,7 +221978,7 @@ def index_owncloud_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"owncloud\" @@ -226689,10 +222018,8 @@ def index_owncloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226745,8 +222072,7 @@ def index_owncloud_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226790,8 +222116,7 @@ def _index_owncloud_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226804,7 +222129,10 @@ def _index_owncloud_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -226888,13 +222216,9 @@ def _index_owncloud_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -226977,8 +222301,7 @@ def index_packetstorm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226996,7 +222319,7 @@ def index_packetstorm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: """Return vulnerability data stored in index \"packetstorm\" @@ -227036,10 +222359,8 @@ def index_packetstorm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227092,8 +222413,7 @@ def index_packetstorm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227142,8 +222462,7 @@ def index_packetstorm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227161,7 +222480,7 @@ def index_packetstorm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: """Return vulnerability data stored in index \"packetstorm\" @@ -227201,10 +222520,8 @@ def index_packetstorm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227257,8 +222574,7 @@ def index_packetstorm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227307,8 +222623,7 @@ def index_packetstorm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227326,7 +222641,7 @@ def index_packetstorm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"packetstorm\" @@ -227366,10 +222681,8 @@ def index_packetstorm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227422,8 +222735,7 @@ def index_packetstorm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227467,8 +222779,7 @@ def _index_packetstorm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -227481,7 +222792,10 @@ def _index_packetstorm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -227565,13 +222879,9 @@ def _index_packetstorm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -227654,8 +222964,7 @@ def index_palantir_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227673,7 +222982,7 @@ def index_palantir_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: """Return vulnerability data stored in index \"palantir\" @@ -227713,10 +223022,8 @@ def index_palantir_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227769,8 +223076,7 @@ def index_palantir_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227819,8 +223125,7 @@ def index_palantir_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227838,7 +223143,7 @@ def index_palantir_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: """Return vulnerability data stored in index \"palantir\" @@ -227878,10 +223183,8 @@ def index_palantir_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227934,8 +223237,7 @@ def index_palantir_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227984,8 +223286,7 @@ def index_palantir_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228003,7 +223304,7 @@ def index_palantir_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"palantir\" @@ -228043,10 +223344,8 @@ def index_palantir_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228099,8 +223398,7 @@ def index_palantir_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228144,8 +223442,7 @@ def _index_palantir_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228158,7 +223455,10 @@ def _index_palantir_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -228242,13 +223542,9 @@ def _index_palantir_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -228331,8 +223627,7 @@ def index_palo_alto_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228350,7 +223645,7 @@ def index_palo_alto_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: """Return vulnerability data stored in index \"palo-alto\" @@ -228390,10 +223685,8 @@ def index_palo_alto_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228446,8 +223739,7 @@ def index_palo_alto_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228496,8 +223788,7 @@ def index_palo_alto_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228515,7 +223806,7 @@ def index_palo_alto_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"palo-alto\" @@ -228555,10 +223846,8 @@ def index_palo_alto_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228611,8 +223900,7 @@ def index_palo_alto_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228661,8 +223949,7 @@ def index_palo_alto_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228680,7 +223967,7 @@ def index_palo_alto_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"palo-alto\" @@ -228720,10 +224007,8 @@ def index_palo_alto_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228776,8 +224061,7 @@ def index_palo_alto_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228821,8 +224105,7 @@ def _index_palo_alto_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228835,7 +224118,10 @@ def _index_palo_alto_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -228919,13 +224205,9 @@ def _index_palo_alto_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -229008,8 +224290,7 @@ def index_panasonic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229027,7 +224308,7 @@ def index_panasonic_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: """Return vulnerability data stored in index \"panasonic\" @@ -229067,10 +224348,8 @@ def index_panasonic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229123,8 +224402,7 @@ def index_panasonic_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229173,8 +224451,7 @@ def index_panasonic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229192,7 +224469,7 @@ def index_panasonic_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: """Return vulnerability data stored in index \"panasonic\" @@ -229232,10 +224509,8 @@ def index_panasonic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229288,8 +224563,7 @@ def index_panasonic_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229338,8 +224612,7 @@ def index_panasonic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229357,7 +224630,7 @@ def index_panasonic_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"panasonic\" @@ -229397,10 +224670,8 @@ def index_panasonic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229453,8 +224724,7 @@ def index_panasonic_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229498,8 +224768,7 @@ def _index_panasonic_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -229512,7 +224781,10 @@ def _index_panasonic_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -229596,13 +224868,9 @@ def _index_panasonic_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -229685,8 +224953,7 @@ def index_papercut_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229704,7 +224971,7 @@ def index_papercut_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: """Return vulnerability data stored in index \"papercut\" @@ -229744,10 +225011,8 @@ def index_papercut_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229800,8 +225065,7 @@ def index_papercut_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229850,8 +225114,7 @@ def index_papercut_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229869,7 +225132,7 @@ def index_papercut_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: """Return vulnerability data stored in index \"papercut\" @@ -229909,10 +225172,8 @@ def index_papercut_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229965,8 +225226,7 @@ def index_papercut_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230015,8 +225275,7 @@ def index_papercut_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230034,7 +225293,7 @@ def index_papercut_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"papercut\" @@ -230074,10 +225333,8 @@ def index_papercut_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230130,8 +225387,7 @@ def index_papercut_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230175,8 +225431,7 @@ def _index_papercut_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230189,7 +225444,10 @@ def _index_papercut_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -230273,13 +225531,9 @@ def _index_papercut_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -230362,8 +225616,7 @@ def index_pega_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230381,7 +225634,7 @@ def index_pega_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: """Return vulnerability data stored in index \"pega\" @@ -230421,10 +225674,8 @@ def index_pega_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230477,8 +225728,7 @@ def index_pega_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230527,8 +225777,7 @@ def index_pega_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230546,7 +225795,7 @@ def index_pega_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: """Return vulnerability data stored in index \"pega\" @@ -230586,10 +225835,8 @@ def index_pega_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230642,8 +225889,7 @@ def index_pega_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230692,8 +225938,7 @@ def index_pega_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230711,7 +225956,7 @@ def index_pega_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pega\" @@ -230751,10 +225996,8 @@ def index_pega_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230807,8 +226050,7 @@ def index_pega_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230852,8 +226094,7 @@ def _index_pega_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230866,7 +226107,10 @@ def _index_pega_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -230950,13 +226194,9 @@ def _index_pega_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -231039,8 +226279,7 @@ def index_philips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231058,7 +226297,7 @@ def index_philips_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"philips\" @@ -231098,10 +226337,8 @@ def index_philips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231154,8 +226391,7 @@ def index_philips_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231204,8 +226440,7 @@ def index_philips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231223,7 +226458,7 @@ def index_philips_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"philips\" @@ -231263,10 +226498,8 @@ def index_philips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231319,8 +226552,7 @@ def index_philips_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231369,8 +226601,7 @@ def index_philips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231388,7 +226619,7 @@ def index_philips_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"philips\" @@ -231428,10 +226659,8 @@ def index_philips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231484,8 +226713,7 @@ def index_philips_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231529,8 +226757,7 @@ def _index_philips_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -231543,7 +226770,10 @@ def _index_philips_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -231627,13 +226857,9 @@ def _index_philips_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -231716,8 +226942,7 @@ def index_phoenix_contact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231735,7 +226960,7 @@ def index_phoenix_contact_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: """Return vulnerability data stored in index \"phoenix-contact\" @@ -231775,10 +227000,8 @@ def index_phoenix_contact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231831,8 +227054,7 @@ def index_phoenix_contact_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231881,8 +227103,7 @@ def index_phoenix_contact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231900,7 +227121,7 @@ def index_phoenix_contact_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"phoenix-contact\" @@ -231940,10 +227161,8 @@ def index_phoenix_contact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231996,8 +227215,7 @@ def index_phoenix_contact_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232046,8 +227264,7 @@ def index_phoenix_contact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232065,7 +227282,7 @@ def index_phoenix_contact_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"phoenix-contact\" @@ -232105,10 +227322,8 @@ def index_phoenix_contact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232161,8 +227376,7 @@ def index_phoenix_contact_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232206,8 +227420,7 @@ def _index_phoenix_contact_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232220,7 +227433,10 @@ def _index_phoenix_contact_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -232304,13 +227520,9 @@ def _index_phoenix_contact_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -232393,8 +227605,7 @@ def index_php_my_admin_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232412,7 +227623,7 @@ def index_php_my_admin_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: """Return vulnerability data stored in index \"php-my-admin\" @@ -232452,10 +227663,8 @@ def index_php_my_admin_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232508,8 +227717,7 @@ def index_php_my_admin_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232558,8 +227766,7 @@ def index_php_my_admin_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232577,7 +227784,7 @@ def index_php_my_admin_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: """Return vulnerability data stored in index \"php-my-admin\" @@ -232617,10 +227824,8 @@ def index_php_my_admin_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232673,8 +227878,7 @@ def index_php_my_admin_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232723,8 +227927,7 @@ def index_php_my_admin_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232742,7 +227945,7 @@ def index_php_my_admin_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"php-my-admin\" @@ -232782,10 +227985,8 @@ def index_php_my_admin_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232838,8 +228039,7 @@ def index_php_my_admin_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232883,8 +228083,7 @@ def _index_php_my_admin_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232897,7 +228096,10 @@ def _index_php_my_admin_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -232981,13 +228183,9 @@ def _index_php_my_admin_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -233070,8 +228268,7 @@ def index_pkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233089,7 +228286,7 @@ def index_pkcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: """Return vulnerability data stored in index \"pkcert\" @@ -233129,10 +228326,8 @@ def index_pkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233185,8 +228380,7 @@ def index_pkcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233235,8 +228429,7 @@ def index_pkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233254,7 +228447,7 @@ def index_pkcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: """Return vulnerability data stored in index \"pkcert\" @@ -233294,10 +228487,8 @@ def index_pkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233350,8 +228541,7 @@ def index_pkcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233400,8 +228590,7 @@ def index_pkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233419,7 +228608,7 @@ def index_pkcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pkcert\" @@ -233459,10 +228648,8 @@ def index_pkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233515,8 +228702,7 @@ def index_pkcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233560,8 +228746,7 @@ def _index_pkcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -233574,7 +228759,10 @@ def _index_pkcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -233658,13 +228846,9 @@ def _index_pkcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -233747,8 +228931,7 @@ def index_postgressql_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233766,7 +228949,7 @@ def index_postgressql_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: """Return vulnerability data stored in index \"postgressql\" @@ -233806,10 +228989,8 @@ def index_postgressql_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233862,8 +229043,7 @@ def index_postgressql_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233912,8 +229092,7 @@ def index_postgressql_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233931,7 +229110,7 @@ def index_postgressql_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: """Return vulnerability data stored in index \"postgressql\" @@ -233971,10 +229150,8 @@ def index_postgressql_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234027,8 +229204,7 @@ def index_postgressql_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234077,8 +229253,7 @@ def index_postgressql_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234096,7 +229271,7 @@ def index_postgressql_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"postgressql\" @@ -234136,10 +229311,8 @@ def index_postgressql_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234192,8 +229365,7 @@ def index_postgressql_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234237,8 +229409,7 @@ def _index_postgressql_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234251,7 +229422,10 @@ def _index_postgressql_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -234335,13 +229509,9 @@ def _index_postgressql_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -234424,8 +229594,7 @@ def index_powerdns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234443,7 +229612,7 @@ def index_powerdns_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: """Return vulnerability data stored in index \"powerdns\" @@ -234483,10 +229652,8 @@ def index_powerdns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234539,8 +229706,7 @@ def index_powerdns_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234589,8 +229755,7 @@ def index_powerdns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234608,7 +229773,7 @@ def index_powerdns_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: """Return vulnerability data stored in index \"powerdns\" @@ -234648,10 +229813,8 @@ def index_powerdns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234704,8 +229867,7 @@ def index_powerdns_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234754,8 +229916,7 @@ def index_powerdns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234773,7 +229934,7 @@ def index_powerdns_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"powerdns\" @@ -234813,10 +229974,8 @@ def index_powerdns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234869,8 +230028,7 @@ def index_powerdns_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234914,8 +230072,7 @@ def _index_powerdns_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234928,7 +230085,10 @@ def _index_powerdns_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -235012,13 +230172,9 @@ def _index_powerdns_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -235101,8 +230257,7 @@ def index_progress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235120,7 +230275,7 @@ def index_progress_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: """Return vulnerability data stored in index \"progress\" @@ -235160,10 +230315,8 @@ def index_progress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235216,8 +230369,7 @@ def index_progress_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235266,8 +230418,7 @@ def index_progress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235285,7 +230436,7 @@ def index_progress_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: """Return vulnerability data stored in index \"progress\" @@ -235325,10 +230476,8 @@ def index_progress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235381,8 +230530,7 @@ def index_progress_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235431,8 +230579,7 @@ def index_progress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235450,7 +230597,7 @@ def index_progress_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"progress\" @@ -235490,10 +230637,8 @@ def index_progress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235546,8 +230691,7 @@ def index_progress_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235591,8 +230735,7 @@ def _index_progress_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235605,7 +230748,10 @@ def _index_progress_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -235689,13 +230835,9 @@ def _index_progress_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -235778,8 +230920,7 @@ def index_proofpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235797,7 +230938,7 @@ def index_proofpoint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: """Return vulnerability data stored in index \"proofpoint\" @@ -235837,10 +230978,8 @@ def index_proofpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235893,8 +231032,7 @@ def index_proofpoint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235943,8 +231081,7 @@ def index_proofpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235962,7 +231099,7 @@ def index_proofpoint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: """Return vulnerability data stored in index \"proofpoint\" @@ -236002,10 +231139,8 @@ def index_proofpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236058,8 +231193,7 @@ def index_proofpoint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236108,8 +231242,7 @@ def index_proofpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236127,7 +231260,7 @@ def index_proofpoint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"proofpoint\" @@ -236167,10 +231300,8 @@ def index_proofpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236223,8 +231354,7 @@ def index_proofpoint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236268,8 +231398,7 @@ def _index_proofpoint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236282,7 +231411,10 @@ def _index_proofpoint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -236366,13 +231498,9 @@ def _index_proofpoint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -236455,8 +231583,7 @@ def index_ptc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236474,7 +231601,7 @@ def index_ptc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: """Return vulnerability data stored in index \"ptc\" @@ -236514,10 +231641,8 @@ def index_ptc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236570,8 +231695,7 @@ def index_ptc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236620,8 +231744,7 @@ def index_ptc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236639,7 +231762,7 @@ def index_ptc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: """Return vulnerability data stored in index \"ptc\" @@ -236679,10 +231802,8 @@ def index_ptc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236735,8 +231856,7 @@ def index_ptc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236785,8 +231905,7 @@ def index_ptc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236804,7 +231923,7 @@ def index_ptc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ptc\" @@ -236844,10 +231963,8 @@ def index_ptc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236900,8 +232017,7 @@ def index_ptc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236945,8 +232061,7 @@ def _index_ptc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236959,7 +232074,10 @@ def _index_ptc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -237043,13 +232161,9 @@ def _index_ptc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -237132,8 +232246,7 @@ def index_pub_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237151,7 +232264,7 @@ def index_pub_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"pub\" @@ -237191,10 +232304,8 @@ def index_pub_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237247,8 +232358,7 @@ def index_pub_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237297,8 +232407,7 @@ def index_pub_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237316,7 +232425,7 @@ def index_pub_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"pub\" @@ -237356,10 +232465,8 @@ def index_pub_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237412,8 +232519,7 @@ def index_pub_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237462,8 +232568,7 @@ def index_pub_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237481,7 +232586,7 @@ def index_pub_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pub\" @@ -237521,10 +232626,8 @@ def index_pub_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237577,8 +232680,7 @@ def index_pub_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237622,8 +232724,7 @@ def _index_pub_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237636,7 +232737,10 @@ def _index_pub_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -237720,13 +232824,9 @@ def _index_pub_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -237809,8 +232909,7 @@ def index_pure_storage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237828,7 +232927,7 @@ def index_pure_storage_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: """Return vulnerability data stored in index \"pure-storage\" @@ -237868,10 +232967,8 @@ def index_pure_storage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237924,8 +233021,7 @@ def index_pure_storage_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237974,8 +233070,7 @@ def index_pure_storage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237993,7 +233088,7 @@ def index_pure_storage_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: """Return vulnerability data stored in index \"pure-storage\" @@ -238033,10 +233128,8 @@ def index_pure_storage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238089,8 +233182,7 @@ def index_pure_storage_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238139,8 +233231,7 @@ def index_pure_storage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238158,7 +233249,7 @@ def index_pure_storage_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pure-storage\" @@ -238198,10 +233289,8 @@ def index_pure_storage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238254,8 +233343,7 @@ def index_pure_storage_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238299,8 +233387,7 @@ def _index_pure_storage_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238313,7 +233400,10 @@ def _index_pure_storage_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -238397,13 +233487,9 @@ def _index_pure_storage_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -238486,8 +233572,7 @@ def index_pypa_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238505,7 +233590,7 @@ def index_pypa_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238545,10 +233630,8 @@ def index_pypa_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238601,8 +233684,7 @@ def index_pypa_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238651,8 +233733,7 @@ def index_pypa_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238670,7 +233751,7 @@ def index_pypa_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238710,10 +233791,8 @@ def index_pypa_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238766,8 +233845,7 @@ def index_pypa_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238816,8 +233894,7 @@ def index_pypa_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238835,7 +233912,7 @@ def index_pypa_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pypa-advisories\" @@ -238875,10 +233952,8 @@ def index_pypa_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238931,8 +234006,7 @@ def index_pypa_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238976,8 +234050,7 @@ def _index_pypa_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238990,7 +234063,10 @@ def _index_pypa_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -239074,13 +234150,9 @@ def _index_pypa_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -239163,8 +234235,7 @@ def index_pypi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239182,7 +234253,7 @@ def index_pypi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"pypi\" @@ -239222,10 +234293,8 @@ def index_pypi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239278,8 +234347,7 @@ def index_pypi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239328,8 +234396,7 @@ def index_pypi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239347,7 +234414,7 @@ def index_pypi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"pypi\" @@ -239387,10 +234454,8 @@ def index_pypi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239443,8 +234508,7 @@ def index_pypi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239493,8 +234557,7 @@ def index_pypi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239512,7 +234575,7 @@ def index_pypi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"pypi\" @@ -239552,10 +234615,8 @@ def index_pypi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239608,8 +234669,7 @@ def index_pypi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239653,8 +234713,7 @@ def _index_pypi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239667,7 +234726,10 @@ def _index_pypi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -239751,13 +234813,9 @@ def _index_pypi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -239840,8 +234898,7 @@ def index_qnap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239859,7 +234916,7 @@ def index_qnap_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: """Return vulnerability data stored in index \"qnap\" @@ -239899,10 +234956,8 @@ def index_qnap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239955,8 +235010,7 @@ def index_qnap_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240005,8 +235059,7 @@ def index_qnap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240024,7 +235077,7 @@ def index_qnap_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"qnap\" @@ -240064,10 +235117,8 @@ def index_qnap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240120,8 +235171,7 @@ def index_qnap_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240170,8 +235220,7 @@ def index_qnap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240189,7 +235238,7 @@ def index_qnap_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qnap\" @@ -240229,10 +235278,8 @@ def index_qnap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240285,8 +235332,7 @@ def index_qnap_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240330,8 +235376,7 @@ def _index_qnap_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -240344,7 +235389,10 @@ def _index_qnap_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -240428,13 +235476,9 @@ def _index_qnap_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -240517,8 +235561,7 @@ def index_qqids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240536,7 +235579,7 @@ def index_qqids_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: """Return vulnerability data stored in index \"qqids\" @@ -240576,10 +235619,8 @@ def index_qqids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240632,8 +235673,7 @@ def index_qqids_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240682,8 +235722,7 @@ def index_qqids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240701,7 +235740,7 @@ def index_qqids_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: """Return vulnerability data stored in index \"qqids\" @@ -240741,10 +235780,8 @@ def index_qqids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240797,8 +235834,7 @@ def index_qqids_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240847,8 +235883,7 @@ def index_qqids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240866,7 +235901,7 @@ def index_qqids_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qqids\" @@ -240906,10 +235941,8 @@ def index_qqids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240962,8 +235995,7 @@ def index_qqids_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241007,8 +236039,7 @@ def _index_qqids_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241021,7 +236052,10 @@ def _index_qqids_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -241105,13 +236139,9 @@ def _index_qqids_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -241194,8 +236224,7 @@ def index_qualcomm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241213,7 +236242,7 @@ def index_qualcomm_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: """Return vulnerability data stored in index \"qualcomm\" @@ -241253,10 +236282,8 @@ def index_qualcomm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241309,8 +236336,7 @@ def index_qualcomm_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241359,8 +236385,7 @@ def index_qualcomm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241378,7 +236403,7 @@ def index_qualcomm_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: """Return vulnerability data stored in index \"qualcomm\" @@ -241418,10 +236443,8 @@ def index_qualcomm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241474,8 +236497,7 @@ def index_qualcomm_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241524,8 +236546,7 @@ def index_qualcomm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241543,7 +236564,7 @@ def index_qualcomm_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualcomm\" @@ -241583,10 +236604,8 @@ def index_qualcomm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241639,8 +236658,7 @@ def index_qualcomm_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241684,8 +236702,7 @@ def _index_qualcomm_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241698,7 +236715,10 @@ def _index_qualcomm_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -241782,13 +236802,9 @@ def _index_qualcomm_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -241871,8 +236887,7 @@ def index_qualys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241890,7 +236905,7 @@ def index_qualys_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: """Return vulnerability data stored in index \"qualys\" @@ -241930,10 +236945,8 @@ def index_qualys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241986,8 +236999,7 @@ def index_qualys_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242036,8 +237048,7 @@ def index_qualys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242055,7 +237066,7 @@ def index_qualys_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: """Return vulnerability data stored in index \"qualys\" @@ -242095,10 +237106,8 @@ def index_qualys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242151,8 +237160,7 @@ def index_qualys_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242201,8 +237209,7 @@ def index_qualys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242220,7 +237227,7 @@ def index_qualys_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualys\" @@ -242260,10 +237267,8 @@ def index_qualys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242316,8 +237321,7 @@ def index_qualys_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242361,8 +237365,7 @@ def _index_qualys_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -242375,7 +237378,10 @@ def _index_qualys_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -242459,13 +237465,9 @@ def _index_qualys_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -242548,8 +237550,7 @@ def index_qualys_qids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242567,7 +237568,7 @@ def index_qualys_qids_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: """Return vulnerability data stored in index \"qualys-qids\" @@ -242607,10 +237608,8 @@ def index_qualys_qids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242663,8 +237662,7 @@ def index_qualys_qids_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242713,8 +237711,7 @@ def index_qualys_qids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242732,7 +237729,7 @@ def index_qualys_qids_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: """Return vulnerability data stored in index \"qualys-qids\" @@ -242772,10 +237769,8 @@ def index_qualys_qids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242828,8 +237823,7 @@ def index_qualys_qids_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242878,8 +237872,7 @@ def index_qualys_qids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242897,7 +237890,7 @@ def index_qualys_qids_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qualys-qids\" @@ -242937,10 +237930,8 @@ def index_qualys_qids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242993,8 +237984,7 @@ def index_qualys_qids_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243038,8 +238028,7 @@ def _index_qualys_qids_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243052,7 +238041,10 @@ def _index_qualys_qids_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -243136,13 +238128,9 @@ def _index_qualys_qids_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -243225,8 +238213,7 @@ def index_qubes_qsb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243244,7 +238231,7 @@ def index_qubes_qsb_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243284,10 +238271,8 @@ def index_qubes_qsb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243340,8 +238325,7 @@ def index_qubes_qsb_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243390,8 +238374,7 @@ def index_qubes_qsb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243409,7 +238392,7 @@ def index_qubes_qsb_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243449,10 +238432,8 @@ def index_qubes_qsb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243505,8 +238486,7 @@ def index_qubes_qsb_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243555,8 +238535,7 @@ def index_qubes_qsb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243574,7 +238553,7 @@ def index_qubes_qsb_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"qubes-qsb\" @@ -243614,10 +238593,8 @@ def index_qubes_qsb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243670,8 +238647,7 @@ def index_qubes_qsb_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243715,8 +238691,7 @@ def _index_qubes_qsb_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243729,7 +238704,10 @@ def _index_qubes_qsb_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -243813,13 +238791,9 @@ def _index_qubes_qsb_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -243902,8 +238876,7 @@ def index_ransomware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243921,7 +238894,7 @@ def index_ransomware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: """Return vulnerability data stored in index \"ransomware\" @@ -243961,10 +238934,8 @@ def index_ransomware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244017,8 +238988,7 @@ def index_ransomware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244067,8 +239037,7 @@ def index_ransomware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244086,7 +239055,7 @@ def index_ransomware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: """Return vulnerability data stored in index \"ransomware\" @@ -244126,10 +239095,8 @@ def index_ransomware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244182,8 +239149,7 @@ def index_ransomware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244232,8 +239198,7 @@ def index_ransomware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244251,7 +239216,7 @@ def index_ransomware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ransomware\" @@ -244291,10 +239256,8 @@ def index_ransomware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244347,8 +239310,7 @@ def index_ransomware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244392,8 +239354,7 @@ def _index_ransomware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -244406,7 +239367,10 @@ def _index_ransomware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -244490,13 +239454,9 @@ def _index_ransomware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -244579,8 +239539,7 @@ def index_red_lion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244598,7 +239557,7 @@ def index_red_lion_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: """Return vulnerability data stored in index \"red-lion\" @@ -244638,10 +239597,8 @@ def index_red_lion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244694,8 +239651,7 @@ def index_red_lion_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244744,8 +239700,7 @@ def index_red_lion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244763,7 +239718,7 @@ def index_red_lion_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: """Return vulnerability data stored in index \"red-lion\" @@ -244803,10 +239758,8 @@ def index_red_lion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244859,8 +239812,7 @@ def index_red_lion_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244909,8 +239861,7 @@ def index_red_lion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244928,7 +239879,7 @@ def index_red_lion_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"red-lion\" @@ -244968,10 +239919,8 @@ def index_red_lion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245024,8 +239973,7 @@ def index_red_lion_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245069,8 +240017,7 @@ def _index_red_lion_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245083,7 +240030,10 @@ def _index_red_lion_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -245167,13 +240117,9 @@ def _index_red_lion_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -245256,8 +240202,7 @@ def index_redhat_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245275,7 +240220,7 @@ def index_redhat_cves_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: """Return vulnerability data stored in index \"redhat-cves\" @@ -245315,10 +240260,8 @@ def index_redhat_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245371,8 +240314,7 @@ def index_redhat_cves_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245421,8 +240363,7 @@ def index_redhat_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245440,7 +240381,7 @@ def index_redhat_cves_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: """Return vulnerability data stored in index \"redhat-cves\" @@ -245480,10 +240421,8 @@ def index_redhat_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245536,8 +240475,7 @@ def index_redhat_cves_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245586,8 +240524,7 @@ def index_redhat_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245605,7 +240542,7 @@ def index_redhat_cves_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"redhat-cves\" @@ -245645,10 +240582,8 @@ def index_redhat_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245701,8 +240636,7 @@ def index_redhat_cves_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245746,8 +240680,7 @@ def _index_redhat_cves_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245760,7 +240693,10 @@ def _index_redhat_cves_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -245844,13 +240780,9 @@ def _index_redhat_cves_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -245933,8 +240865,7 @@ def index_redhat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245952,7 +240883,7 @@ def index_redhat_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: """Return vulnerability data stored in index \"redhat\" @@ -245992,10 +240923,8 @@ def index_redhat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246048,8 +240977,7 @@ def index_redhat_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246098,8 +241026,7 @@ def index_redhat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246117,7 +241044,7 @@ def index_redhat_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: """Return vulnerability data stored in index \"redhat\" @@ -246157,10 +241084,8 @@ def index_redhat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246213,8 +241138,7 @@ def index_redhat_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246263,8 +241187,7 @@ def index_redhat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246282,7 +241205,7 @@ def index_redhat_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"redhat\" @@ -246322,10 +241245,8 @@ def index_redhat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246378,8 +241299,7 @@ def index_redhat_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246423,8 +241343,7 @@ def _index_redhat_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -246437,7 +241356,10 @@ def _index_redhat_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -246521,13 +241443,9 @@ def _index_redhat_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -246610,8 +241528,7 @@ def index_renesas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246629,7 +241546,7 @@ def index_renesas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: """Return vulnerability data stored in index \"renesas\" @@ -246669,10 +241586,8 @@ def index_renesas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246725,8 +241640,7 @@ def index_renesas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246775,8 +241689,7 @@ def index_renesas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246794,7 +241707,7 @@ def index_renesas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: """Return vulnerability data stored in index \"renesas\" @@ -246834,10 +241747,8 @@ def index_renesas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246890,8 +241801,7 @@ def index_renesas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246940,8 +241850,7 @@ def index_renesas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246959,7 +241868,7 @@ def index_renesas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"renesas\" @@ -246999,10 +241908,8 @@ def index_renesas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247055,8 +241962,7 @@ def index_renesas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247100,8 +242006,7 @@ def _index_renesas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247114,7 +242019,10 @@ def _index_renesas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -247198,13 +242106,9 @@ def _index_renesas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -247287,8 +242191,7 @@ def index_revive_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247306,7 +242209,7 @@ def index_revive_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: """Return vulnerability data stored in index \"revive\" @@ -247346,10 +242249,8 @@ def index_revive_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247402,8 +242303,7 @@ def index_revive_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247452,8 +242352,7 @@ def index_revive_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247471,7 +242370,7 @@ def index_revive_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: """Return vulnerability data stored in index \"revive\" @@ -247511,10 +242410,8 @@ def index_revive_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247567,8 +242464,7 @@ def index_revive_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247617,8 +242513,7 @@ def index_revive_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247636,7 +242531,7 @@ def index_revive_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"revive\" @@ -247676,10 +242571,8 @@ def index_revive_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247732,8 +242625,7 @@ def index_revive_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247777,8 +242669,7 @@ def _index_revive_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247791,7 +242682,10 @@ def _index_revive_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -247875,13 +242769,9 @@ def _index_revive_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -247964,8 +242854,7 @@ def index_roche_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247983,7 +242872,7 @@ def index_roche_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: """Return vulnerability data stored in index \"roche\" @@ -248023,10 +242912,8 @@ def index_roche_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248079,8 +242966,7 @@ def index_roche_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248129,8 +243015,7 @@ def index_roche_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248148,7 +243033,7 @@ def index_roche_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: """Return vulnerability data stored in index \"roche\" @@ -248188,10 +243073,8 @@ def index_roche_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248244,8 +243127,7 @@ def index_roche_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248294,8 +243176,7 @@ def index_roche_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248313,7 +243194,7 @@ def index_roche_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"roche\" @@ -248353,10 +243234,8 @@ def index_roche_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248409,8 +243288,7 @@ def index_roche_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248454,8 +243332,7 @@ def _index_roche_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -248468,7 +243345,10 @@ def _index_roche_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -248552,13 +243432,9 @@ def _index_roche_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -248641,8 +243517,7 @@ def index_rockwell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248660,7 +243535,7 @@ def index_rockwell_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: """Return vulnerability data stored in index \"rockwell\" @@ -248700,10 +243575,8 @@ def index_rockwell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248756,8 +243629,7 @@ def index_rockwell_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248806,8 +243678,7 @@ def index_rockwell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248825,7 +243696,7 @@ def index_rockwell_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: """Return vulnerability data stored in index \"rockwell\" @@ -248865,10 +243736,8 @@ def index_rockwell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248921,8 +243790,7 @@ def index_rockwell_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248971,8 +243839,7 @@ def index_rockwell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248990,7 +243857,7 @@ def index_rockwell_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rockwell\" @@ -249030,10 +243897,8 @@ def index_rockwell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249086,8 +243951,7 @@ def index_rockwell_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249131,8 +243995,7 @@ def _index_rockwell_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249145,7 +244008,10 @@ def _index_rockwell_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -249229,13 +244095,9 @@ def _index_rockwell_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -249318,8 +244180,7 @@ def index_rocky_errata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249337,7 +244198,7 @@ def index_rocky_errata_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: """Return vulnerability data stored in index \"rocky-errata\" @@ -249377,10 +244238,8 @@ def index_rocky_errata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249433,8 +244292,7 @@ def index_rocky_errata_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249483,8 +244341,7 @@ def index_rocky_errata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249502,7 +244359,7 @@ def index_rocky_errata_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: """Return vulnerability data stored in index \"rocky-errata\" @@ -249542,10 +244399,8 @@ def index_rocky_errata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249598,8 +244453,7 @@ def index_rocky_errata_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249648,8 +244502,7 @@ def index_rocky_errata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249667,7 +244520,7 @@ def index_rocky_errata_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky-errata\" @@ -249707,10 +244560,8 @@ def index_rocky_errata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249763,8 +244614,7 @@ def index_rocky_errata_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249808,8 +244658,7 @@ def _index_rocky_errata_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249822,7 +244671,10 @@ def _index_rocky_errata_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -249906,13 +244758,9 @@ def _index_rocky_errata_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -249995,8 +244843,7 @@ def index_rocky_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250014,7 +244861,7 @@ def index_rocky_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: """Return vulnerability data stored in index \"rocky\" @@ -250054,10 +244901,8 @@ def index_rocky_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250110,8 +244955,7 @@ def index_rocky_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250160,8 +245004,7 @@ def index_rocky_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250179,7 +245022,7 @@ def index_rocky_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: """Return vulnerability data stored in index \"rocky\" @@ -250219,10 +245062,8 @@ def index_rocky_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250275,8 +245116,7 @@ def index_rocky_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250325,8 +245165,7 @@ def index_rocky_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250344,7 +245183,7 @@ def index_rocky_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky\" @@ -250384,10 +245223,8 @@ def index_rocky_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250440,8 +245277,7 @@ def index_rocky_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250485,8 +245321,7 @@ def _index_rocky_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -250499,7 +245334,10 @@ def _index_rocky_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -250583,13 +245421,9 @@ def _index_rocky_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -250672,8 +245506,7 @@ def index_rocky_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250691,7 +245524,7 @@ def index_rocky_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"rocky-purls\" @@ -250731,10 +245564,8 @@ def index_rocky_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250787,8 +245618,7 @@ def index_rocky_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250837,8 +245667,7 @@ def index_rocky_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250856,7 +245685,7 @@ def index_rocky_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"rocky-purls\" @@ -250896,10 +245725,8 @@ def index_rocky_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250952,8 +245779,7 @@ def index_rocky_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251002,8 +245828,7 @@ def index_rocky_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251021,7 +245846,7 @@ def index_rocky_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rocky-purls\" @@ -251061,10 +245886,8 @@ def index_rocky_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251117,8 +245940,7 @@ def index_rocky_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251162,8 +245984,7 @@ def _index_rocky_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251176,7 +245997,10 @@ def _index_rocky_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -251260,13 +246084,9 @@ def _index_rocky_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -251349,8 +246169,7 @@ def index_rsync_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251368,7 +246187,7 @@ def index_rsync_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: """Return vulnerability data stored in index \"rsync\" @@ -251408,10 +246227,8 @@ def index_rsync_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251464,8 +246281,7 @@ def index_rsync_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251514,8 +246330,7 @@ def index_rsync_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251533,7 +246348,7 @@ def index_rsync_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: """Return vulnerability data stored in index \"rsync\" @@ -251573,10 +246388,8 @@ def index_rsync_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251629,8 +246442,7 @@ def index_rsync_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251679,8 +246491,7 @@ def index_rsync_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251698,7 +246509,7 @@ def index_rsync_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rsync\" @@ -251738,10 +246549,8 @@ def index_rsync_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251794,8 +246603,7 @@ def index_rsync_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251839,8 +246647,7 @@ def _index_rsync_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251853,7 +246660,10 @@ def _index_rsync_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -251937,13 +246747,9 @@ def _index_rsync_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -252026,8 +246832,7 @@ def index_ruckus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252045,7 +246850,7 @@ def index_ruckus_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: """Return vulnerability data stored in index \"ruckus\" @@ -252085,10 +246890,8 @@ def index_ruckus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252141,8 +246944,7 @@ def index_ruckus_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252191,8 +246993,7 @@ def index_ruckus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252210,7 +247011,7 @@ def index_ruckus_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: """Return vulnerability data stored in index \"ruckus\" @@ -252250,10 +247051,8 @@ def index_ruckus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252306,8 +247105,7 @@ def index_ruckus_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252356,8 +247154,7 @@ def index_ruckus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252375,7 +247172,7 @@ def index_ruckus_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ruckus\" @@ -252415,10 +247212,8 @@ def index_ruckus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252471,8 +247266,7 @@ def index_ruckus_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252516,8 +247310,7 @@ def _index_ruckus_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -252530,7 +247323,10 @@ def _index_ruckus_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -252614,13 +247410,9 @@ def _index_ruckus_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -252703,8 +247495,7 @@ def index_rustsec_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252722,7 +247513,7 @@ def index_rustsec_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -252762,10 +247553,8 @@ def index_rustsec_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252818,8 +247607,7 @@ def index_rustsec_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252868,8 +247656,7 @@ def index_rustsec_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252887,7 +247674,7 @@ def index_rustsec_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -252927,10 +247714,8 @@ def index_rustsec_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252983,8 +247768,7 @@ def index_rustsec_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253033,8 +247817,7 @@ def index_rustsec_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253052,7 +247835,7 @@ def index_rustsec_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"rustsec-advisories\" @@ -253092,10 +247875,8 @@ def index_rustsec_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253148,8 +247929,7 @@ def index_rustsec_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253193,8 +247973,7 @@ def _index_rustsec_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253207,7 +247986,10 @@ def _index_rustsec_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -253291,13 +248073,9 @@ def _index_rustsec_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -253380,8 +248158,7 @@ def index_sacert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253399,7 +248176,7 @@ def index_sacert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: """Return vulnerability data stored in index \"sacert\" @@ -253439,10 +248216,8 @@ def index_sacert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253495,8 +248270,7 @@ def index_sacert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253545,8 +248319,7 @@ def index_sacert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253564,7 +248337,7 @@ def index_sacert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"sacert\" @@ -253604,10 +248377,8 @@ def index_sacert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253660,8 +248431,7 @@ def index_sacert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253710,8 +248480,7 @@ def index_sacert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253729,7 +248498,7 @@ def index_sacert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sacert\" @@ -253769,10 +248538,8 @@ def index_sacert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253825,8 +248592,7 @@ def index_sacert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253870,8 +248636,7 @@ def _index_sacert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253884,7 +248649,10 @@ def _index_sacert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -253968,13 +248736,9 @@ def _index_sacert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -254057,8 +248821,7 @@ def index_safran_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254076,7 +248839,7 @@ def index_safran_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: """Return vulnerability data stored in index \"safran\" @@ -254116,10 +248879,8 @@ def index_safran_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254172,8 +248933,7 @@ def index_safran_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254222,8 +248982,7 @@ def index_safran_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254241,7 +249000,7 @@ def index_safran_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: """Return vulnerability data stored in index \"safran\" @@ -254281,10 +249040,8 @@ def index_safran_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254337,8 +249094,7 @@ def index_safran_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254387,8 +249143,7 @@ def index_safran_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254406,7 +249161,7 @@ def index_safran_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"safran\" @@ -254446,10 +249201,8 @@ def index_safran_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254502,8 +249255,7 @@ def index_safran_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254547,8 +249299,7 @@ def _index_safran_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -254561,7 +249312,10 @@ def _index_safran_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -254645,13 +249399,9 @@ def _index_safran_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -254734,8 +249484,7 @@ def index_saint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254753,7 +249502,7 @@ def index_saint_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: """Return vulnerability data stored in index \"saint\" @@ -254793,10 +249542,8 @@ def index_saint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254849,8 +249596,7 @@ def index_saint_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254899,8 +249645,7 @@ def index_saint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254918,7 +249663,7 @@ def index_saint_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: """Return vulnerability data stored in index \"saint\" @@ -254958,10 +249703,8 @@ def index_saint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255014,8 +249757,7 @@ def index_saint_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255064,8 +249806,7 @@ def index_saint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255083,7 +249824,7 @@ def index_saint_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"saint\" @@ -255123,10 +249864,8 @@ def index_saint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255179,8 +249918,7 @@ def index_saint_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255224,8 +249962,7 @@ def _index_saint_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255238,7 +249975,10 @@ def _index_saint_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -255322,13 +250062,9 @@ def _index_saint_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -255411,8 +250147,7 @@ def index_salesforce_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255430,7 +250165,7 @@ def index_salesforce_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: """Return vulnerability data stored in index \"salesforce\" @@ -255470,10 +250205,8 @@ def index_salesforce_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255526,8 +250259,7 @@ def index_salesforce_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255576,8 +250308,7 @@ def index_salesforce_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255595,7 +250326,7 @@ def index_salesforce_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: """Return vulnerability data stored in index \"salesforce\" @@ -255635,10 +250366,8 @@ def index_salesforce_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255691,8 +250420,7 @@ def index_salesforce_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255741,8 +250469,7 @@ def index_salesforce_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255760,7 +250487,7 @@ def index_salesforce_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"salesforce\" @@ -255800,10 +250527,8 @@ def index_salesforce_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255856,8 +250581,7 @@ def index_salesforce_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255901,8 +250625,7 @@ def _index_salesforce_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255915,7 +250638,10 @@ def _index_salesforce_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -255999,13 +250725,9 @@ def _index_salesforce_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -256088,8 +250810,7 @@ def index_samba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256107,7 +250828,7 @@ def index_samba_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: """Return vulnerability data stored in index \"samba\" @@ -256147,10 +250868,8 @@ def index_samba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256203,8 +250922,7 @@ def index_samba_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256253,8 +250971,7 @@ def index_samba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256272,7 +250989,7 @@ def index_samba_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: """Return vulnerability data stored in index \"samba\" @@ -256312,10 +251029,8 @@ def index_samba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256368,8 +251083,7 @@ def index_samba_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256418,8 +251132,7 @@ def index_samba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256437,7 +251150,7 @@ def index_samba_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"samba\" @@ -256477,10 +251190,8 @@ def index_samba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256533,8 +251244,7 @@ def index_samba_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256578,8 +251288,7 @@ def _index_samba_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256592,7 +251301,10 @@ def _index_samba_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -256676,13 +251388,9 @@ def _index_samba_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -256765,8 +251473,7 @@ def index_sandisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256784,7 +251491,7 @@ def index_sandisk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: """Return vulnerability data stored in index \"sandisk\" @@ -256824,10 +251531,8 @@ def index_sandisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256880,8 +251585,7 @@ def index_sandisk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256930,8 +251634,7 @@ def index_sandisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256949,7 +251652,7 @@ def index_sandisk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: """Return vulnerability data stored in index \"sandisk\" @@ -256989,10 +251692,8 @@ def index_sandisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257045,8 +251746,7 @@ def index_sandisk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257095,8 +251795,7 @@ def index_sandisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257114,7 +251813,7 @@ def index_sandisk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sandisk\" @@ -257154,10 +251853,8 @@ def index_sandisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257210,8 +251907,7 @@ def index_sandisk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257255,8 +251951,7 @@ def _index_sandisk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257269,7 +251964,10 @@ def _index_sandisk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -257353,13 +252051,9 @@ def _index_sandisk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -257442,8 +252136,7 @@ def index_sans_dshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257461,7 +252154,7 @@ def index_sans_dshield_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: """Return vulnerability data stored in index \"sans-dshield\" @@ -257501,10 +252194,8 @@ def index_sans_dshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257557,8 +252248,7 @@ def index_sans_dshield_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257607,8 +252297,7 @@ def index_sans_dshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257626,7 +252315,7 @@ def index_sans_dshield_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: """Return vulnerability data stored in index \"sans-dshield\" @@ -257666,10 +252355,8 @@ def index_sans_dshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257722,8 +252409,7 @@ def index_sans_dshield_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257772,8 +252458,7 @@ def index_sans_dshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257791,7 +252476,7 @@ def index_sans_dshield_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sans-dshield\" @@ -257831,10 +252516,8 @@ def index_sans_dshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257887,8 +252570,7 @@ def index_sans_dshield_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257932,8 +252614,7 @@ def _index_sans_dshield_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257946,7 +252627,10 @@ def _index_sans_dshield_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -258030,13 +252714,9 @@ def _index_sans_dshield_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -258119,8 +252799,7 @@ def index_sap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258138,7 +252817,7 @@ def index_sap_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: """Return vulnerability data stored in index \"sap\" @@ -258178,10 +252857,8 @@ def index_sap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258234,8 +252911,7 @@ def index_sap_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258284,8 +252960,7 @@ def index_sap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258303,7 +252978,7 @@ def index_sap_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: """Return vulnerability data stored in index \"sap\" @@ -258343,10 +253018,8 @@ def index_sap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258399,8 +253072,7 @@ def index_sap_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258449,8 +253121,7 @@ def index_sap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258468,7 +253139,7 @@ def index_sap_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sap\" @@ -258508,10 +253179,8 @@ def index_sap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258564,8 +253233,7 @@ def index_sap_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258609,8 +253277,7 @@ def _index_sap_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258623,7 +253290,10 @@ def _index_sap_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -258707,13 +253377,9 @@ def _index_sap_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -258796,8 +253462,7 @@ def index_schneider_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258815,7 +253480,7 @@ def index_schneider_electric_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: """Return vulnerability data stored in index \"schneider-electric\" @@ -258855,10 +253520,8 @@ def index_schneider_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258911,8 +253574,7 @@ def index_schneider_electric_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258961,8 +253623,7 @@ def index_schneider_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258980,7 +253641,7 @@ def index_schneider_electric_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"schneider-electric\" @@ -259020,10 +253681,8 @@ def index_schneider_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259076,8 +253735,7 @@ def index_schneider_electric_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259126,8 +253784,7 @@ def index_schneider_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259145,7 +253802,7 @@ def index_schneider_electric_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"schneider-electric\" @@ -259185,10 +253842,8 @@ def index_schneider_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259241,8 +253896,7 @@ def index_schneider_electric_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259286,8 +253940,7 @@ def _index_schneider_electric_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259300,7 +253953,10 @@ def _index_schneider_electric_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -259384,13 +254040,9 @@ def _index_schneider_electric_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -259473,8 +254125,7 @@ def index_schutzwerk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259492,7 +254143,7 @@ def index_schutzwerk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: """Return vulnerability data stored in index \"schutzwerk\" @@ -259532,10 +254183,8 @@ def index_schutzwerk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259588,8 +254237,7 @@ def index_schutzwerk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259638,8 +254286,7 @@ def index_schutzwerk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259657,7 +254304,7 @@ def index_schutzwerk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: """Return vulnerability data stored in index \"schutzwerk\" @@ -259697,10 +254344,8 @@ def index_schutzwerk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259753,8 +254398,7 @@ def index_schutzwerk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259803,8 +254447,7 @@ def index_schutzwerk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259822,7 +254465,7 @@ def index_schutzwerk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"schutzwerk\" @@ -259862,10 +254505,8 @@ def index_schutzwerk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259918,8 +254559,7 @@ def index_schutzwerk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259963,8 +254603,7 @@ def _index_schutzwerk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259977,7 +254616,10 @@ def _index_schutzwerk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -260061,13 +254703,9 @@ def _index_schutzwerk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -260150,8 +254788,7 @@ def index_sec_consult_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260169,7 +254806,7 @@ def index_sec_consult_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: """Return vulnerability data stored in index \"sec-consult\" @@ -260209,10 +254846,8 @@ def index_sec_consult_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260265,8 +254900,7 @@ def index_sec_consult_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260315,8 +254949,7 @@ def index_sec_consult_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260334,7 +254967,7 @@ def index_sec_consult_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: """Return vulnerability data stored in index \"sec-consult\" @@ -260374,10 +255007,8 @@ def index_sec_consult_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260430,8 +255061,7 @@ def index_sec_consult_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260480,8 +255110,7 @@ def index_sec_consult_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260499,7 +255128,7 @@ def index_sec_consult_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sec-consult\" @@ -260539,10 +255168,8 @@ def index_sec_consult_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260595,8 +255222,7 @@ def index_sec_consult_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260640,8 +255266,7 @@ def _index_sec_consult_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260654,7 +255279,10 @@ def _index_sec_consult_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -260738,13 +255366,9 @@ def _index_sec_consult_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -260827,8 +255451,7 @@ def index_securitylab_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260846,7 +255469,7 @@ def index_securitylab_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: """Return vulnerability data stored in index \"securitylab\" @@ -260886,10 +255509,8 @@ def index_securitylab_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260942,8 +255563,7 @@ def index_securitylab_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260992,8 +255612,7 @@ def index_securitylab_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261011,7 +255630,7 @@ def index_securitylab_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: """Return vulnerability data stored in index \"securitylab\" @@ -261051,10 +255670,8 @@ def index_securitylab_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261107,8 +255724,7 @@ def index_securitylab_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261157,8 +255773,7 @@ def index_securitylab_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261176,7 +255791,7 @@ def index_securitylab_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"securitylab\" @@ -261216,10 +255831,8 @@ def index_securitylab_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261272,8 +255885,7 @@ def index_securitylab_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261317,8 +255929,7 @@ def _index_securitylab_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -261331,7 +255942,10 @@ def _index_securitylab_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -261415,13 +256029,9 @@ def _index_securitylab_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -261504,8 +256114,7 @@ def index_seebug_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261523,7 +256132,7 @@ def index_seebug_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: """Return vulnerability data stored in index \"seebug\" @@ -261563,10 +256172,8 @@ def index_seebug_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261619,8 +256226,7 @@ def index_seebug_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261669,8 +256275,7 @@ def index_seebug_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261688,7 +256293,7 @@ def index_seebug_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: """Return vulnerability data stored in index \"seebug\" @@ -261728,10 +256333,8 @@ def index_seebug_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261784,8 +256387,7 @@ def index_seebug_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261834,8 +256436,7 @@ def index_seebug_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261853,7 +256454,7 @@ def index_seebug_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"seebug\" @@ -261893,10 +256494,8 @@ def index_seebug_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261949,8 +256548,7 @@ def index_seebug_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261994,8 +256592,7 @@ def _index_seebug_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262008,7 +256605,10 @@ def _index_seebug_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -262092,13 +256692,9 @@ def _index_seebug_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -262181,8 +256777,7 @@ def index_sel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262200,7 +256795,7 @@ def index_sel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: """Return vulnerability data stored in index \"sel\" @@ -262240,10 +256835,8 @@ def index_sel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262296,8 +256889,7 @@ def index_sel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262346,8 +256938,7 @@ def index_sel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262365,7 +256956,7 @@ def index_sel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: """Return vulnerability data stored in index \"sel\" @@ -262405,10 +256996,8 @@ def index_sel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262461,8 +257050,7 @@ def index_sel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262511,8 +257099,7 @@ def index_sel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262530,7 +257117,7 @@ def index_sel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sel\" @@ -262570,10 +257157,8 @@ def index_sel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262626,8 +257211,7 @@ def index_sel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262671,8 +257255,7 @@ def _index_sel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262685,7 +257268,10 @@ def _index_sel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -262769,13 +257355,9 @@ def _index_sel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -262858,8 +257440,7 @@ def index_sentinelone_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262877,7 +257458,7 @@ def index_sentinelone_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: """Return vulnerability data stored in index \"sentinelone\" @@ -262917,10 +257498,8 @@ def index_sentinelone_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262973,8 +257552,7 @@ def index_sentinelone_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263023,8 +257601,7 @@ def index_sentinelone_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263042,7 +257619,7 @@ def index_sentinelone_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: """Return vulnerability data stored in index \"sentinelone\" @@ -263082,10 +257659,8 @@ def index_sentinelone_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263138,8 +257713,7 @@ def index_sentinelone_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263188,8 +257762,7 @@ def index_sentinelone_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263207,7 +257780,7 @@ def index_sentinelone_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sentinelone\" @@ -263247,10 +257820,8 @@ def index_sentinelone_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263303,8 +257874,7 @@ def index_sentinelone_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263348,8 +257918,7 @@ def _index_sentinelone_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -263362,7 +257931,10 @@ def _index_sentinelone_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -263446,13 +258018,9 @@ def _index_sentinelone_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -263535,8 +258103,7 @@ def index_servicenow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263554,7 +258121,7 @@ def index_servicenow_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: """Return vulnerability data stored in index \"servicenow\" @@ -263594,10 +258161,8 @@ def index_servicenow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263650,8 +258215,7 @@ def index_servicenow_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263700,8 +258264,7 @@ def index_servicenow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263719,7 +258282,7 @@ def index_servicenow_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: """Return vulnerability data stored in index \"servicenow\" @@ -263759,10 +258322,8 @@ def index_servicenow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263815,8 +258376,7 @@ def index_servicenow_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263865,8 +258425,7 @@ def index_servicenow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263884,7 +258443,7 @@ def index_servicenow_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"servicenow\" @@ -263924,10 +258483,8 @@ def index_servicenow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263980,8 +258537,7 @@ def index_servicenow_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264025,8 +258581,7 @@ def _index_servicenow_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264039,7 +258594,10 @@ def _index_servicenow_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -264123,13 +258681,9 @@ def _index_servicenow_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -264212,8 +258766,7 @@ def index_shadowserver_exploited_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264231,7 +258784,7 @@ def index_shadowserver_exploited_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264271,10 +258824,8 @@ def index_shadowserver_exploited_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264327,8 +258878,7 @@ def index_shadowserver_exploited_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264377,8 +258927,7 @@ def index_shadowserver_exploited_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264396,7 +258945,7 @@ def index_shadowserver_exploited_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264436,10 +258985,8 @@ def index_shadowserver_exploited_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264492,8 +259039,7 @@ def index_shadowserver_exploited_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264542,8 +259088,7 @@ def index_shadowserver_exploited_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264561,7 +259106,7 @@ def index_shadowserver_exploited_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"shadowserver-exploited\" @@ -264601,10 +259146,8 @@ def index_shadowserver_exploited_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264657,8 +259200,7 @@ def index_shadowserver_exploited_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264702,8 +259244,7 @@ def _index_shadowserver_exploited_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264716,7 +259257,10 @@ def _index_shadowserver_exploited_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -264800,13 +259344,9 @@ def _index_shadowserver_exploited_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -264889,8 +259429,7 @@ def index_shielder_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264908,7 +259447,7 @@ def index_shielder_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: """Return vulnerability data stored in index \"shielder\" @@ -264948,10 +259487,8 @@ def index_shielder_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265004,8 +259541,7 @@ def index_shielder_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265054,8 +259590,7 @@ def index_shielder_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265073,7 +259608,7 @@ def index_shielder_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: """Return vulnerability data stored in index \"shielder\" @@ -265113,10 +259648,8 @@ def index_shielder_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265169,8 +259702,7 @@ def index_shielder_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265219,8 +259751,7 @@ def index_shielder_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265238,7 +259769,7 @@ def index_shielder_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"shielder\" @@ -265278,10 +259809,8 @@ def index_shielder_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265334,8 +259863,7 @@ def index_shielder_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265379,8 +259907,7 @@ def _index_shielder_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -265393,7 +259920,10 @@ def _index_shielder_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -265477,13 +260007,9 @@ def _index_shielder_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -265566,8 +260092,7 @@ def index_sick_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265585,7 +260110,7 @@ def index_sick_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: """Return vulnerability data stored in index \"sick\" @@ -265625,10 +260150,8 @@ def index_sick_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265681,8 +260204,7 @@ def index_sick_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265731,8 +260253,7 @@ def index_sick_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265750,7 +260271,7 @@ def index_sick_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: """Return vulnerability data stored in index \"sick\" @@ -265790,10 +260311,8 @@ def index_sick_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265846,8 +260365,7 @@ def index_sick_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265896,8 +260414,7 @@ def index_sick_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265915,7 +260432,7 @@ def index_sick_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sick\" @@ -265955,10 +260472,8 @@ def index_sick_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266011,8 +260526,7 @@ def index_sick_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266056,8 +260570,7 @@ def _index_sick_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266070,7 +260583,10 @@ def _index_sick_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -266154,13 +260670,9 @@ def _index_sick_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -266243,8 +260755,7 @@ def index_siemens_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266262,7 +260773,7 @@ def index_siemens_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: """Return vulnerability data stored in index \"siemens\" @@ -266302,10 +260813,8 @@ def index_siemens_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266358,8 +260867,7 @@ def index_siemens_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266408,8 +260916,7 @@ def index_siemens_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266427,7 +260934,7 @@ def index_siemens_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"siemens\" @@ -266467,10 +260974,8 @@ def index_siemens_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266523,8 +261028,7 @@ def index_siemens_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266573,8 +261077,7 @@ def index_siemens_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266592,7 +261095,7 @@ def index_siemens_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"siemens\" @@ -266632,10 +261135,8 @@ def index_siemens_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266688,8 +261189,7 @@ def index_siemens_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266733,8 +261233,7 @@ def _index_siemens_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266747,7 +261246,10 @@ def _index_siemens_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -266831,13 +261333,9 @@ def _index_siemens_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -266920,8 +261418,7 @@ def index_sierra_wireless_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266939,7 +261436,7 @@ def index_sierra_wireless_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: """Return vulnerability data stored in index \"sierra-wireless\" @@ -266979,10 +261476,8 @@ def index_sierra_wireless_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267035,8 +261530,7 @@ def index_sierra_wireless_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267085,8 +261579,7 @@ def index_sierra_wireless_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267104,7 +261597,7 @@ def index_sierra_wireless_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: """Return vulnerability data stored in index \"sierra-wireless\" @@ -267144,10 +261637,8 @@ def index_sierra_wireless_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267200,8 +261691,7 @@ def index_sierra_wireless_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267250,8 +261740,7 @@ def index_sierra_wireless_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267269,7 +261758,7 @@ def index_sierra_wireless_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sierra-wireless\" @@ -267309,10 +261798,8 @@ def index_sierra_wireless_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267365,8 +261852,7 @@ def index_sierra_wireless_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267410,8 +261896,7 @@ def _index_sierra_wireless_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -267424,7 +261909,10 @@ def _index_sierra_wireless_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -267508,13 +261996,9 @@ def _index_sierra_wireless_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -267597,8 +262081,7 @@ def index_sigmahq_sigma_rules_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267616,7 +262099,7 @@ def index_sigmahq_sigma_rules_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267656,10 +262139,8 @@ def index_sigmahq_sigma_rules_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267712,8 +262193,7 @@ def index_sigmahq_sigma_rules_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267762,8 +262242,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267781,7 +262260,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267821,10 +262300,8 @@ def index_sigmahq_sigma_rules_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267877,8 +262354,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267927,8 +262403,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267946,7 +262421,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -267986,10 +262461,8 @@ def index_sigmahq_sigma_rules_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268042,8 +262515,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268087,8 +262559,7 @@ def _index_sigmahq_sigma_rules_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268101,7 +262572,10 @@ def _index_sigmahq_sigma_rules_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -268185,13 +262659,9 @@ def _index_sigmahq_sigma_rules_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -268274,8 +262744,7 @@ def index_singcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268293,7 +262762,7 @@ def index_singcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: """Return vulnerability data stored in index \"singcert\" @@ -268333,10 +262802,8 @@ def index_singcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268389,8 +262856,7 @@ def index_singcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268439,8 +262905,7 @@ def index_singcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268458,7 +262923,7 @@ def index_singcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: """Return vulnerability data stored in index \"singcert\" @@ -268498,10 +262963,8 @@ def index_singcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268554,8 +263017,7 @@ def index_singcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268604,8 +263066,7 @@ def index_singcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268623,7 +263084,7 @@ def index_singcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"singcert\" @@ -268663,10 +263124,8 @@ def index_singcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268719,8 +263178,7 @@ def index_singcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268764,8 +263222,7 @@ def _index_singcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268778,7 +263235,10 @@ def _index_singcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -268862,13 +263322,9 @@ def _index_singcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -268951,8 +263407,7 @@ def index_sitecore_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268970,7 +263425,7 @@ def index_sitecore_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: """Return vulnerability data stored in index \"sitecore\" @@ -269010,10 +263465,8 @@ def index_sitecore_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269066,8 +263519,7 @@ def index_sitecore_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269116,8 +263568,7 @@ def index_sitecore_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269135,7 +263586,7 @@ def index_sitecore_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: """Return vulnerability data stored in index \"sitecore\" @@ -269175,10 +263626,8 @@ def index_sitecore_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269231,8 +263680,7 @@ def index_sitecore_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269281,8 +263729,7 @@ def index_sitecore_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269300,7 +263747,7 @@ def index_sitecore_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sitecore\" @@ -269340,10 +263787,8 @@ def index_sitecore_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269396,8 +263841,7 @@ def index_sitecore_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269441,8 +263885,7 @@ def _index_sitecore_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -269455,7 +263898,10 @@ def _index_sitecore_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -269539,13 +263985,9 @@ def _index_sitecore_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -269628,8 +264070,7 @@ def index_slackware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269647,7 +264088,7 @@ def index_slackware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: """Return vulnerability data stored in index \"slackware\" @@ -269687,10 +264128,8 @@ def index_slackware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269743,8 +264182,7 @@ def index_slackware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269793,8 +264231,7 @@ def index_slackware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269812,7 +264249,7 @@ def index_slackware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: """Return vulnerability data stored in index \"slackware\" @@ -269852,10 +264289,8 @@ def index_slackware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269908,8 +264343,7 @@ def index_slackware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269958,8 +264392,7 @@ def index_slackware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269977,7 +264410,7 @@ def index_slackware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"slackware\" @@ -270017,10 +264450,8 @@ def index_slackware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270073,8 +264504,7 @@ def index_slackware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270118,8 +264548,7 @@ def _index_slackware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270132,7 +264561,10 @@ def _index_slackware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -270216,13 +264648,9 @@ def _index_slackware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -270305,8 +264733,7 @@ def index_solarwinds_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270324,7 +264751,7 @@ def index_solarwinds_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"solarwinds\" @@ -270364,10 +264791,8 @@ def index_solarwinds_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270420,8 +264845,7 @@ def index_solarwinds_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270470,8 +264894,7 @@ def index_solarwinds_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270489,7 +264912,7 @@ def index_solarwinds_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"solarwinds\" @@ -270529,10 +264952,8 @@ def index_solarwinds_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270585,8 +265006,7 @@ def index_solarwinds_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270635,8 +265055,7 @@ def index_solarwinds_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270654,7 +265073,7 @@ def index_solarwinds_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"solarwinds\" @@ -270694,10 +265113,8 @@ def index_solarwinds_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270750,8 +265167,7 @@ def index_solarwinds_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270795,8 +265211,7 @@ def _index_solarwinds_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270809,7 +265224,10 @@ def _index_solarwinds_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -270893,13 +265311,9 @@ def _index_solarwinds_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -270982,8 +265396,7 @@ def index_solr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271001,7 +265414,7 @@ def index_solr_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: """Return vulnerability data stored in index \"solr\" @@ -271041,10 +265454,8 @@ def index_solr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271097,8 +265508,7 @@ def index_solr_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271147,8 +265557,7 @@ def index_solr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271166,7 +265575,7 @@ def index_solr_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: """Return vulnerability data stored in index \"solr\" @@ -271206,10 +265615,8 @@ def index_solr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271262,8 +265669,7 @@ def index_solr_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271312,8 +265718,7 @@ def index_solr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271331,7 +265736,7 @@ def index_solr_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"solr\" @@ -271371,10 +265776,8 @@ def index_solr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271427,8 +265830,7 @@ def index_solr_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271472,8 +265874,7 @@ def _index_solr_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -271486,7 +265887,10 @@ def _index_solr_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -271570,13 +265974,9 @@ def _index_solr_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -271659,8 +266059,7 @@ def index_sonatype_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271678,7 +266077,7 @@ def index_sonatype_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: """Return vulnerability data stored in index \"sonatype\" @@ -271718,10 +266117,8 @@ def index_sonatype_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271774,8 +266171,7 @@ def index_sonatype_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271824,8 +266220,7 @@ def index_sonatype_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271843,7 +266238,7 @@ def index_sonatype_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: """Return vulnerability data stored in index \"sonatype\" @@ -271883,10 +266278,8 @@ def index_sonatype_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271939,8 +266332,7 @@ def index_sonatype_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271989,8 +266381,7 @@ def index_sonatype_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272008,7 +266399,7 @@ def index_sonatype_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sonatype\" @@ -272048,10 +266439,8 @@ def index_sonatype_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272104,8 +266493,7 @@ def index_sonatype_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272149,8 +266537,7 @@ def _index_sonatype_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272163,7 +266550,10 @@ def _index_sonatype_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -272247,13 +266637,9 @@ def _index_sonatype_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -272336,8 +266722,7 @@ def index_sonicwall_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272355,7 +266740,7 @@ def index_sonicwall_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: """Return vulnerability data stored in index \"sonicwall\" @@ -272395,10 +266780,8 @@ def index_sonicwall_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272451,8 +266834,7 @@ def index_sonicwall_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272501,8 +266883,7 @@ def index_sonicwall_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272520,7 +266901,7 @@ def index_sonicwall_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"sonicwall\" @@ -272560,10 +266941,8 @@ def index_sonicwall_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272616,8 +266995,7 @@ def index_sonicwall_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272666,8 +267044,7 @@ def index_sonicwall_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272685,7 +267062,7 @@ def index_sonicwall_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sonicwall\" @@ -272725,10 +267102,8 @@ def index_sonicwall_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272781,8 +267156,7 @@ def index_sonicwall_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272826,8 +267200,7 @@ def _index_sonicwall_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272840,7 +267213,10 @@ def _index_sonicwall_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -272924,13 +267300,9 @@ def _index_sonicwall_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -273013,8 +267385,7 @@ def index_spacelabs_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273032,7 +267403,7 @@ def index_spacelabs_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273072,10 +267443,8 @@ def index_spacelabs_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273128,8 +267497,7 @@ def index_spacelabs_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273178,8 +267546,7 @@ def index_spacelabs_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273197,7 +267564,7 @@ def index_spacelabs_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273237,10 +267604,8 @@ def index_spacelabs_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273293,8 +267658,7 @@ def index_spacelabs_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273343,8 +267707,7 @@ def index_spacelabs_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273362,7 +267725,7 @@ def index_spacelabs_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -273402,10 +267765,8 @@ def index_spacelabs_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273458,8 +267819,7 @@ def index_spacelabs_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273503,8 +267863,7 @@ def _index_spacelabs_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -273517,7 +267876,10 @@ def _index_spacelabs_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -273601,13 +267963,9 @@ def _index_spacelabs_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -273690,8 +268048,7 @@ def index_splunk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273709,7 +268066,7 @@ def index_splunk_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: """Return vulnerability data stored in index \"splunk\" @@ -273749,10 +268106,8 @@ def index_splunk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273805,8 +268160,7 @@ def index_splunk_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273855,8 +268209,7 @@ def index_splunk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273874,7 +268227,7 @@ def index_splunk_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: """Return vulnerability data stored in index \"splunk\" @@ -273914,10 +268267,8 @@ def index_splunk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273970,8 +268321,7 @@ def index_splunk_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274020,8 +268370,7 @@ def index_splunk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274039,7 +268388,7 @@ def index_splunk_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"splunk\" @@ -274079,10 +268428,8 @@ def index_splunk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274135,8 +268482,7 @@ def index_splunk_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274180,8 +268526,7 @@ def _index_splunk_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274194,7 +268539,10 @@ def _index_splunk_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -274278,13 +268626,9 @@ def _index_splunk_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -274367,8 +268711,7 @@ def index_spring_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274386,7 +268729,7 @@ def index_spring_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: """Return vulnerability data stored in index \"spring\" @@ -274426,10 +268769,8 @@ def index_spring_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274482,8 +268823,7 @@ def index_spring_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274532,8 +268872,7 @@ def index_spring_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274551,7 +268890,7 @@ def index_spring_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: """Return vulnerability data stored in index \"spring\" @@ -274591,10 +268930,8 @@ def index_spring_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274647,8 +268984,7 @@ def index_spring_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274697,8 +269033,7 @@ def index_spring_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274716,7 +269051,7 @@ def index_spring_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"spring\" @@ -274756,10 +269091,8 @@ def index_spring_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274812,8 +269145,7 @@ def index_spring_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274857,8 +269189,7 @@ def _index_spring_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274871,7 +269202,10 @@ def _index_spring_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -274955,13 +269289,9 @@ def _index_spring_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -275044,8 +269374,7 @@ def index_ssd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275063,7 +269392,7 @@ def index_ssd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: """Return vulnerability data stored in index \"ssd\" @@ -275103,10 +269432,8 @@ def index_ssd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275159,8 +269486,7 @@ def index_ssd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275209,8 +269535,7 @@ def index_ssd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275228,7 +269553,7 @@ def index_ssd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"ssd\" @@ -275268,10 +269593,8 @@ def index_ssd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275324,8 +269647,7 @@ def index_ssd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275374,8 +269696,7 @@ def index_ssd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275393,7 +269714,7 @@ def index_ssd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ssd\" @@ -275433,10 +269754,8 @@ def index_ssd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275489,8 +269808,7 @@ def index_ssd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275534,8 +269852,7 @@ def _index_ssd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -275548,7 +269865,10 @@ def _index_ssd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -275632,13 +269952,9 @@ def _index_ssd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -275721,8 +270037,7 @@ def index_stormshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275740,7 +270055,7 @@ def index_stormshield_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: """Return vulnerability data stored in index \"stormshield\" @@ -275780,10 +270095,8 @@ def index_stormshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275836,8 +270149,7 @@ def index_stormshield_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275886,8 +270198,7 @@ def index_stormshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275905,7 +270216,7 @@ def index_stormshield_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: """Return vulnerability data stored in index \"stormshield\" @@ -275945,10 +270256,8 @@ def index_stormshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276001,8 +270310,7 @@ def index_stormshield_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276051,8 +270359,7 @@ def index_stormshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276070,7 +270377,7 @@ def index_stormshield_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"stormshield\" @@ -276110,10 +270417,8 @@ def index_stormshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276166,8 +270471,7 @@ def index_stormshield_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276211,8 +270515,7 @@ def _index_stormshield_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276225,7 +270528,10 @@ def _index_stormshield_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -276309,13 +270615,9 @@ def _index_stormshield_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -276398,8 +270700,7 @@ def index_stryker_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276417,7 +270718,7 @@ def index_stryker_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: """Return vulnerability data stored in index \"stryker\" @@ -276457,10 +270758,8 @@ def index_stryker_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276513,8 +270812,7 @@ def index_stryker_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276563,8 +270861,7 @@ def index_stryker_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276582,7 +270879,7 @@ def index_stryker_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"stryker\" @@ -276622,10 +270919,8 @@ def index_stryker_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276678,8 +270973,7 @@ def index_stryker_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276728,8 +271022,7 @@ def index_stryker_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276747,7 +271040,7 @@ def index_stryker_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"stryker\" @@ -276787,10 +271080,8 @@ def index_stryker_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276843,8 +271134,7 @@ def index_stryker_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276888,8 +271178,7 @@ def _index_stryker_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276902,7 +271191,10 @@ def _index_stryker_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -276986,13 +271278,9 @@ def _index_stryker_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -277075,8 +271363,7 @@ def index_sudo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277094,7 +271381,7 @@ def index_sudo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: """Return vulnerability data stored in index \"sudo\" @@ -277134,10 +271421,8 @@ def index_sudo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277190,8 +271475,7 @@ def index_sudo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277240,8 +271524,7 @@ def index_sudo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277259,7 +271542,7 @@ def index_sudo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: """Return vulnerability data stored in index \"sudo\" @@ -277299,10 +271582,8 @@ def index_sudo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277355,8 +271636,7 @@ def index_sudo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277405,8 +271685,7 @@ def index_sudo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277424,7 +271703,7 @@ def index_sudo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"sudo\" @@ -277464,10 +271743,8 @@ def index_sudo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277520,8 +271797,7 @@ def index_sudo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277565,8 +271841,7 @@ def _index_sudo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -277579,7 +271854,10 @@ def _index_sudo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -277663,13 +271941,9 @@ def _index_sudo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -277752,8 +272026,7 @@ def index_suse_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277771,7 +272044,7 @@ def index_suse_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: """Return vulnerability data stored in index \"suse\" @@ -277811,10 +272084,8 @@ def index_suse_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277867,8 +272138,7 @@ def index_suse_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277917,8 +272187,7 @@ def index_suse_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277936,7 +272205,7 @@ def index_suse_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: """Return vulnerability data stored in index \"suse\" @@ -277976,10 +272245,8 @@ def index_suse_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278032,8 +272299,7 @@ def index_suse_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278082,8 +272348,7 @@ def index_suse_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278101,7 +272366,7 @@ def index_suse_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"suse\" @@ -278141,10 +272406,8 @@ def index_suse_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278197,8 +272460,7 @@ def index_suse_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278242,8 +272504,7 @@ def _index_suse_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278256,7 +272517,10 @@ def _index_suse_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -278340,13 +272604,9 @@ def _index_suse_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -278429,8 +272689,7 @@ def index_suse_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278448,7 +272707,7 @@ def index_suse_security_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: """Return vulnerability data stored in index \"suse-security\" @@ -278488,10 +272747,8 @@ def index_suse_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278544,8 +272801,7 @@ def index_suse_security_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278594,8 +272850,7 @@ def index_suse_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278613,7 +272868,7 @@ def index_suse_security_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: """Return vulnerability data stored in index \"suse-security\" @@ -278653,10 +272908,8 @@ def index_suse_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278709,8 +272962,7 @@ def index_suse_security_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278759,8 +273011,7 @@ def index_suse_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278778,7 +273029,7 @@ def index_suse_security_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"suse-security\" @@ -278818,10 +273069,8 @@ def index_suse_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278874,8 +273123,7 @@ def index_suse_security_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278919,8 +273167,7 @@ def _index_suse_security_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278933,7 +273180,10 @@ def _index_suse_security_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -279017,13 +273267,9 @@ def _index_suse_security_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -279106,8 +273352,7 @@ def index_swift_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279125,7 +273370,7 @@ def index_swift_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: """Return vulnerability data stored in index \"swift\" @@ -279165,10 +273410,8 @@ def index_swift_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279221,8 +273464,7 @@ def index_swift_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279271,8 +273513,7 @@ def index_swift_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279290,7 +273531,7 @@ def index_swift_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: """Return vulnerability data stored in index \"swift\" @@ -279330,10 +273571,8 @@ def index_swift_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279386,8 +273625,7 @@ def index_swift_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279436,8 +273674,7 @@ def index_swift_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279455,7 +273692,7 @@ def index_swift_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"swift\" @@ -279495,10 +273732,8 @@ def index_swift_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279551,8 +273786,7 @@ def index_swift_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279596,8 +273830,7 @@ def _index_swift_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279610,7 +273843,10 @@ def _index_swift_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -279694,13 +273930,9 @@ def _index_swift_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -279783,8 +274015,7 @@ def index_swisslog_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279802,7 +274033,7 @@ def index_swisslog_healthcare_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -279842,10 +274073,8 @@ def index_swisslog_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279898,8 +274127,7 @@ def index_swisslog_healthcare_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279948,8 +274176,7 @@ def index_swisslog_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279967,7 +274194,7 @@ def index_swisslog_healthcare_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -280007,10 +274234,8 @@ def index_swisslog_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280063,8 +274288,7 @@ def index_swisslog_healthcare_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280113,8 +274337,7 @@ def index_swisslog_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280132,7 +274355,7 @@ def index_swisslog_healthcare_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"swisslog-healthcare\" @@ -280172,10 +274395,8 @@ def index_swisslog_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280228,8 +274449,7 @@ def index_swisslog_healthcare_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280273,8 +274493,7 @@ def _index_swisslog_healthcare_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280287,7 +274506,10 @@ def _index_swisslog_healthcare_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -280371,13 +274593,9 @@ def _index_swisslog_healthcare_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -280460,8 +274678,7 @@ def index_symfony_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280479,7 +274696,7 @@ def index_symfony_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: """Return vulnerability data stored in index \"symfony\" @@ -280519,10 +274736,8 @@ def index_symfony_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280575,8 +274790,7 @@ def index_symfony_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280625,8 +274839,7 @@ def index_symfony_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280644,7 +274857,7 @@ def index_symfony_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: """Return vulnerability data stored in index \"symfony\" @@ -280684,10 +274897,8 @@ def index_symfony_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280740,8 +274951,7 @@ def index_symfony_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280790,8 +275000,7 @@ def index_symfony_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280809,7 +275018,7 @@ def index_symfony_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"symfony\" @@ -280849,10 +275058,8 @@ def index_symfony_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280905,8 +275112,7 @@ def index_symfony_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280950,8 +275156,7 @@ def _index_symfony_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280964,7 +275169,10 @@ def _index_symfony_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -281048,13 +275256,9 @@ def _index_symfony_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -281137,8 +275341,7 @@ def index_synacktiv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281156,7 +275359,7 @@ def index_synacktiv_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: """Return vulnerability data stored in index \"synacktiv\" @@ -281196,10 +275399,8 @@ def index_synacktiv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281252,8 +275453,7 @@ def index_synacktiv_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281302,8 +275502,7 @@ def index_synacktiv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281321,7 +275520,7 @@ def index_synacktiv_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: """Return vulnerability data stored in index \"synacktiv\" @@ -281361,10 +275560,8 @@ def index_synacktiv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281417,8 +275614,7 @@ def index_synacktiv_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281467,8 +275663,7 @@ def index_synacktiv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281486,7 +275681,7 @@ def index_synacktiv_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"synacktiv\" @@ -281526,10 +275721,8 @@ def index_synacktiv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281582,8 +275775,7 @@ def index_synacktiv_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281627,8 +275819,7 @@ def _index_synacktiv_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281641,7 +275832,10 @@ def _index_synacktiv_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -281725,13 +275919,9 @@ def _index_synacktiv_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -281814,8 +276004,7 @@ def index_syncrosoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281833,7 +276022,7 @@ def index_syncrosoft_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: """Return vulnerability data stored in index \"syncrosoft\" @@ -281873,10 +276062,8 @@ def index_syncrosoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281929,8 +276116,7 @@ def index_syncrosoft_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281979,8 +276165,7 @@ def index_syncrosoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281998,7 +276183,7 @@ def index_syncrosoft_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: """Return vulnerability data stored in index \"syncrosoft\" @@ -282038,10 +276223,8 @@ def index_syncrosoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282094,8 +276277,7 @@ def index_syncrosoft_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282144,8 +276326,7 @@ def index_syncrosoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282163,7 +276344,7 @@ def index_syncrosoft_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"syncrosoft\" @@ -282203,10 +276384,8 @@ def index_syncrosoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282259,8 +276438,7 @@ def index_syncrosoft_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282304,8 +276482,7 @@ def _index_syncrosoft_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282318,7 +276495,10 @@ def _index_syncrosoft_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -282402,13 +276582,9 @@ def _index_syncrosoft_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -282491,8 +276667,7 @@ def index_synology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282510,7 +276685,7 @@ def index_synology_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: """Return vulnerability data stored in index \"synology\" @@ -282550,10 +276725,8 @@ def index_synology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282606,8 +276779,7 @@ def index_synology_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282656,8 +276828,7 @@ def index_synology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282675,7 +276846,7 @@ def index_synology_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: """Return vulnerability data stored in index \"synology\" @@ -282715,10 +276886,8 @@ def index_synology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282771,8 +276940,7 @@ def index_synology_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282821,8 +276989,7 @@ def index_synology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282840,7 +277007,7 @@ def index_synology_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"synology\" @@ -282880,10 +277047,8 @@ def index_synology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282936,8 +277101,7 @@ def index_synology_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282981,8 +277145,7 @@ def _index_synology_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282995,7 +277158,10 @@ def _index_synology_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -283079,13 +277245,9 @@ def _index_synology_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -283168,8 +277330,7 @@ def index_syss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283187,7 +277348,7 @@ def index_syss_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: """Return vulnerability data stored in index \"syss\" @@ -283227,10 +277388,8 @@ def index_syss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283283,8 +277442,7 @@ def index_syss_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283333,8 +277491,7 @@ def index_syss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283352,7 +277509,7 @@ def index_syss_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: """Return vulnerability data stored in index \"syss\" @@ -283392,10 +277549,8 @@ def index_syss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283448,8 +277603,7 @@ def index_syss_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283498,8 +277652,7 @@ def index_syss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283517,7 +277670,7 @@ def index_syss_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"syss\" @@ -283557,10 +277710,8 @@ def index_syss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283613,8 +277764,7 @@ def index_syss_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283658,8 +277808,7 @@ def _index_syss_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283672,7 +277821,10 @@ def _index_syss_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -283756,13 +277908,9 @@ def _index_syss_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -283845,8 +277993,7 @@ def index_tailscale_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283864,7 +278011,7 @@ def index_tailscale_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: """Return vulnerability data stored in index \"tailscale\" @@ -283904,10 +278051,8 @@ def index_tailscale_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283960,8 +278105,7 @@ def index_tailscale_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284010,8 +278154,7 @@ def index_tailscale_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284029,7 +278172,7 @@ def index_tailscale_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: """Return vulnerability data stored in index \"tailscale\" @@ -284069,10 +278212,8 @@ def index_tailscale_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284125,8 +278266,7 @@ def index_tailscale_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284175,8 +278315,7 @@ def index_tailscale_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284194,7 +278333,7 @@ def index_tailscale_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tailscale\" @@ -284234,10 +278373,8 @@ def index_tailscale_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284290,8 +278427,7 @@ def index_tailscale_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284335,8 +278471,7 @@ def _index_tailscale_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -284349,7 +278484,10 @@ def _index_tailscale_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -284433,13 +278571,9 @@ def _index_tailscale_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -284522,8 +278656,7 @@ def index_teamviewer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284541,7 +278674,7 @@ def index_teamviewer_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: """Return vulnerability data stored in index \"teamviewer\" @@ -284581,10 +278714,8 @@ def index_teamviewer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284637,8 +278768,7 @@ def index_teamviewer_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284687,8 +278817,7 @@ def index_teamviewer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284706,7 +278835,7 @@ def index_teamviewer_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: """Return vulnerability data stored in index \"teamviewer\" @@ -284746,10 +278875,8 @@ def index_teamviewer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284802,8 +278929,7 @@ def index_teamviewer_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284852,8 +278978,7 @@ def index_teamviewer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284871,7 +278996,7 @@ def index_teamviewer_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"teamviewer\" @@ -284911,10 +279036,8 @@ def index_teamviewer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284967,8 +279090,7 @@ def index_teamviewer_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285012,8 +279134,7 @@ def _index_teamviewer_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285026,7 +279147,10 @@ def _index_teamviewer_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -285110,13 +279234,9 @@ def _index_teamviewer_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -285199,8 +279319,7 @@ def index_tenable_research_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285218,7 +279337,7 @@ def index_tenable_research_advisories_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285258,10 +279377,8 @@ def index_tenable_research_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285314,8 +279431,7 @@ def index_tenable_research_advisories_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285364,8 +279480,7 @@ def index_tenable_research_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285383,7 +279498,7 @@ def index_tenable_research_advisories_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285423,10 +279538,8 @@ def index_tenable_research_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285479,8 +279592,7 @@ def index_tenable_research_advisories_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285529,8 +279641,7 @@ def index_tenable_research_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285548,7 +279659,7 @@ def index_tenable_research_advisories_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tenable-research-advisories\" @@ -285588,10 +279699,8 @@ def index_tenable_research_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285644,8 +279753,7 @@ def index_tenable_research_advisories_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285689,8 +279797,7 @@ def _index_tenable_research_advisories_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285703,7 +279810,10 @@ def _index_tenable_research_advisories_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -285787,13 +279897,9 @@ def _index_tenable_research_advisories_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -285876,8 +279982,7 @@ def index_tencent_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285895,7 +280000,7 @@ def index_tencent_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: """Return vulnerability data stored in index \"tencent\" @@ -285935,10 +280040,8 @@ def index_tencent_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285991,8 +280094,7 @@ def index_tencent_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286041,8 +280143,7 @@ def index_tencent_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286060,7 +280161,7 @@ def index_tencent_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: """Return vulnerability data stored in index \"tencent\" @@ -286100,10 +280201,8 @@ def index_tencent_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286156,8 +280255,7 @@ def index_tencent_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286206,8 +280304,7 @@ def index_tencent_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286225,7 +280322,7 @@ def index_tencent_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tencent\" @@ -286265,10 +280362,8 @@ def index_tencent_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286321,8 +280416,7 @@ def index_tencent_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286366,8 +280460,7 @@ def _index_tencent_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -286380,7 +280473,10 @@ def _index_tencent_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -286464,13 +280560,9 @@ def _index_tencent_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -286553,8 +280645,7 @@ def index_thales_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286572,7 +280663,7 @@ def index_thales_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: """Return vulnerability data stored in index \"thales\" @@ -286612,10 +280703,8 @@ def index_thales_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286668,8 +280757,7 @@ def index_thales_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286718,8 +280806,7 @@ def index_thales_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286737,7 +280824,7 @@ def index_thales_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: """Return vulnerability data stored in index \"thales\" @@ -286777,10 +280864,8 @@ def index_thales_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286833,8 +280918,7 @@ def index_thales_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286883,8 +280967,7 @@ def index_thales_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286902,7 +280985,7 @@ def index_thales_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"thales\" @@ -286942,10 +281025,8 @@ def index_thales_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286998,8 +281079,7 @@ def index_thales_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287043,8 +281123,7 @@ def _index_thales_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287057,7 +281136,10 @@ def _index_thales_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -287141,13 +281223,9 @@ def _index_thales_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -287230,8 +281308,7 @@ def index_themissinglink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287249,7 +281326,7 @@ def index_themissinglink_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: """Return vulnerability data stored in index \"themissinglink\" @@ -287289,10 +281366,8 @@ def index_themissinglink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287345,8 +281420,7 @@ def index_themissinglink_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287395,8 +281469,7 @@ def index_themissinglink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287414,7 +281487,7 @@ def index_themissinglink_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: """Return vulnerability data stored in index \"themissinglink\" @@ -287454,10 +281527,8 @@ def index_themissinglink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287510,8 +281581,7 @@ def index_themissinglink_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287560,8 +281630,7 @@ def index_themissinglink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287579,7 +281648,7 @@ def index_themissinglink_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"themissinglink\" @@ -287619,10 +281688,8 @@ def index_themissinglink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287675,8 +281742,7 @@ def index_themissinglink_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287720,8 +281786,7 @@ def _index_themissinglink_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287734,7 +281799,10 @@ def _index_themissinglink_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -287818,13 +281886,9 @@ def _index_themissinglink_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -287907,8 +281971,7 @@ def index_thermo_fisher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287926,7 +281989,7 @@ def index_thermo_fisher_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: """Return vulnerability data stored in index \"thermo-fisher\" @@ -287966,10 +282029,8 @@ def index_thermo_fisher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288022,8 +282083,7 @@ def index_thermo_fisher_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288072,8 +282132,7 @@ def index_thermo_fisher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288091,7 +282150,7 @@ def index_thermo_fisher_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: """Return vulnerability data stored in index \"thermo-fisher\" @@ -288131,10 +282190,8 @@ def index_thermo_fisher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288187,8 +282244,7 @@ def index_thermo_fisher_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288237,8 +282293,7 @@ def index_thermo_fisher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288256,7 +282311,7 @@ def index_thermo_fisher_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"thermo-fisher\" @@ -288296,10 +282351,8 @@ def index_thermo_fisher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288352,8 +282405,7 @@ def index_thermo_fisher_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288397,8 +282449,7 @@ def _index_thermo_fisher_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -288411,7 +282462,10 @@ def _index_thermo_fisher_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -288495,13 +282549,9 @@ def _index_thermo_fisher_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -288584,8 +282634,7 @@ def index_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288603,7 +282652,7 @@ def index_threat_actors_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: """Return vulnerability data stored in index \"threat-actors\" @@ -288643,10 +282692,8 @@ def index_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288699,8 +282746,7 @@ def index_threat_actors_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288749,8 +282795,7 @@ def index_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288768,7 +282813,7 @@ def index_threat_actors_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: """Return vulnerability data stored in index \"threat-actors\" @@ -288808,10 +282853,8 @@ def index_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288864,8 +282907,7 @@ def index_threat_actors_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288914,8 +282956,7 @@ def index_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288933,7 +282974,7 @@ def index_threat_actors_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"threat-actors\" @@ -288973,10 +283014,8 @@ def index_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289029,8 +283068,7 @@ def index_threat_actors_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289074,8 +283112,7 @@ def _index_threat_actors_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289088,7 +283125,10 @@ def _index_threat_actors_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -289172,13 +283212,9 @@ def _index_threat_actors_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -289261,8 +283297,7 @@ def index_ti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289280,7 +283315,7 @@ def index_ti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: """Return vulnerability data stored in index \"ti\" @@ -289320,10 +283355,8 @@ def index_ti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289376,8 +283409,7 @@ def index_ti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289426,8 +283458,7 @@ def index_ti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289445,7 +283476,7 @@ def index_ti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: """Return vulnerability data stored in index \"ti\" @@ -289485,10 +283516,8 @@ def index_ti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289541,8 +283570,7 @@ def index_ti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289591,8 +283619,7 @@ def index_ti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289610,7 +283637,7 @@ def index_ti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ti\" @@ -289650,10 +283677,8 @@ def index_ti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289706,8 +283731,7 @@ def index_ti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289751,8 +283775,7 @@ def _index_ti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289765,7 +283788,10 @@ def _index_ti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -289849,13 +283875,9 @@ def _index_ti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -289938,8 +283960,7 @@ def index_tibco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289957,7 +283978,7 @@ def index_tibco_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: """Return vulnerability data stored in index \"tibco\" @@ -289997,10 +284018,8 @@ def index_tibco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290053,8 +284072,7 @@ def index_tibco_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290103,8 +284121,7 @@ def index_tibco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290122,7 +284139,7 @@ def index_tibco_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: """Return vulnerability data stored in index \"tibco\" @@ -290162,10 +284179,8 @@ def index_tibco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290218,8 +284233,7 @@ def index_tibco_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290268,8 +284282,7 @@ def index_tibco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290287,7 +284300,7 @@ def index_tibco_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tibco\" @@ -290327,10 +284340,8 @@ def index_tibco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290383,8 +284394,7 @@ def index_tibco_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290428,8 +284438,7 @@ def _index_tibco_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -290442,7 +284451,10 @@ def _index_tibco_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -290526,13 +284538,9 @@ def _index_tibco_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -290615,8 +284623,7 @@ def index_tp_link_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290634,7 +284641,7 @@ def index_tp_link_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: """Return vulnerability data stored in index \"tp-link\" @@ -290674,10 +284681,8 @@ def index_tp_link_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290730,8 +284735,7 @@ def index_tp_link_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290780,8 +284784,7 @@ def index_tp_link_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290799,7 +284802,7 @@ def index_tp_link_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: """Return vulnerability data stored in index \"tp-link\" @@ -290839,10 +284842,8 @@ def index_tp_link_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290895,8 +284896,7 @@ def index_tp_link_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290945,8 +284945,7 @@ def index_tp_link_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290964,7 +284963,7 @@ def index_tp_link_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"tp-link\" @@ -291004,10 +285003,8 @@ def index_tp_link_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291060,8 +285057,7 @@ def index_tp_link_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291105,8 +285101,7 @@ def _index_tp_link_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291119,7 +285114,10 @@ def _index_tp_link_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -291203,13 +285201,9 @@ def _index_tp_link_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -291292,8 +285286,7 @@ def index_trane_technology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291311,7 +285304,7 @@ def index_trane_technology_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: """Return vulnerability data stored in index \"trane-technology\" @@ -291351,10 +285344,8 @@ def index_trane_technology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291407,8 +285398,7 @@ def index_trane_technology_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291457,8 +285447,7 @@ def index_trane_technology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291476,7 +285465,7 @@ def index_trane_technology_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: """Return vulnerability data stored in index \"trane-technology\" @@ -291516,10 +285505,8 @@ def index_trane_technology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291572,8 +285559,7 @@ def index_trane_technology_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291622,8 +285608,7 @@ def index_trane_technology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291641,7 +285626,7 @@ def index_trane_technology_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trane-technology\" @@ -291681,10 +285666,8 @@ def index_trane_technology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291737,8 +285720,7 @@ def index_trane_technology_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291782,8 +285764,7 @@ def _index_trane_technology_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291796,7 +285777,10 @@ def _index_trane_technology_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -291880,13 +285864,9 @@ def _index_trane_technology_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -291969,8 +285949,7 @@ def index_trendmicro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291988,7 +285967,7 @@ def index_trendmicro_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: """Return vulnerability data stored in index \"trendmicro\" @@ -292028,10 +286007,8 @@ def index_trendmicro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292084,8 +286061,7 @@ def index_trendmicro_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292134,8 +286110,7 @@ def index_trendmicro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292153,7 +286128,7 @@ def index_trendmicro_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: """Return vulnerability data stored in index \"trendmicro\" @@ -292193,10 +286168,8 @@ def index_trendmicro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292249,8 +286222,7 @@ def index_trendmicro_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292299,8 +286271,7 @@ def index_trendmicro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292318,7 +286289,7 @@ def index_trendmicro_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trendmicro\" @@ -292358,10 +286329,8 @@ def index_trendmicro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292414,8 +286383,7 @@ def index_trendmicro_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292459,8 +286427,7 @@ def _index_trendmicro_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -292473,7 +286440,10 @@ def _index_trendmicro_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -292557,13 +286527,9 @@ def _index_trendmicro_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -292646,8 +286612,7 @@ def index_trustwave_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292665,7 +286630,7 @@ def index_trustwave_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: """Return vulnerability data stored in index \"trustwave\" @@ -292705,10 +286670,8 @@ def index_trustwave_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292761,8 +286724,7 @@ def index_trustwave_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292811,8 +286773,7 @@ def index_trustwave_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292830,7 +286791,7 @@ def index_trustwave_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: """Return vulnerability data stored in index \"trustwave\" @@ -292870,10 +286831,8 @@ def index_trustwave_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292926,8 +286885,7 @@ def index_trustwave_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292976,8 +286934,7 @@ def index_trustwave_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292995,7 +286952,7 @@ def index_trustwave_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"trustwave\" @@ -293035,10 +286992,8 @@ def index_trustwave_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293091,8 +287046,7 @@ def index_trustwave_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293136,8 +287090,7 @@ def _index_trustwave_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293150,7 +287103,10 @@ def _index_trustwave_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -293234,13 +287190,9 @@ def _index_trustwave_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -293323,8 +287275,7 @@ def index_twcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293342,7 +287293,7 @@ def index_twcert_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: """Return vulnerability data stored in index \"twcert\" @@ -293382,10 +287333,8 @@ def index_twcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293438,8 +287387,7 @@ def index_twcert_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293488,8 +287436,7 @@ def index_twcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293507,7 +287454,7 @@ def index_twcert_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"twcert\" @@ -293547,10 +287494,8 @@ def index_twcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293603,8 +287548,7 @@ def index_twcert_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293653,8 +287597,7 @@ def index_twcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293672,7 +287615,7 @@ def index_twcert_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"twcert\" @@ -293712,10 +287655,8 @@ def index_twcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293768,8 +287709,7 @@ def index_twcert_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293813,8 +287753,7 @@ def _index_twcert_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293827,7 +287766,10 @@ def _index_twcert_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -293911,13 +287853,9 @@ def _index_twcert_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -294000,8 +287938,7 @@ def index_ubiquiti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294019,7 +287956,7 @@ def index_ubiquiti_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: """Return vulnerability data stored in index \"ubiquiti\" @@ -294059,10 +287996,8 @@ def index_ubiquiti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294115,8 +288050,7 @@ def index_ubiquiti_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294165,8 +288099,7 @@ def index_ubiquiti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294184,7 +288117,7 @@ def index_ubiquiti_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: """Return vulnerability data stored in index \"ubiquiti\" @@ -294224,10 +288157,8 @@ def index_ubiquiti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294280,8 +288211,7 @@ def index_ubiquiti_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294330,8 +288260,7 @@ def index_ubiquiti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294349,7 +288278,7 @@ def index_ubiquiti_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubiquiti\" @@ -294389,10 +288318,8 @@ def index_ubiquiti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294445,8 +288372,7 @@ def index_ubiquiti_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294490,8 +288416,7 @@ def _index_ubiquiti_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -294504,7 +288429,10 @@ def _index_ubiquiti_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -294588,13 +288516,9 @@ def _index_ubiquiti_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -294677,8 +288601,7 @@ def index_ubuntu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294696,7 +288619,7 @@ def index_ubuntu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: """Return vulnerability data stored in index \"ubuntu\" @@ -294736,10 +288659,8 @@ def index_ubuntu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294792,8 +288713,7 @@ def index_ubuntu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294842,8 +288762,7 @@ def index_ubuntu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294861,7 +288780,7 @@ def index_ubuntu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: """Return vulnerability data stored in index \"ubuntu\" @@ -294901,10 +288820,8 @@ def index_ubuntu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294957,8 +288874,7 @@ def index_ubuntu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295007,8 +288923,7 @@ def index_ubuntu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295026,7 +288941,7 @@ def index_ubuntu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubuntu\" @@ -295066,10 +288981,8 @@ def index_ubuntu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295122,8 +289035,7 @@ def index_ubuntu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295167,8 +289079,7 @@ def _index_ubuntu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295181,7 +289092,10 @@ def _index_ubuntu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -295265,13 +289179,9 @@ def _index_ubuntu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -295354,8 +289264,7 @@ def index_ubuntu_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295373,7 +289282,7 @@ def index_ubuntu_purls_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295413,10 +289322,8 @@ def index_ubuntu_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295469,8 +289376,7 @@ def index_ubuntu_purls_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295519,8 +289425,7 @@ def index_ubuntu_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295538,7 +289443,7 @@ def index_ubuntu_purls_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295578,10 +289483,8 @@ def index_ubuntu_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295634,8 +289537,7 @@ def index_ubuntu_purls_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295684,8 +289586,7 @@ def index_ubuntu_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295703,7 +289604,7 @@ def index_ubuntu_purls_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"ubuntu-purls\" @@ -295743,10 +289644,8 @@ def index_ubuntu_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295799,8 +289698,7 @@ def index_ubuntu_purls_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295844,8 +289742,7 @@ def _index_ubuntu_purls_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295858,7 +289755,10 @@ def _index_ubuntu_purls_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -295942,13 +289842,9 @@ def _index_ubuntu_purls_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -296031,8 +289927,7 @@ def index_unify_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296050,7 +289945,7 @@ def index_unify_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: """Return vulnerability data stored in index \"unify\" @@ -296090,10 +289985,8 @@ def index_unify_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296146,8 +290039,7 @@ def index_unify_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296196,8 +290088,7 @@ def index_unify_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296215,7 +290106,7 @@ def index_unify_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: """Return vulnerability data stored in index \"unify\" @@ -296255,10 +290146,8 @@ def index_unify_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296311,8 +290200,7 @@ def index_unify_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296361,8 +290249,7 @@ def index_unify_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296380,7 +290267,7 @@ def index_unify_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"unify\" @@ -296420,10 +290307,8 @@ def index_unify_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296476,8 +290361,7 @@ def index_unify_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296521,8 +290405,7 @@ def _index_unify_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -296535,7 +290418,10 @@ def _index_unify_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -296619,13 +290505,9 @@ def _index_unify_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -296708,8 +290590,7 @@ def index_unisoc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296727,7 +290608,7 @@ def index_unisoc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: """Return vulnerability data stored in index \"unisoc\" @@ -296767,10 +290648,8 @@ def index_unisoc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296823,8 +290702,7 @@ def index_unisoc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296873,8 +290751,7 @@ def index_unisoc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296892,7 +290769,7 @@ def index_unisoc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: """Return vulnerability data stored in index \"unisoc\" @@ -296932,10 +290809,8 @@ def index_unisoc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296988,8 +290863,7 @@ def index_unisoc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297038,8 +290912,7 @@ def index_unisoc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297057,7 +290930,7 @@ def index_unisoc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"unisoc\" @@ -297097,10 +290970,8 @@ def index_unisoc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297153,8 +291024,7 @@ def index_unisoc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297198,8 +291068,7 @@ def _index_unisoc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297212,7 +291081,10 @@ def _index_unisoc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -297296,13 +291168,9 @@ def _index_unisoc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -297385,8 +291253,7 @@ def index_usd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297404,7 +291271,7 @@ def index_usd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: """Return vulnerability data stored in index \"usd\" @@ -297444,10 +291311,8 @@ def index_usd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297500,8 +291365,7 @@ def index_usd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297550,8 +291414,7 @@ def index_usd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297569,7 +291432,7 @@ def index_usd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: """Return vulnerability data stored in index \"usd\" @@ -297609,10 +291472,8 @@ def index_usd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297665,8 +291526,7 @@ def index_usd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297715,8 +291575,7 @@ def index_usd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297734,7 +291593,7 @@ def index_usd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"usd\" @@ -297774,10 +291633,8 @@ def index_usd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297830,8 +291687,7 @@ def index_usd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297875,8 +291731,7 @@ def _index_usd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297889,7 +291744,10 @@ def _index_usd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -297973,13 +291831,9 @@ def _index_usd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -298062,8 +291916,7 @@ def index_usom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298081,7 +291934,7 @@ def index_usom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: """Return vulnerability data stored in index \"usom\" @@ -298121,10 +291974,8 @@ def index_usom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298177,8 +292028,7 @@ def index_usom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298227,8 +292077,7 @@ def index_usom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298246,7 +292095,7 @@ def index_usom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"usom\" @@ -298286,10 +292135,8 @@ def index_usom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298342,8 +292189,7 @@ def index_usom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298392,8 +292238,7 @@ def index_usom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298411,7 +292256,7 @@ def index_usom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"usom\" @@ -298451,10 +292296,8 @@ def index_usom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298507,8 +292350,7 @@ def index_usom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298552,8 +292394,7 @@ def _index_usom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -298566,7 +292407,10 @@ def _index_usom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -298650,13 +292494,9 @@ def _index_usom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -298739,8 +292579,7 @@ def index_vandyke_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298758,7 +292597,7 @@ def index_vandyke_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: """Return vulnerability data stored in index \"vandyke\" @@ -298798,10 +292637,8 @@ def index_vandyke_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298854,8 +292691,7 @@ def index_vandyke_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298904,8 +292740,7 @@ def index_vandyke_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298923,7 +292758,7 @@ def index_vandyke_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: """Return vulnerability data stored in index \"vandyke\" @@ -298963,10 +292798,8 @@ def index_vandyke_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299019,8 +292852,7 @@ def index_vandyke_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299069,8 +292901,7 @@ def index_vandyke_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299088,7 +292919,7 @@ def index_vandyke_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vandyke\" @@ -299128,10 +292959,8 @@ def index_vandyke_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299184,8 +293013,7 @@ def index_vandyke_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299229,8 +293057,7 @@ def _index_vandyke_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299243,7 +293070,10 @@ def _index_vandyke_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -299327,13 +293157,9 @@ def _index_vandyke_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -299416,8 +293242,7 @@ def index_vapidlabs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299435,7 +293260,7 @@ def index_vapidlabs_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vapidlabs\" @@ -299475,10 +293300,8 @@ def index_vapidlabs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299531,8 +293354,7 @@ def index_vapidlabs_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299581,8 +293403,7 @@ def index_vapidlabs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299600,7 +293421,7 @@ def index_vapidlabs_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vapidlabs\" @@ -299640,10 +293461,8 @@ def index_vapidlabs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299696,8 +293515,7 @@ def index_vapidlabs_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299746,8 +293564,7 @@ def index_vapidlabs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299765,7 +293582,7 @@ def index_vapidlabs_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vapidlabs\" @@ -299805,10 +293622,8 @@ def index_vapidlabs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299861,8 +293676,7 @@ def index_vapidlabs_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299906,8 +293720,7 @@ def _index_vapidlabs_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299920,7 +293733,10 @@ def _index_vapidlabs_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -300004,13 +293820,9 @@ def _index_vapidlabs_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -300093,8 +293905,7 @@ def index_vc_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300112,7 +293923,7 @@ def index_vc_cpe_dictionary_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300152,10 +293963,8 @@ def index_vc_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300208,8 +294017,7 @@ def index_vc_cpe_dictionary_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300258,8 +294066,7 @@ def index_vc_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300277,7 +294084,7 @@ def index_vc_cpe_dictionary_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300317,10 +294124,8 @@ def index_vc_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300373,8 +294178,7 @@ def index_vc_cpe_dictionary_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300423,8 +294227,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300442,7 +294245,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -300482,10 +294285,8 @@ def index_vc_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300538,8 +294339,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300583,8 +294383,7 @@ def _index_vc_cpe_dictionary_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300597,7 +294396,10 @@ def _index_vc_cpe_dictionary_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -300681,13 +294483,9 @@ def _index_vc_cpe_dictionary_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -300770,8 +294568,7 @@ def index_vde_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300789,7 +294586,7 @@ def index_vde_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vde\" @@ -300829,10 +294626,8 @@ def index_vde_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300885,8 +294680,7 @@ def index_vde_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300935,8 +294729,7 @@ def index_vde_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300954,7 +294747,7 @@ def index_vde_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vde\" @@ -300994,10 +294787,8 @@ def index_vde_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301050,8 +294841,7 @@ def index_vde_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301100,8 +294890,7 @@ def index_vde_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301119,7 +294908,7 @@ def index_vde_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vde\" @@ -301159,10 +294948,8 @@ def index_vde_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301215,8 +295002,7 @@ def index_vde_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301260,8 +295046,7 @@ def _index_vde_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301274,7 +295059,10 @@ def _index_vde_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -301358,13 +295146,9 @@ def _index_vde_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -301447,8 +295231,7 @@ def index_veeam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301466,7 +295249,7 @@ def index_veeam_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: """Return vulnerability data stored in index \"veeam\" @@ -301506,10 +295289,8 @@ def index_veeam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301562,8 +295343,7 @@ def index_veeam_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301612,8 +295392,7 @@ def index_veeam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301631,7 +295410,7 @@ def index_veeam_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: """Return vulnerability data stored in index \"veeam\" @@ -301671,10 +295450,8 @@ def index_veeam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301727,8 +295504,7 @@ def index_veeam_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301777,8 +295553,7 @@ def index_veeam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301796,7 +295571,7 @@ def index_veeam_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"veeam\" @@ -301836,10 +295611,8 @@ def index_veeam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301892,8 +295665,7 @@ def index_veeam_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301937,8 +295709,7 @@ def _index_veeam_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301951,7 +295722,10 @@ def _index_veeam_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -302035,13 +295809,9 @@ def _index_veeam_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -302124,8 +295894,7 @@ def index_veritas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302143,7 +295912,7 @@ def index_veritas_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: """Return vulnerability data stored in index \"veritas\" @@ -302183,10 +295952,8 @@ def index_veritas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302239,8 +296006,7 @@ def index_veritas_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302289,8 +296055,7 @@ def index_veritas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302308,7 +296073,7 @@ def index_veritas_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: """Return vulnerability data stored in index \"veritas\" @@ -302348,10 +296113,8 @@ def index_veritas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302404,8 +296167,7 @@ def index_veritas_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302454,8 +296216,7 @@ def index_veritas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302473,7 +296234,7 @@ def index_veritas_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"veritas\" @@ -302513,10 +296274,8 @@ def index_veritas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302569,8 +296328,7 @@ def index_veritas_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302614,8 +296372,7 @@ def _index_veritas_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302628,7 +296385,10 @@ def _index_veritas_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -302712,13 +296472,9 @@ def _index_veritas_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -302801,8 +296557,7 @@ def index_virtuozzo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302820,7 +296575,7 @@ def index_virtuozzo_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: """Return vulnerability data stored in index \"virtuozzo\" @@ -302860,10 +296615,8 @@ def index_virtuozzo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302916,8 +296669,7 @@ def index_virtuozzo_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302966,8 +296718,7 @@ def index_virtuozzo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302985,7 +296736,7 @@ def index_virtuozzo_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: """Return vulnerability data stored in index \"virtuozzo\" @@ -303025,10 +296776,8 @@ def index_virtuozzo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303081,8 +296830,7 @@ def index_virtuozzo_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303131,8 +296879,7 @@ def index_virtuozzo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303150,7 +296897,7 @@ def index_virtuozzo_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"virtuozzo\" @@ -303190,10 +296937,8 @@ def index_virtuozzo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303246,8 +296991,7 @@ def index_virtuozzo_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303291,8 +297035,7 @@ def _index_virtuozzo_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303305,7 +297048,10 @@ def _index_virtuozzo_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -303389,13 +297135,9 @@ def _index_virtuozzo_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -303478,8 +297220,7 @@ def index_vlc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303497,7 +297238,7 @@ def index_vlc_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: """Return vulnerability data stored in index \"vlc\" @@ -303537,10 +297278,8 @@ def index_vlc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303593,8 +297332,7 @@ def index_vlc_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303643,8 +297381,7 @@ def index_vlc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303662,7 +297399,7 @@ def index_vlc_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: """Return vulnerability data stored in index \"vlc\" @@ -303702,10 +297439,8 @@ def index_vlc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303758,8 +297493,7 @@ def index_vlc_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303808,8 +297542,7 @@ def index_vlc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303827,7 +297560,7 @@ def index_vlc_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vlc\" @@ -303867,10 +297600,8 @@ def index_vlc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303923,8 +297654,7 @@ def index_vlc_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303968,8 +297698,7 @@ def _index_vlc_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303982,7 +297711,10 @@ def _index_vlc_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -304066,13 +297798,9 @@ def _index_vlc_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -304155,8 +297883,7 @@ def index_vmware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304174,7 +297901,7 @@ def index_vmware_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vmware\" @@ -304214,10 +297941,8 @@ def index_vmware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304270,8 +297995,7 @@ def index_vmware_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304320,8 +298044,7 @@ def index_vmware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304339,7 +298062,7 @@ def index_vmware_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vmware\" @@ -304379,10 +298102,8 @@ def index_vmware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304435,8 +298156,7 @@ def index_vmware_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304485,8 +298205,7 @@ def index_vmware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304504,7 +298223,7 @@ def index_vmware_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vmware\" @@ -304544,10 +298263,8 @@ def index_vmware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304600,8 +298317,7 @@ def index_vmware_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304645,8 +298361,7 @@ def _index_vmware_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304659,7 +298374,10 @@ def _index_vmware_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -304743,13 +298461,9 @@ def _index_vmware_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -304832,8 +298546,7 @@ def index_voidsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304851,7 +298564,7 @@ def index_voidsec_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: """Return vulnerability data stored in index \"voidsec\" @@ -304891,10 +298604,8 @@ def index_voidsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304947,8 +298658,7 @@ def index_voidsec_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304997,8 +298707,7 @@ def index_voidsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305016,7 +298725,7 @@ def index_voidsec_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: """Return vulnerability data stored in index \"voidsec\" @@ -305056,10 +298765,8 @@ def index_voidsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305112,8 +298819,7 @@ def index_voidsec_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305162,8 +298868,7 @@ def index_voidsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305181,7 +298886,7 @@ def index_voidsec_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"voidsec\" @@ -305221,10 +298926,8 @@ def index_voidsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305277,8 +298980,7 @@ def index_voidsec_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305322,8 +299024,7 @@ def _index_voidsec_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305336,7 +299037,10 @@ def _index_voidsec_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -305420,13 +299124,9 @@ def _index_voidsec_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -305502,8 +299202,8 @@ def index_vulncheck_canaries10d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305521,7 +299221,7 @@ def index_vulncheck_canaries10d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305547,10 +299247,10 @@ def index_vulncheck_canaries10d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305596,8 +299296,8 @@ def index_vulncheck_canaries10d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305639,8 +299339,8 @@ def index_vulncheck_canaries10d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305658,7 +299358,7 @@ def index_vulncheck_canaries10d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305684,10 +299384,10 @@ def index_vulncheck_canaries10d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305733,8 +299433,8 @@ def index_vulncheck_canaries10d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305776,8 +299476,8 @@ def index_vulncheck_canaries10d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305795,7 +299495,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -305821,10 +299521,10 @@ def index_vulncheck_canaries10d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305870,8 +299570,8 @@ def index_vulncheck_canaries10d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305908,8 +299608,8 @@ def _index_vulncheck_canaries10d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305922,7 +299622,10 @@ def _index_vulncheck_canaries10d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -305978,13 +299681,13 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -306060,8 +299763,8 @@ def index_vulncheck_canaries30d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306079,7 +299782,7 @@ def index_vulncheck_canaries30d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306105,10 +299808,10 @@ def index_vulncheck_canaries30d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306154,8 +299857,8 @@ def index_vulncheck_canaries30d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306197,8 +299900,8 @@ def index_vulncheck_canaries30d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306216,7 +299919,7 @@ def index_vulncheck_canaries30d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306242,10 +299945,10 @@ def index_vulncheck_canaries30d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306291,8 +299994,8 @@ def index_vulncheck_canaries30d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306334,8 +300037,8 @@ def index_vulncheck_canaries30d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306353,7 +300056,7 @@ def index_vulncheck_canaries30d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -306379,10 +300082,10 @@ def index_vulncheck_canaries30d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306428,8 +300131,8 @@ def index_vulncheck_canaries30d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306466,8 +300169,8 @@ def _index_vulncheck_canaries30d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -306480,7 +300183,10 @@ def _index_vulncheck_canaries30d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -306536,13 +300242,13 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -306618,8 +300324,8 @@ def index_vulncheck_canaries3d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306637,7 +300343,7 @@ def index_vulncheck_canaries3d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306663,10 +300369,10 @@ def index_vulncheck_canaries3d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306712,8 +300418,8 @@ def index_vulncheck_canaries3d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306755,8 +300461,8 @@ def index_vulncheck_canaries3d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306774,7 +300480,7 @@ def index_vulncheck_canaries3d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306800,10 +300506,10 @@ def index_vulncheck_canaries3d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306849,8 +300555,8 @@ def index_vulncheck_canaries3d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306892,8 +300598,8 @@ def index_vulncheck_canaries3d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306911,7 +300617,7 @@ def index_vulncheck_canaries3d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -306937,10 +300643,10 @@ def index_vulncheck_canaries3d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306986,8 +300692,8 @@ def index_vulncheck_canaries3d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307024,8 +300730,8 @@ def _index_vulncheck_canaries3d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307038,7 +300744,10 @@ def _index_vulncheck_canaries3d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -307094,13 +300803,13 @@ def _index_vulncheck_canaries3d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -307176,8 +300885,8 @@ def index_vulncheck_canaries90d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307195,7 +300904,7 @@ def index_vulncheck_canaries90d_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307221,10 +300930,10 @@ def index_vulncheck_canaries90d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307270,8 +300979,8 @@ def index_vulncheck_canaries90d_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307313,8 +301022,8 @@ def index_vulncheck_canaries90d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307332,7 +301041,7 @@ def index_vulncheck_canaries90d_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307358,10 +301067,10 @@ def index_vulncheck_canaries90d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307407,8 +301116,8 @@ def index_vulncheck_canaries90d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307450,8 +301159,8 @@ def index_vulncheck_canaries90d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307469,7 +301178,7 @@ def index_vulncheck_canaries90d_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -307495,10 +301204,10 @@ def index_vulncheck_canaries90d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307544,8 +301253,8 @@ def index_vulncheck_canaries90d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307582,8 +301291,8 @@ def _index_vulncheck_canaries90d_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307596,7 +301305,10 @@ def _index_vulncheck_canaries90d_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -307652,13 +301364,13 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -307734,8 +301446,8 @@ def index_vulncheck_canaries_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307753,7 +301465,7 @@ def index_vulncheck_canaries_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -307779,10 +301491,10 @@ def index_vulncheck_canaries_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307828,8 +301540,8 @@ def index_vulncheck_canaries_get( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307871,8 +301583,8 @@ def index_vulncheck_canaries_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307890,7 +301602,7 @@ def index_vulncheck_canaries_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -307916,10 +301628,10 @@ def index_vulncheck_canaries_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307965,8 +301677,8 @@ def index_vulncheck_canaries_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308008,8 +301720,8 @@ def index_vulncheck_canaries_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308027,7 +301739,7 @@ def index_vulncheck_canaries_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-canaries\" @@ -308053,10 +301765,10 @@ def index_vulncheck_canaries_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param src_ip: Source IP address + :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308102,8 +301814,8 @@ def index_vulncheck_canaries_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, - var_date=var_date, - var_date2=var_date2, + src_ip=src_ip, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308140,8 +301852,8 @@ def _index_vulncheck_canaries_get_serialize( published, src_country, dst_country, - var_date, - var_date2, + src_ip, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308154,7 +301866,10 @@ def _index_vulncheck_canaries_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -308210,13 +301925,13 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -308299,8 +302014,7 @@ def index_vulncheck_config_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308318,7 +302032,7 @@ def index_vulncheck_config_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308358,10 +302072,8 @@ def index_vulncheck_config_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308414,8 +302126,7 @@ def index_vulncheck_config_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308464,8 +302175,7 @@ def index_vulncheck_config_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308483,7 +302193,7 @@ def index_vulncheck_config_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308523,10 +302233,8 @@ def index_vulncheck_config_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308579,8 +302287,7 @@ def index_vulncheck_config_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308629,8 +302336,7 @@ def index_vulncheck_config_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308648,7 +302354,7 @@ def index_vulncheck_config_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-config\" @@ -308688,10 +302394,8 @@ def index_vulncheck_config_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308744,8 +302448,7 @@ def index_vulncheck_config_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308789,8 +302492,7 @@ def _index_vulncheck_config_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308803,7 +302505,10 @@ def _index_vulncheck_config_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -308887,13 +302592,9 @@ def _index_vulncheck_config_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -308976,8 +302677,7 @@ def index_vulncheck_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308995,7 +302695,7 @@ def index_vulncheck_cvelist_v5_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309035,10 +302735,8 @@ def index_vulncheck_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309091,8 +302789,7 @@ def index_vulncheck_cvelist_v5_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309141,8 +302838,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309160,7 +302856,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination]: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309200,10 +302896,8 @@ def index_vulncheck_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309256,8 +302950,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309306,8 +302999,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309325,7 +303017,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -309365,10 +303057,8 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309421,8 +303111,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309466,8 +303155,7 @@ def _index_vulncheck_cvelist_v5_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -309480,7 +303168,10 @@ def _index_vulncheck_cvelist_v5_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -309564,13 +303255,9 @@ def _index_vulncheck_cvelist_v5_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -309653,8 +303340,7 @@ def index_vulncheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309672,7 +303358,7 @@ def index_vulncheck_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination: """Return vulnerability data stored in index \"vulncheck\" @@ -309712,10 +303398,8 @@ def index_vulncheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309768,8 +303452,7 @@ def index_vulncheck_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309818,8 +303501,7 @@ def index_vulncheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309837,7 +303519,7 @@ def index_vulncheck_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination]: """Return vulnerability data stored in index \"vulncheck\" @@ -309877,10 +303559,8 @@ def index_vulncheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309933,8 +303613,7 @@ def index_vulncheck_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309983,8 +303662,7 @@ def index_vulncheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310002,7 +303680,7 @@ def index_vulncheck_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck\" @@ -310042,10 +303720,8 @@ def index_vulncheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310098,8 +303774,7 @@ def index_vulncheck_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310143,8 +303818,7 @@ def _index_vulncheck_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310157,7 +303831,10 @@ def _index_vulncheck_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -310241,13 +303918,9 @@ def _index_vulncheck_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -310330,8 +304003,7 @@ def index_vulncheck_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310349,7 +304021,7 @@ def index_vulncheck_kev_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310389,10 +304061,8 @@ def index_vulncheck_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310445,8 +304115,7 @@ def index_vulncheck_kev_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310495,8 +304164,7 @@ def index_vulncheck_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310514,7 +304182,7 @@ def index_vulncheck_kev_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310554,10 +304222,8 @@ def index_vulncheck_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310610,8 +304276,7 @@ def index_vulncheck_kev_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310660,8 +304325,7 @@ def index_vulncheck_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310679,7 +304343,7 @@ def index_vulncheck_kev_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-kev\" @@ -310719,10 +304383,8 @@ def index_vulncheck_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310775,8 +304437,7 @@ def index_vulncheck_kev_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310820,8 +304481,7 @@ def _index_vulncheck_kev_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310834,7 +304494,10 @@ def _index_vulncheck_kev_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -310918,13 +304581,9 @@ def _index_vulncheck_kev_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -311007,8 +304666,7 @@ def index_vulncheck_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311026,7 +304684,7 @@ def index_vulncheck_nvd2_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311066,10 +304724,8 @@ def index_vulncheck_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311122,8 +304778,7 @@ def index_vulncheck_nvd2_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311172,8 +304827,7 @@ def index_vulncheck_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311191,7 +304845,7 @@ def index_vulncheck_nvd2_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311231,10 +304885,8 @@ def index_vulncheck_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311287,8 +304939,7 @@ def index_vulncheck_nvd2_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311337,8 +304988,7 @@ def index_vulncheck_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311356,7 +305006,7 @@ def index_vulncheck_nvd2_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -311396,10 +305046,8 @@ def index_vulncheck_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311452,8 +305100,7 @@ def index_vulncheck_nvd2_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311497,8 +305144,7 @@ def _index_vulncheck_nvd2_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -311511,7 +305157,10 @@ def _index_vulncheck_nvd2_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -311595,13 +305244,9 @@ def _index_vulncheck_nvd2_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -311684,8 +305329,7 @@ def index_vulncheck_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311703,7 +305347,7 @@ def index_vulncheck_nvd_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -311743,10 +305387,8 @@ def index_vulncheck_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311799,8 +305441,7 @@ def index_vulncheck_nvd_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311849,8 +305490,7 @@ def index_vulncheck_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311868,7 +305508,7 @@ def index_vulncheck_nvd_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination]: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -311908,10 +305548,8 @@ def index_vulncheck_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311964,8 +305602,7 @@ def index_vulncheck_nvd_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312014,8 +305651,7 @@ def index_vulncheck_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312033,7 +305669,7 @@ def index_vulncheck_nvd_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulncheck-nvd\" @@ -312073,10 +305709,8 @@ def index_vulncheck_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312129,8 +305763,7 @@ def index_vulncheck_nvd_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312174,8 +305807,7 @@ def _index_vulncheck_nvd_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312188,7 +305820,10 @@ def _index_vulncheck_nvd_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -312272,13 +305907,9 @@ def _index_vulncheck_nvd_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -312361,8 +305992,7 @@ def index_vulnerability_aliases_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312380,7 +306010,7 @@ def index_vulnerability_aliases_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312420,10 +306050,8 @@ def index_vulnerability_aliases_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312476,8 +306104,7 @@ def index_vulnerability_aliases_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312526,8 +306153,7 @@ def index_vulnerability_aliases_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312545,7 +306171,7 @@ def index_vulnerability_aliases_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination]: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312585,10 +306211,8 @@ def index_vulnerability_aliases_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312641,8 +306265,7 @@ def index_vulnerability_aliases_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312691,8 +306314,7 @@ def index_vulnerability_aliases_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312710,7 +306332,7 @@ def index_vulnerability_aliases_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulnerability-aliases\" @@ -312750,10 +306372,8 @@ def index_vulnerability_aliases_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312806,8 +306426,7 @@ def index_vulnerability_aliases_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312851,8 +306470,7 @@ def _index_vulnerability_aliases_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312865,7 +306483,10 @@ def _index_vulnerability_aliases_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -312949,13 +306570,9 @@ def _index_vulnerability_aliases_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -313038,8 +306655,7 @@ def index_vulnrichment_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313057,7 +306673,7 @@ def index_vulnrichment_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination: """Return vulnerability data stored in index \"vulnrichment\" @@ -313097,10 +306713,8 @@ def index_vulnrichment_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313153,8 +306767,7 @@ def index_vulnrichment_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313203,8 +306816,7 @@ def index_vulnrichment_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313222,7 +306834,7 @@ def index_vulnrichment_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination]: """Return vulnerability data stored in index \"vulnrichment\" @@ -313262,10 +306874,8 @@ def index_vulnrichment_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313318,8 +306928,7 @@ def index_vulnrichment_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313368,8 +306977,7 @@ def index_vulnrichment_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313387,7 +306995,7 @@ def index_vulnrichment_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vulnrichment\" @@ -313427,10 +307035,8 @@ def index_vulnrichment_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313483,8 +307089,7 @@ def index_vulnrichment_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313528,8 +307133,7 @@ def _index_vulnrichment_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -313542,7 +307146,10 @@ def _index_vulnrichment_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -313626,13 +307233,9 @@ def _index_vulnrichment_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -313715,8 +307318,7 @@ def index_vyaire_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313734,7 +307336,7 @@ def index_vyaire_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination: """Return vulnerability data stored in index \"vyaire\" @@ -313774,10 +307376,8 @@ def index_vyaire_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313830,8 +307430,7 @@ def index_vyaire_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313880,8 +307479,7 @@ def index_vyaire_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313899,7 +307497,7 @@ def index_vyaire_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"vyaire\" @@ -313939,10 +307537,8 @@ def index_vyaire_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313995,8 +307591,7 @@ def index_vyaire_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314045,8 +307640,7 @@ def index_vyaire_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314064,7 +307658,7 @@ def index_vyaire_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"vyaire\" @@ -314104,10 +307698,8 @@ def index_vyaire_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314160,8 +307752,7 @@ def index_vyaire_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314205,8 +307796,7 @@ def _index_vyaire_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314219,7 +307809,10 @@ def _index_vyaire_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -314303,13 +307896,9 @@ def _index_vyaire_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -314392,8 +307981,7 @@ def index_watchguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314411,7 +307999,7 @@ def index_watchguard_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination: """Return vulnerability data stored in index \"watchguard\" @@ -314451,10 +308039,8 @@ def index_watchguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314507,8 +308093,7 @@ def index_watchguard_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314557,8 +308142,7 @@ def index_watchguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314576,7 +308160,7 @@ def index_watchguard_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination]: """Return vulnerability data stored in index \"watchguard\" @@ -314616,10 +308200,8 @@ def index_watchguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314672,8 +308254,7 @@ def index_watchguard_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314722,8 +308303,7 @@ def index_watchguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314741,7 +308321,7 @@ def index_watchguard_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"watchguard\" @@ -314781,10 +308361,8 @@ def index_watchguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314837,8 +308415,7 @@ def index_watchguard_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314882,8 +308459,7 @@ def _index_watchguard_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314896,7 +308472,10 @@ def _index_watchguard_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -314980,13 +308559,9 @@ def _index_watchguard_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -315069,8 +308644,7 @@ def index_whatsapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315088,7 +308662,7 @@ def index_whatsapp_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination: """Return vulnerability data stored in index \"whatsapp\" @@ -315128,10 +308702,8 @@ def index_whatsapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315184,8 +308756,7 @@ def index_whatsapp_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315234,8 +308805,7 @@ def index_whatsapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315253,7 +308823,7 @@ def index_whatsapp_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination]: """Return vulnerability data stored in index \"whatsapp\" @@ -315293,10 +308863,8 @@ def index_whatsapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315349,8 +308917,7 @@ def index_whatsapp_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315399,8 +308966,7 @@ def index_whatsapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315418,7 +308984,7 @@ def index_whatsapp_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"whatsapp\" @@ -315458,10 +309024,8 @@ def index_whatsapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315514,8 +309078,7 @@ def index_whatsapp_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315559,8 +309122,7 @@ def _index_whatsapp_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -315573,7 +309135,10 @@ def _index_whatsapp_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -315657,13 +309222,9 @@ def _index_whatsapp_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -315746,8 +309307,7 @@ def index_wibu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315765,7 +309325,7 @@ def index_wibu_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination: """Return vulnerability data stored in index \"wibu\" @@ -315805,10 +309365,8 @@ def index_wibu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315861,8 +309419,7 @@ def index_wibu_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315911,8 +309468,7 @@ def index_wibu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315930,7 +309486,7 @@ def index_wibu_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination]: """Return vulnerability data stored in index \"wibu\" @@ -315970,10 +309526,8 @@ def index_wibu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316026,8 +309580,7 @@ def index_wibu_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316076,8 +309629,7 @@ def index_wibu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316095,7 +309647,7 @@ def index_wibu_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wibu\" @@ -316135,10 +309687,8 @@ def index_wibu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316191,8 +309741,7 @@ def index_wibu_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316236,8 +309785,7 @@ def _index_wibu_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316250,7 +309798,10 @@ def _index_wibu_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -316334,13 +309885,9 @@ def _index_wibu_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -316423,8 +309970,7 @@ def index_wireshark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316442,7 +309988,7 @@ def index_wireshark_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination: """Return vulnerability data stored in index \"wireshark\" @@ -316482,10 +310028,8 @@ def index_wireshark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316538,8 +310082,7 @@ def index_wireshark_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316588,8 +310131,7 @@ def index_wireshark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316607,7 +310149,7 @@ def index_wireshark_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination]: """Return vulnerability data stored in index \"wireshark\" @@ -316647,10 +310189,8 @@ def index_wireshark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316703,8 +310243,7 @@ def index_wireshark_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316753,8 +310292,7 @@ def index_wireshark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316772,7 +310310,7 @@ def index_wireshark_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wireshark\" @@ -316812,10 +310350,8 @@ def index_wireshark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316868,8 +310404,7 @@ def index_wireshark_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316913,8 +310448,7 @@ def _index_wireshark_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316927,7 +310461,10 @@ def _index_wireshark_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -317011,13 +310548,9 @@ def _index_wireshark_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -317100,8 +310633,7 @@ def index_with_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317119,7 +310651,7 @@ def index_with_secure_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination: """Return vulnerability data stored in index \"with-secure\" @@ -317159,10 +310691,8 @@ def index_with_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317215,8 +310745,7 @@ def index_with_secure_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317265,8 +310794,7 @@ def index_with_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317284,7 +310812,7 @@ def index_with_secure_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination]: """Return vulnerability data stored in index \"with-secure\" @@ -317324,10 +310852,8 @@ def index_with_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317380,8 +310906,7 @@ def index_with_secure_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317430,8 +310955,7 @@ def index_with_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317449,7 +310973,7 @@ def index_with_secure_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"with-secure\" @@ -317489,10 +311013,8 @@ def index_with_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317545,8 +311067,7 @@ def index_with_secure_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317590,8 +311111,7 @@ def _index_with_secure_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317604,7 +311124,10 @@ def _index_with_secure_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -317688,13 +311211,9 @@ def _index_with_secure_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -317777,8 +311296,7 @@ def index_wolfi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317796,7 +311314,7 @@ def index_wolfi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination: """Return vulnerability data stored in index \"wolfi\" @@ -317836,10 +311354,8 @@ def index_wolfi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317892,8 +311408,7 @@ def index_wolfi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317942,8 +311457,7 @@ def index_wolfi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317961,7 +311475,7 @@ def index_wolfi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination]: """Return vulnerability data stored in index \"wolfi\" @@ -318001,10 +311515,8 @@ def index_wolfi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318057,8 +311569,7 @@ def index_wolfi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318107,8 +311618,7 @@ def index_wolfi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318126,7 +311636,7 @@ def index_wolfi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wolfi\" @@ -318166,10 +311676,8 @@ def index_wolfi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318222,8 +311730,7 @@ def index_wolfi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318267,8 +311774,7 @@ def _index_wolfi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318281,7 +311787,10 @@ def _index_wolfi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -318365,13 +311874,9 @@ def _index_wolfi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -318454,8 +311959,7 @@ def index_wolfssl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318473,7 +311977,7 @@ def index_wolfssl_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination: """Return vulnerability data stored in index \"wolfssl\" @@ -318513,10 +312017,8 @@ def index_wolfssl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318569,8 +312071,7 @@ def index_wolfssl_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318619,8 +312120,7 @@ def index_wolfssl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318638,7 +312138,7 @@ def index_wolfssl_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination]: """Return vulnerability data stored in index \"wolfssl\" @@ -318678,10 +312178,8 @@ def index_wolfssl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318734,8 +312232,7 @@ def index_wolfssl_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318784,8 +312281,7 @@ def index_wolfssl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318803,7 +312299,7 @@ def index_wolfssl_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wolfssl\" @@ -318843,10 +312339,8 @@ def index_wolfssl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318899,8 +312393,7 @@ def index_wolfssl_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318944,8 +312437,7 @@ def _index_wolfssl_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318958,7 +312450,10 @@ def _index_wolfssl_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -319042,13 +312537,9 @@ def _index_wolfssl_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -319131,8 +312622,7 @@ def index_wordfence_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319150,7 +312640,7 @@ def index_wordfence_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination: """Return vulnerability data stored in index \"wordfence\" @@ -319190,10 +312680,8 @@ def index_wordfence_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319246,8 +312734,7 @@ def index_wordfence_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319296,8 +312783,7 @@ def index_wordfence_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319315,7 +312801,7 @@ def index_wordfence_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination]: """Return vulnerability data stored in index \"wordfence\" @@ -319355,10 +312841,8 @@ def index_wordfence_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319411,8 +312895,7 @@ def index_wordfence_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319461,8 +312944,7 @@ def index_wordfence_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319480,7 +312962,7 @@ def index_wordfence_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"wordfence\" @@ -319520,10 +313002,8 @@ def index_wordfence_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319576,8 +313056,7 @@ def index_wordfence_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319621,8 +313100,7 @@ def _index_wordfence_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319635,7 +313113,10 @@ def _index_wordfence_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -319719,13 +313200,9 @@ def _index_wordfence_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -319808,8 +313285,7 @@ def index_xen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319827,7 +313303,7 @@ def index_xen_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination: """Return vulnerability data stored in index \"xen\" @@ -319867,10 +313343,8 @@ def index_xen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319923,8 +313397,7 @@ def index_xen_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319973,8 +313446,7 @@ def index_xen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319992,7 +313464,7 @@ def index_xen_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination]: """Return vulnerability data stored in index \"xen\" @@ -320032,10 +313504,8 @@ def index_xen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320088,8 +313558,7 @@ def index_xen_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320138,8 +313607,7 @@ def index_xen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320157,7 +313625,7 @@ def index_xen_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xen\" @@ -320197,10 +313665,8 @@ def index_xen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320253,8 +313719,7 @@ def index_xen_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320298,8 +313763,7 @@ def _index_xen_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320312,7 +313776,10 @@ def _index_xen_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -320396,13 +313863,9 @@ def _index_xen_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -320485,8 +313948,7 @@ def index_xerox_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320504,7 +313966,7 @@ def index_xerox_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination: """Return vulnerability data stored in index \"xerox\" @@ -320544,10 +314006,8 @@ def index_xerox_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320600,8 +314060,7 @@ def index_xerox_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320650,8 +314109,7 @@ def index_xerox_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320669,7 +314127,7 @@ def index_xerox_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination]: """Return vulnerability data stored in index \"xerox\" @@ -320709,10 +314167,8 @@ def index_xerox_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320765,8 +314221,7 @@ def index_xerox_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320815,8 +314270,7 @@ def index_xerox_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320834,7 +314288,7 @@ def index_xerox_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xerox\" @@ -320874,10 +314328,8 @@ def index_xerox_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320930,8 +314382,7 @@ def index_xerox_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320975,8 +314426,7 @@ def _index_xerox_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320989,7 +314439,10 @@ def _index_xerox_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -321073,13 +314526,9 @@ def _index_xerox_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -321162,8 +314611,7 @@ def index_xiaomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321181,7 +314629,7 @@ def index_xiaomi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination: """Return vulnerability data stored in index \"xiaomi\" @@ -321221,10 +314669,8 @@ def index_xiaomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321277,8 +314723,7 @@ def index_xiaomi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321327,8 +314772,7 @@ def index_xiaomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321346,7 +314790,7 @@ def index_xiaomi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination]: """Return vulnerability data stored in index \"xiaomi\" @@ -321386,10 +314830,8 @@ def index_xiaomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321442,8 +314884,7 @@ def index_xiaomi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321492,8 +314933,7 @@ def index_xiaomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321511,7 +314951,7 @@ def index_xiaomi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xiaomi\" @@ -321551,10 +314991,8 @@ def index_xiaomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321607,8 +315045,7 @@ def index_xiaomi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321652,8 +315089,7 @@ def _index_xiaomi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321666,7 +315102,10 @@ def _index_xiaomi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -321750,13 +315189,9 @@ def _index_xiaomi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -321839,8 +315274,7 @@ def index_xylem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321858,7 +315292,7 @@ def index_xylem_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination: """Return vulnerability data stored in index \"xylem\" @@ -321898,10 +315332,8 @@ def index_xylem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321954,8 +315386,7 @@ def index_xylem_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322004,8 +315435,7 @@ def index_xylem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322023,7 +315453,7 @@ def index_xylem_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination]: """Return vulnerability data stored in index \"xylem\" @@ -322063,10 +315493,8 @@ def index_xylem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322119,8 +315547,7 @@ def index_xylem_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322169,8 +315596,7 @@ def index_xylem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322188,7 +315614,7 @@ def index_xylem_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"xylem\" @@ -322228,10 +315654,8 @@ def index_xylem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322284,8 +315708,7 @@ def index_xylem_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322329,8 +315752,7 @@ def _index_xylem_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -322343,7 +315765,10 @@ def _index_xylem_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -322427,13 +315852,9 @@ def _index_xylem_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -322516,8 +315937,7 @@ def index_yamaha_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322535,7 +315955,7 @@ def index_yamaha_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination: """Return vulnerability data stored in index \"yamaha\" @@ -322575,10 +315995,8 @@ def index_yamaha_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322631,8 +316049,7 @@ def index_yamaha_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322681,8 +316098,7 @@ def index_yamaha_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322700,7 +316116,7 @@ def index_yamaha_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination]: """Return vulnerability data stored in index \"yamaha\" @@ -322740,10 +316156,8 @@ def index_yamaha_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322796,8 +316210,7 @@ def index_yamaha_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322846,8 +316259,7 @@ def index_yamaha_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322865,7 +316277,7 @@ def index_yamaha_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yamaha\" @@ -322905,10 +316317,8 @@ def index_yamaha_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322961,8 +316371,7 @@ def index_yamaha_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323006,8 +316415,7 @@ def _index_yamaha_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323020,7 +316428,10 @@ def _index_yamaha_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -323104,13 +316515,9 @@ def _index_yamaha_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -323193,8 +316600,7 @@ def index_yokogawa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323212,7 +316618,7 @@ def index_yokogawa_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination: """Return vulnerability data stored in index \"yokogawa\" @@ -323252,10 +316658,8 @@ def index_yokogawa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323308,8 +316712,7 @@ def index_yokogawa_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323358,8 +316761,7 @@ def index_yokogawa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323377,7 +316779,7 @@ def index_yokogawa_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"yokogawa\" @@ -323417,10 +316819,8 @@ def index_yokogawa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323473,8 +316873,7 @@ def index_yokogawa_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323523,8 +316922,7 @@ def index_yokogawa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323542,7 +316940,7 @@ def index_yokogawa_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yokogawa\" @@ -323582,10 +316980,8 @@ def index_yokogawa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323638,8 +317034,7 @@ def index_yokogawa_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323683,8 +317078,7 @@ def _index_yokogawa_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323697,7 +317091,10 @@ def _index_yokogawa_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -323781,13 +317178,9 @@ def _index_yokogawa_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -323870,8 +317263,7 @@ def index_yubico_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323889,7 +317281,7 @@ def index_yubico_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination: """Return vulnerability data stored in index \"yubico\" @@ -323929,10 +317321,8 @@ def index_yubico_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323985,8 +317375,7 @@ def index_yubico_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324035,8 +317424,7 @@ def index_yubico_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324054,7 +317442,7 @@ def index_yubico_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination]: """Return vulnerability data stored in index \"yubico\" @@ -324094,10 +317482,8 @@ def index_yubico_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324150,8 +317536,7 @@ def index_yubico_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324200,8 +317585,7 @@ def index_yubico_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324219,7 +317603,7 @@ def index_yubico_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"yubico\" @@ -324259,10 +317643,8 @@ def index_yubico_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324315,8 +317697,7 @@ def index_yubico_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324360,8 +317741,7 @@ def _index_yubico_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -324374,7 +317754,10 @@ def _index_yubico_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -324458,13 +317841,9 @@ def _index_yubico_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -324547,8 +317926,7 @@ def index_zdi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324566,7 +317944,7 @@ def index_zdi_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination: """Return vulnerability data stored in index \"zdi\" @@ -324606,10 +317984,8 @@ def index_zdi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324662,8 +318038,7 @@ def index_zdi_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324712,8 +318087,7 @@ def index_zdi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324731,7 +318105,7 @@ def index_zdi_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"zdi\" @@ -324771,10 +318145,8 @@ def index_zdi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324827,8 +318199,7 @@ def index_zdi_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324877,8 +318248,7 @@ def index_zdi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324896,7 +318266,7 @@ def index_zdi_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zdi\" @@ -324936,10 +318306,8 @@ def index_zdi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324992,8 +318360,7 @@ def index_zdi_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325037,8 +318404,7 @@ def _index_zdi_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325051,7 +318417,10 @@ def _index_zdi_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -325135,13 +318504,9 @@ def _index_zdi_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -325224,8 +318589,7 @@ def index_zebra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325243,7 +318607,7 @@ def index_zebra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination: """Return vulnerability data stored in index \"zebra\" @@ -325283,10 +318647,8 @@ def index_zebra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325339,8 +318701,7 @@ def index_zebra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325389,8 +318750,7 @@ def index_zebra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325408,7 +318768,7 @@ def index_zebra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination]: """Return vulnerability data stored in index \"zebra\" @@ -325448,10 +318808,8 @@ def index_zebra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325504,8 +318862,7 @@ def index_zebra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325554,8 +318911,7 @@ def index_zebra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325573,7 +318929,7 @@ def index_zebra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zebra\" @@ -325613,10 +318969,8 @@ def index_zebra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325669,8 +319023,7 @@ def index_zebra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325714,8 +319067,7 @@ def _index_zebra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325728,7 +319080,10 @@ def _index_zebra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -325812,13 +319167,9 @@ def _index_zebra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -325901,8 +319252,7 @@ def index_zeroscience_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325920,7 +319270,7 @@ def index_zeroscience_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination: """Return vulnerability data stored in index \"zeroscience\" @@ -325960,10 +319310,8 @@ def index_zeroscience_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326016,8 +319364,7 @@ def index_zeroscience_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326066,8 +319413,7 @@ def index_zeroscience_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326085,7 +319431,7 @@ def index_zeroscience_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination]: """Return vulnerability data stored in index \"zeroscience\" @@ -326125,10 +319471,8 @@ def index_zeroscience_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326181,8 +319525,7 @@ def index_zeroscience_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326231,8 +319574,7 @@ def index_zeroscience_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326250,7 +319592,7 @@ def index_zeroscience_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zeroscience\" @@ -326290,10 +319632,8 @@ def index_zeroscience_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326346,8 +319686,7 @@ def index_zeroscience_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326391,8 +319730,7 @@ def _index_zeroscience_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -326405,7 +319743,10 @@ def _index_zeroscience_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -326489,13 +319830,9 @@ def _index_zeroscience_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -326578,8 +319915,7 @@ def index_zimbra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326597,7 +319933,7 @@ def index_zimbra_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination: """Return vulnerability data stored in index \"zimbra\" @@ -326637,10 +319973,8 @@ def index_zimbra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326693,8 +320027,7 @@ def index_zimbra_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326743,8 +320076,7 @@ def index_zimbra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326762,7 +320094,7 @@ def index_zimbra_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination]: """Return vulnerability data stored in index \"zimbra\" @@ -326802,10 +320134,8 @@ def index_zimbra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326858,8 +320188,7 @@ def index_zimbra_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326908,8 +320237,7 @@ def index_zimbra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326927,7 +320255,7 @@ def index_zimbra_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zimbra\" @@ -326967,10 +320295,8 @@ def index_zimbra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327023,8 +320349,7 @@ def index_zimbra_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327068,8 +320393,7 @@ def _index_zimbra_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327082,7 +320406,10 @@ def _index_zimbra_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -327166,13 +320493,9 @@ def _index_zimbra_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -327255,8 +320578,7 @@ def index_zoom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327274,7 +320596,7 @@ def index_zoom_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination: """Return vulnerability data stored in index \"zoom\" @@ -327314,10 +320636,8 @@ def index_zoom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327370,8 +320690,7 @@ def index_zoom_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327420,8 +320739,7 @@ def index_zoom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327439,7 +320757,7 @@ def index_zoom_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination]: """Return vulnerability data stored in index \"zoom\" @@ -327479,10 +320797,8 @@ def index_zoom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327535,8 +320851,7 @@ def index_zoom_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327585,8 +320900,7 @@ def index_zoom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327604,7 +320918,7 @@ def index_zoom_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zoom\" @@ -327644,10 +320958,8 @@ def index_zoom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327700,8 +321012,7 @@ def index_zoom_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327745,8 +321056,7 @@ def _index_zoom_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327759,7 +321069,10 @@ def _index_zoom_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -327843,13 +321156,9 @@ def _index_zoom_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -327932,8 +321241,7 @@ def index_zscaler_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327951,7 +321259,7 @@ def index_zscaler_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination: """Return vulnerability data stored in index \"zscaler\" @@ -327991,10 +321299,8 @@ def index_zscaler_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328047,8 +321353,7 @@ def index_zscaler_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328097,8 +321402,7 @@ def index_zscaler_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328116,7 +321420,7 @@ def index_zscaler_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination]: """Return vulnerability data stored in index \"zscaler\" @@ -328156,10 +321460,8 @@ def index_zscaler_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328212,8 +321514,7 @@ def index_zscaler_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328262,8 +321563,7 @@ def index_zscaler_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328281,7 +321581,7 @@ def index_zscaler_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zscaler\" @@ -328321,10 +321621,8 @@ def index_zscaler_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328377,8 +321675,7 @@ def index_zscaler_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328422,8 +321719,7 @@ def _index_zscaler_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -328436,7 +321732,10 @@ def _index_zscaler_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -328520,13 +321819,9 @@ def _index_zscaler_get_serialize( _query_params.append(('published', published)) - if var_date is not None: + if date is not None: - _query_params.append(('date', var_date)) - - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -328609,8 +321904,7 @@ def index_zuso_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328628,7 +321922,7 @@ def index_zuso_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination: """Return vulnerability data stored in index \"zuso\" @@ -328668,10 +321962,8 @@ def index_zuso_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328724,8 +322016,7 @@ def index_zuso_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328774,8 +322065,7 @@ def index_zuso_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328793,7 +322083,7 @@ def index_zuso_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination]: """Return vulnerability data stored in index \"zuso\" @@ -328833,10 +322123,8 @@ def index_zuso_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328889,8 +322177,7 @@ def index_zuso_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328939,8 +322226,7 @@ def index_zuso_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328958,7 +322244,7 @@ def index_zuso_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zuso\" @@ -328998,10 +322284,8 @@ def index_zuso_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329054,8 +322338,7 @@ def index_zuso_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329099,8 +322382,7 @@ def _index_zuso_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329113,7 +322395,10 @@ def _index_zuso_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -329197,13 +322482,9 @@ def _index_zuso_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) + if date is not None: - if var_date2 is not None: - - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: @@ -329286,8 +322567,7 @@ def index_zyxel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329305,7 +322585,7 @@ def index_zyxel_get( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination: """Return vulnerability data stored in index \"zyxel\" @@ -329345,10 +322625,8 @@ def index_zyxel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329401,8 +322679,7 @@ def index_zyxel_get( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329451,8 +322728,7 @@ def index_zyxel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329470,7 +322746,7 @@ def index_zyxel_get_with_http_info( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination]: """Return vulnerability data stored in index \"zyxel\" @@ -329510,10 +322786,8 @@ def index_zyxel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329566,8 +322840,7 @@ def index_zyxel_get_with_http_info( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329616,8 +322889,7 @@ def index_zyxel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329635,7 +322907,7 @@ def index_zyxel_get_without_preload_content( _request_auth: Optional[Dict[StrictStr, Any]] = None, _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=0)] = 0, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: """Return vulnerability data stored in index \"zyxel\" @@ -329675,10 +322947,8 @@ def index_zyxel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. - :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str + :param date: Specify an exact published date to filter with. + :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329731,8 +323001,7 @@ def index_zyxel_get_without_preload_content( ransomware=ransomware, botnet=botnet, published=published, - var_date=var_date, - var_date2=var_date2, + date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329776,8 +323045,7 @@ def _index_zyxel_get_serialize( ransomware, botnet, published, - var_date, - var_date2, + date, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329790,7 +323058,10 @@ def _index_zyxel_get_serialize( _host_index, ) -> RequestSerialized: - _host = None + _hosts = [ + 'https://api.vulncheck.com/v3' + ] + _host = _hosts[_host_index] _collection_formats: Dict[str, str] = { } @@ -329874,13 +323145,9 @@ def _index_zyxel_get_serialize( _query_params.append(('published', published)) - if var_date is not None: - - _query_params.append(('date', var_date)) - - if var_date2 is not None: + if date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', date)) if updated_at_start_date is not None: diff --git a/vulncheck_sdk/api_client.py b/vulncheck_sdk/api_client.py index 0146fd92..4b766820 100644 --- a/vulncheck_sdk/api_client.py +++ b/vulncheck_sdk/api_client.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.41/python' + self.user_agent = 'OpenAPI-Generator/0.0.42/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/vulncheck_sdk/configuration.py b/vulncheck_sdk/configuration.py index 2c27a2d9..f65b8217 100644 --- a/vulncheck_sdk/configuration.py +++ b/vulncheck_sdk/configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -214,7 +214,7 @@ def __init__( ) -> None: """Constructor """ - self._base_path = "/v3" if host is None else host + self._base_path = "https://api.vulncheck.com/v3" if host is None else host """Default Base url """ self.server_index = 0 if server_index is None and host is None else server_index @@ -536,8 +536,8 @@ def to_debug_report(self) -> str: return "Python SDK Debug Report:\n"\ "OS: {env}\n"\ "Python Version: {pyversion}\n"\ - "Version of the API: 3.0\n"\ - "SDK Package Version: 0.0.41".\ + "Version of the API: latest\n"\ + "SDK Package Version: 0.0.42".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: @@ -547,7 +547,11 @@ def get_host_settings(self) -> List[HostSetting]: """ return [ { - 'url': "/v3", + 'url': "https://api.vulncheck.com/v3", + 'description': "No description provided", + }, + { + 'url': "https://api.vulncheck.com/v4", 'description': "No description provided", } ] diff --git a/vulncheck_sdk/exceptions.py b/vulncheck_sdk/exceptions.py index 655c6473..408eac35 100644 --- a/vulncheck_sdk/exceptions.py +++ b/vulncheck_sdk/exceptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) diff --git a/vulncheck_sdk/models/__init__.py b/vulncheck_sdk/models/__init__.py index 4716cf27..f28e3b09 100644 --- a/vulncheck_sdk/models/__init__.py +++ b/vulncheck_sdk/models/__init__.py @@ -4,9 +4,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -160,13 +160,11 @@ from vulncheck_sdk.models.advisory_cve_detail import AdvisoryCVEDetail from vulncheck_sdk.models.advisory_cve_details_link import AdvisoryCVEDetailsLink from vulncheck_sdk.models.advisory_cve_reference import AdvisoryCVEReference -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference from vulncheck_sdk.models.advisory_cvss import AdvisoryCVSS from vulncheck_sdk.models.advisory_cvssv2 import AdvisoryCVSSV2 from vulncheck_sdk.models.advisory_cvssv3 import AdvisoryCVSSV3 from vulncheck_sdk.models.advisory_cvssv40 import AdvisoryCVSSV40 from vulncheck_sdk.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode from vulncheck_sdk.models.advisory_canvas_exploit import AdvisoryCanvasExploit from vulncheck_sdk.models.advisory_capec import AdvisoryCapec from vulncheck_sdk.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory @@ -226,7 +224,6 @@ from vulncheck_sdk.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails from vulncheck_sdk.models.advisory_danfoss import AdvisoryDanfoss from vulncheck_sdk.models.advisory_dassault import AdvisoryDassault -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.models.advisory_debian_cve import AdvisoryDebianCVE from vulncheck_sdk.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory from vulncheck_sdk.models.advisory_dell import AdvisoryDell @@ -236,9 +233,7 @@ from vulncheck_sdk.models.advisory_distro_version import AdvisoryDistroVersion from vulncheck_sdk.models.advisory_django import AdvisoryDjango from vulncheck_sdk.models.advisory_document_metadata import AdvisoryDocumentMetadata -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote from vulncheck_sdk.models.advisory_document_publisher import AdvisoryDocumentPublisher -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking from vulncheck_sdk.models.advisory_dot_cms import AdvisoryDotCMS from vulncheck_sdk.models.advisory_dragos_advisory import AdvisoryDragosAdvisory from vulncheck_sdk.models.advisory_draytek import AdvisoryDraytek @@ -353,7 +348,6 @@ from vulncheck_sdk.models.advisory_ip_intel_record import AdvisoryIpIntelRecord from vulncheck_sdk.models.advisory_israeli_alert import AdvisoryIsraeliAlert from vulncheck_sdk.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.models.advisory_istio import AdvisoryIstio from vulncheck_sdk.models.advisory_ivanti import AdvisoryIvanti from vulncheck_sdk.models.advisory_ivanti_rss import AdvisoryIvantiRSS @@ -534,7 +528,6 @@ from vulncheck_sdk.models.advisory_product import AdvisoryProduct from vulncheck_sdk.models.advisory_product_branch import AdvisoryProductBranch from vulncheck_sdk.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree from vulncheck_sdk.models.advisory_products_affected import AdvisoryProductsAffected from vulncheck_sdk.models.advisory_progress import AdvisoryProgress from vulncheck_sdk.models.advisory_proofpoint import AdvisoryProofpoint @@ -564,12 +557,10 @@ from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship from vulncheck_sdk.models.advisory_remediation_data import AdvisoryRemediationData from vulncheck_sdk.models.advisory_renesas import AdvisoryRenesas from vulncheck_sdk.models.advisory_reported_exploit import AdvisoryReportedExploit from vulncheck_sdk.models.advisory_restart_data import AdvisoryRestartData -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision from vulncheck_sdk.models.advisory_revision_history import AdvisoryRevisionHistory from vulncheck_sdk.models.advisory_revive import AdvisoryRevive from vulncheck_sdk.models.advisory_rhel_cve import AdvisoryRhelCVE @@ -603,7 +594,6 @@ from vulncheck_sdk.models.advisory_schneider_cve import AdvisorySchneiderCVE from vulncheck_sdk.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory from vulncheck_sdk.models.advisory_schutzwerk import AdvisorySchutzwerk -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet from vulncheck_sdk.models.advisory_sec_fix import AdvisorySecFix from vulncheck_sdk.models.advisory_security_bulletin import AdvisorySecurityBulletin from vulncheck_sdk.models.advisory_security_lab import AdvisorySecurityLab @@ -655,7 +645,6 @@ from vulncheck_sdk.models.advisory_splunk import AdvisorySplunk from vulncheck_sdk.models.advisory_splunk_product import AdvisorySplunkProduct from vulncheck_sdk.models.advisory_spring import AdvisorySpring -from vulncheck_sdk.models.advisory_status import AdvisoryStatus from vulncheck_sdk.models.advisory_stormshield import AdvisoryStormshield from vulncheck_sdk.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory from vulncheck_sdk.models.advisory_sudo import AdvisorySudo @@ -677,7 +666,6 @@ from vulncheck_sdk.models.advisory_thales import AdvisoryThales from vulncheck_sdk.models.advisory_the_missing_link import AdvisoryTheMissingLink from vulncheck_sdk.models.advisory_thermo_fisher import AdvisoryThermoFisher -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat from vulncheck_sdk.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.models.advisory_threat_data import AdvisoryThreatData from vulncheck_sdk.models.advisory_tibco import AdvisoryTibco @@ -698,7 +686,6 @@ from vulncheck_sdk.models.advisory_unify import AdvisoryUnify from vulncheck_sdk.models.advisory_unisoc import AdvisoryUnisoc from vulncheck_sdk.models.advisory_update import AdvisoryUpdate -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated from vulncheck_sdk.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel from vulncheck_sdk.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary from vulncheck_sdk.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs @@ -720,7 +707,6 @@ from vulncheck_sdk.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig from vulncheck_sdk.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability from vulncheck_sdk.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage from vulncheck_sdk.models.advisory_vulnerable_product import AdvisoryVulnerableProduct from vulncheck_sdk.models.advisory_vulnrichment import AdvisoryVulnrichment @@ -780,7 +766,6 @@ from vulncheck_sdk.models.api_configurations import ApiConfigurations from vulncheck_sdk.models.api_cve_items import ApiCveItems from vulncheck_sdk.models.api_cve_items_extended import ApiCveItemsExtended -from vulncheck_sdk.models.api_date_time import ApiDateTime from vulncheck_sdk.models.api_description import ApiDescription from vulncheck_sdk.models.api_description_data import ApiDescriptionData from vulncheck_sdk.models.api_epss import ApiEPSS @@ -1335,6 +1320,11 @@ from vulncheck_sdk.models.render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata import RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata import RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata from vulncheck_sdk.models.render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata import RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata +from vulncheck_sdk.models.search_error_response import SearchErrorResponse +from vulncheck_sdk.models.search_v4_advisory_meta import SearchV4AdvisoryMeta +from vulncheck_sdk.models.search_v4_advisory_return_value import SearchV4AdvisoryReturnValue +from vulncheck_sdk.models.search_v4_feed_item import SearchV4FeedItem +from vulncheck_sdk.models.search_v4_list_feed_return_value import SearchV4ListFeedReturnValue from vulncheck_sdk.models.v3controllers_backup_response_metadata import V3controllersBackupResponseMetadata from vulncheck_sdk.models.v3controllers_purl_response_data import V3controllersPurlResponseData from vulncheck_sdk.models.v3controllers_purl_response_metadata import V3controllersPurlResponseMetadata diff --git a/vulncheck_sdk/models/advisory_a10.py b/vulncheck_sdk/models/advisory_a10.py index 789ea876..08fb3af9 100644 --- a/vulncheck_sdk/models/advisory_a10.py +++ b/vulncheck_sdk/models/advisory_a10.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryA10(BaseModel): """ - AdvisoryA10 + advisory.A10 """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_abb_advisory.py b/vulncheck_sdk/models/advisory_abb_advisory.py index ead5fa58..dc28d01d 100644 --- a/vulncheck_sdk/models/advisory_abb_advisory.py +++ b/vulncheck_sdk/models/advisory_abb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryABBAdvisory(BaseModel): """ - AdvisoryABBAdvisory + advisory.ABBAdvisory """ # noqa: E501 abb_vulnerability_id: Optional[List[StrictStr]] = None csaf: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_abbott.py b/vulncheck_sdk/models/advisory_abbott.py index 6188b796..9fac5776 100644 --- a/vulncheck_sdk/models/advisory_abbott.py +++ b/vulncheck_sdk/models/advisory_abbott.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAbbott(BaseModel): """ - AdvisoryAbbott + advisory.Abbott """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_absolute.py b/vulncheck_sdk/models/advisory_absolute.py index d9bc5b83..353e1c3d 100644 --- a/vulncheck_sdk/models/advisory_absolute.py +++ b/vulncheck_sdk/models/advisory_absolute.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAbsolute(BaseModel): """ - AdvisoryAbsolute + advisory.Absolute """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_acknowledgement.py b/vulncheck_sdk/models/advisory_acknowledgement.py index 28559c44..6016aaaa 100644 --- a/vulncheck_sdk/models/advisory_acknowledgement.py +++ b/vulncheck_sdk/models/advisory_acknowledgement.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAcknowledgement(BaseModel): """ - AdvisoryAcknowledgement + advisory.Acknowledgement """ # noqa: E501 name: Optional[List[AdvisoryIVal]] = None url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_acronis.py b/vulncheck_sdk/models/advisory_acronis.py index a3e7dbbd..6a681f8b 100644 --- a/vulncheck_sdk/models/advisory_acronis.py +++ b/vulncheck_sdk/models/advisory_acronis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAcronis(BaseModel): """ - AdvisoryAcronis + advisory.Acronis """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_adobe_advisory.py b/vulncheck_sdk/models/advisory_adobe_advisory.py index 178a3584..8b373708 100644 --- a/vulncheck_sdk/models/advisory_adobe_advisory.py +++ b/vulncheck_sdk/models/advisory_adobe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryAdobeAdvisory(BaseModel): """ - AdvisoryAdobeAdvisory + advisory.AdobeAdvisory """ # noqa: E501 adobe_cves: Optional[List[AdvisoryAdobeCVE]] = None affected: Optional[List[AdvisoryAdobeAffected]] = None diff --git a/vulncheck_sdk/models/advisory_adobe_affected.py b/vulncheck_sdk/models/advisory_adobe_affected.py index d5b8d161..5b5a8a96 100644 --- a/vulncheck_sdk/models/advisory_adobe_affected.py +++ b/vulncheck_sdk/models/advisory_adobe_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeAffected(BaseModel): """ - AdvisoryAdobeAffected + advisory.AdobeAffected """ # noqa: E501 platform: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_adobe_cve.py b/vulncheck_sdk/models/advisory_adobe_cve.py index b0de325e..e128669c 100644 --- a/vulncheck_sdk/models/advisory_adobe_cve.py +++ b/vulncheck_sdk/models/advisory_adobe_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeCVE(BaseModel): """ - AdvisoryAdobeCVE + advisory.AdobeCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_adobe_solution.py b/vulncheck_sdk/models/advisory_adobe_solution.py index c41d761b..94ad925a 100644 --- a/vulncheck_sdk/models/advisory_adobe_solution.py +++ b/vulncheck_sdk/models/advisory_adobe_solution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdobeSolution(BaseModel): """ - AdvisoryAdobeSolution + advisory.AdobeSolution """ # noqa: E501 platform: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_adp.py b/vulncheck_sdk/models/advisory_adp.py index 5d690b46..7bce08c7 100644 --- a/vulncheck_sdk/models/advisory_adp.py +++ b/vulncheck_sdk/models/advisory_adp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryADP(BaseModel): """ - AdvisoryADP + advisory.ADP """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None metrics: Optional[List[AdvisoryVulnrichmentMetric]] = None diff --git a/vulncheck_sdk/models/advisory_adp_container.py b/vulncheck_sdk/models/advisory_adp_container.py index 31065b4a..9286bfa5 100644 --- a/vulncheck_sdk/models/advisory_adp_container.py +++ b/vulncheck_sdk/models/advisory_adp_container.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -32,7 +32,7 @@ class AdvisoryADPContainer(BaseModel): """ - AdvisoryADPContainer + advisory.ADPContainer """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None date_public: Optional[StrictStr] = Field(default=None, description="OK", alias="datePublic") @@ -40,7 +40,7 @@ class AdvisoryADPContainer(BaseModel): impacts: Optional[List[AdvisoryImpact]] = Field(default=None, description="OK") metrics: Optional[List[AdvisoryMetric]] = Field(default=None, description="OK") problem_types: Optional[List[AdvisoryMProblemTypes]] = Field(default=None, description="OK", alias="problemTypes") - provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, description="OK", alias="providerMetadata") + provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, alias="providerMetadata") references: Optional[List[AdvisoryMReference]] = None tags: Optional[List[StrictStr]] = Field(default=None, description="OK") title: Optional[StrictStr] = Field(default=None, description="OK") diff --git a/vulncheck_sdk/models/advisory_advantech.py b/vulncheck_sdk/models/advisory_advantech.py index b2c2cf0f..23e62467 100644 --- a/vulncheck_sdk/models/advisory_advantech.py +++ b/vulncheck_sdk/models/advisory_advantech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdvantech(BaseModel): """ - AdvisoryAdvantech + advisory.Advantech """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_advisory.py b/vulncheck_sdk/models/advisory_advisory.py index 06e378c7..d531f0e9 100644 --- a/vulncheck_sdk/models/advisory_advisory.py +++ b/vulncheck_sdk/models/advisory_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAdvisory(BaseModel): """ - AdvisoryAdvisory + advisory.Advisory """ # noqa: E501 affects: Optional[StrictStr] = None announced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_advisory_details.py b/vulncheck_sdk/models/advisory_advisory_details.py index fd5bee2f..33db43b2 100644 --- a/vulncheck_sdk/models/advisory_advisory_details.py +++ b/vulncheck_sdk/models/advisory_advisory_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,24 +18,22 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.models.advisory_bugzilla import AdvisoryBugzilla -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.models.advisory_oval_cve import AdvisoryOvalCVE -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated from typing import Optional, Set from typing_extensions import Self class AdvisoryAdvisoryDetails(BaseModel): """ - AdvisoryAdvisoryDetails + advisory.AdvisoryDetails """ # noqa: E501 bugzilla: Optional[AdvisoryBugzilla] = None cve: Optional[AdvisoryOvalCVE] = None - issued: Optional[AdvisoryIssued] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="advisory.Issued") severity: Optional[StrictStr] = None - updated: Optional[AdvisoryUpdated] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="advisory.Updated") __properties: ClassVar[List[str]] = ["bugzilla", "cve", "issued", "severity", "updated"] model_config = ConfigDict( @@ -83,12 +81,6 @@ def to_dict(self) -> Dict[str, Any]: # override the default output from pydantic by calling `to_dict()` of cve if self.cve: _dict['cve'] = self.cve.to_dict() - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -103,9 +95,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: _obj = cls.model_validate({ "bugzilla": AdvisoryBugzilla.from_dict(obj["bugzilla"]) if obj.get("bugzilla") is not None else None, "cve": AdvisoryOvalCVE.from_dict(obj["cve"]) if obj.get("cve") is not None else None, - "issued": AdvisoryIssued.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "severity": obj.get("severity"), - "updated": AdvisoryUpdated.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/advisory_advisory_record.py b/vulncheck_sdk/models/advisory_advisory_record.py index 19215587..5dffdad6 100644 --- a/vulncheck_sdk/models/advisory_advisory_record.py +++ b/vulncheck_sdk/models/advisory_advisory_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAdvisoryRecord(BaseModel): """ - AdvisoryAdvisoryRecord + advisory.AdvisoryRecord """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected.py b/vulncheck_sdk/models/advisory_affected.py index 83af3416..3f0b67e9 100644 --- a/vulncheck_sdk/models/advisory_affected.py +++ b/vulncheck_sdk/models/advisory_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.models.advisory_osv_package import AdvisoryOSVPackage from vulncheck_sdk.models.advisory_range import AdvisoryRange @@ -28,10 +28,10 @@ class AdvisoryAffected(BaseModel): """ - AdvisoryAffected + advisory.Affected """ # noqa: E501 - database_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the database") - ecosystem_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the ecosystem") + database_specific: Optional[Any] = None + ecosystem_specific: Optional[Any] = None package: Optional[AdvisoryOSVPackage] = None ranges: Optional[List[AdvisoryRange]] = None severity: Optional[List[AdvisorySeverity]] = None @@ -94,6 +94,16 @@ def to_dict(self) -> Dict[str, Any]: if _item_severity: _items.append(_item_severity.to_dict()) _dict['severity'] = _items + # set to None if database_specific (nullable) is None + # and model_fields_set contains the field + if self.database_specific is None and "database_specific" in self.model_fields_set: + _dict['database_specific'] = None + + # set to None if ecosystem_specific (nullable) is None + # and model_fields_set contains the field + if self.ecosystem_specific is None and "ecosystem_specific" in self.model_fields_set: + _dict['ecosystem_specific'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_affected_chrome.py b/vulncheck_sdk/models/advisory_affected_chrome.py index 9d0837b8..9cc7da9a 100644 --- a/vulncheck_sdk/models/advisory_affected_chrome.py +++ b/vulncheck_sdk/models/advisory_affected_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedChrome(BaseModel): """ - AdvisoryAffectedChrome + advisory.AffectedChrome """ # noqa: E501 fixed_version: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_debian_package.py b/vulncheck_sdk/models/advisory_affected_debian_package.py index f4a50c0c..f1b285f7 100644 --- a/vulncheck_sdk/models/advisory_affected_debian_package.py +++ b/vulncheck_sdk/models/advisory_affected_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedDebianPackage(BaseModel): """ - AdvisoryAffectedDebianPackage + advisory.AffectedDebianPackage """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_debian_release.py b/vulncheck_sdk/models/advisory_affected_debian_release.py index f087636b..df0502fc 100644 --- a/vulncheck_sdk/models/advisory_affected_debian_release.py +++ b/vulncheck_sdk/models/advisory_affected_debian_release.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAffectedDebianRelease(BaseModel): """ - AdvisoryAffectedDebianRelease + advisory.AffectedDebianRelease """ # noqa: E501 fixed_version: Optional[StrictStr] = None nodsa: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_debian_repository.py b/vulncheck_sdk/models/advisory_affected_debian_repository.py index 43ecc60c..c991191b 100644 --- a/vulncheck_sdk/models/advisory_affected_debian_repository.py +++ b/vulncheck_sdk/models/advisory_affected_debian_repository.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedDebianRepository(BaseModel): """ - AdvisoryAffectedDebianRepository + advisory.AffectedDebianRepository """ # noqa: E501 repository_name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_file.py b/vulncheck_sdk/models/advisory_affected_file.py index d68961c4..0b395dfb 100644 --- a/vulncheck_sdk/models/advisory_affected_file.py +++ b/vulncheck_sdk/models/advisory_affected_file.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedFile(BaseModel): """ - AdvisoryAffectedFile + advisory.AffectedFile """ # noqa: E501 file_last_modified: Optional[StrictStr] = None file_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_product.py b/vulncheck_sdk/models/advisory_affected_product.py index 19c71127..776bfdf2 100644 --- a/vulncheck_sdk/models/advisory_affected_product.py +++ b/vulncheck_sdk/models/advisory_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedProduct(BaseModel): """ - AdvisoryAffectedProduct + advisory.AffectedProduct """ # noqa: E501 affected_releases: Optional[StrictStr] = Field(default=None, alias="affectedReleases") fixed_releases: Optional[StrictStr] = Field(default=None, alias="fixedReleases") diff --git a/vulncheck_sdk/models/advisory_affected_rel.py b/vulncheck_sdk/models/advisory_affected_rel.py index c25e8c63..36af68e8 100644 --- a/vulncheck_sdk/models/advisory_affected_rel.py +++ b/vulncheck_sdk/models/advisory_affected_rel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAffectedRel(BaseModel): """ - AdvisoryAffectedRel + advisory.AffectedRel """ # noqa: E501 advisory: Optional[StrictStr] = None cpe: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_affected_ubuntu_package.py b/vulncheck_sdk/models/advisory_affected_ubuntu_package.py index f0c926ea..68ca2781 100644 --- a/vulncheck_sdk/models/advisory_affected_ubuntu_package.py +++ b/vulncheck_sdk/models/advisory_affected_ubuntu_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAffectedUbuntuPackage(BaseModel): """ - AdvisoryAffectedUbuntuPackage + advisory.AffectedUbuntuPackage """ # noqa: E501 break_commit_url: Optional[List[StrictStr]] = None fix_commit_url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_aix.py b/vulncheck_sdk/models/advisory_aix.py index d83e4db7..f0a14cac 100644 --- a/vulncheck_sdk/models/advisory_aix.py +++ b/vulncheck_sdk/models/advisory_aix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAIX(BaseModel): """ - AdvisoryAIX + advisory.AIX """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_aleph_research.py b/vulncheck_sdk/models/advisory_aleph_research.py index e7410905..d613f957 100644 --- a/vulncheck_sdk/models/advisory_aleph_research.py +++ b/vulncheck_sdk/models/advisory_aleph_research.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlephResearch(BaseModel): """ - AdvisoryAlephResearch + advisory.AlephResearch """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_alibaba.py b/vulncheck_sdk/models/advisory_alibaba.py index a2ea7370..ccc4cdbb 100644 --- a/vulncheck_sdk/models/advisory_alibaba.py +++ b/vulncheck_sdk/models/advisory_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlibaba(BaseModel): """ - AdvisoryAlibaba + advisory.Alibaba """ # noqa: E501 cnnvd: Optional[List[StrictStr]] = None cnvd: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_alma_date.py b/vulncheck_sdk/models/advisory_alma_date.py index e0a45ea3..ba5659ac 100644 --- a/vulncheck_sdk/models/advisory_alma_date.py +++ b/vulncheck_sdk/models/advisory_alma_date.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryAlmaDate(BaseModel): """ - AdvisoryAlmaDate + advisory.AlmaDate """ # noqa: E501 - var_date: Optional[StrictInt] = Field(default=None, alias="$date") + date: Optional[StrictInt] = Field(default=None, alias="$date") __properties: ClassVar[List[str]] = ["$date"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/advisory_alma_linux_update.py b/vulncheck_sdk/models/advisory_alma_linux_update.py index 4af81551..66dbe36d 100644 --- a/vulncheck_sdk/models/advisory_alma_linux_update.py +++ b/vulncheck_sdk/models/advisory_alma_linux_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryAlmaLinuxUpdate(BaseModel): """ - AdvisoryAlmaLinuxUpdate + advisory.AlmaLinuxUpdate """ # noqa: E501 bs_repo_id: Optional[AdvisoryAlmaObjectID] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_alma_object_id.py b/vulncheck_sdk/models/advisory_alma_object_id.py index 319b3502..8f7327e5 100644 --- a/vulncheck_sdk/models/advisory_alma_object_id.py +++ b/vulncheck_sdk/models/advisory_alma_object_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaObjectID(BaseModel): """ - AdvisoryAlmaObjectID + advisory.AlmaObjectID """ # noqa: E501 oid: Optional[StrictStr] = Field(default=None, alias="$oid") __properties: ClassVar[List[str]] = ["$oid"] diff --git a/vulncheck_sdk/models/advisory_alma_package.py b/vulncheck_sdk/models/advisory_alma_package.py index d6b76b01..4973a601 100644 --- a/vulncheck_sdk/models/advisory_alma_package.py +++ b/vulncheck_sdk/models/advisory_alma_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaPackage(BaseModel): """ - AdvisoryAlmaPackage + advisory.AlmaPackage """ # noqa: E501 arch: Optional[StrictStr] = None epoch: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_alma_package_list.py b/vulncheck_sdk/models/advisory_alma_package_list.py index 57eaa458..65bbc90b 100644 --- a/vulncheck_sdk/models/advisory_alma_package_list.py +++ b/vulncheck_sdk/models/advisory_alma_package_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlmaPackageList(BaseModel): """ - AdvisoryAlmaPackageList + advisory.AlmaPackageList """ # noqa: E501 name: Optional[StrictStr] = None packages: Optional[List[AdvisoryAlmaPackage]] = None diff --git a/vulncheck_sdk/models/advisory_alma_reference.py b/vulncheck_sdk/models/advisory_alma_reference.py index 72616af2..3bf9586c 100644 --- a/vulncheck_sdk/models/advisory_alma_reference.py +++ b/vulncheck_sdk/models/advisory_alma_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlmaReference(BaseModel): """ - AdvisoryAlmaReference + advisory.AlmaReference """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_alpine_linux_sec_db.py b/vulncheck_sdk/models/advisory_alpine_linux_sec_db.py index 7335f084..80dcaea0 100644 --- a/vulncheck_sdk/models/advisory_alpine_linux_sec_db.py +++ b/vulncheck_sdk/models/advisory_alpine_linux_sec_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlpineLinuxSecDB(BaseModel): """ - AdvisoryAlpineLinuxSecDB + advisory.AlpineLinuxSecDB """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_alpine_linux_sec_db_package.py b/vulncheck_sdk/models/advisory_alpine_linux_sec_db_package.py index 135a8867..61a23dcb 100644 --- a/vulncheck_sdk/models/advisory_alpine_linux_sec_db_package.py +++ b/vulncheck_sdk/models/advisory_alpine_linux_sec_db_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAlpineLinuxSecDBPackage(BaseModel): """ - AdvisoryAlpineLinuxSecDBPackage + advisory.AlpineLinuxSecDBPackage """ # noqa: E501 package_name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryAlpineLinuxSecurityFix]] = None diff --git a/vulncheck_sdk/models/advisory_alpine_linux_security_fix.py b/vulncheck_sdk/models/advisory_alpine_linux_security_fix.py index e94d6c0d..80032a2e 100644 --- a/vulncheck_sdk/models/advisory_alpine_linux_security_fix.py +++ b/vulncheck_sdk/models/advisory_alpine_linux_security_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAlpineLinuxSecurityFix(BaseModel): """ - AdvisoryAlpineLinuxSecurityFix + advisory.AlpineLinuxSecurityFix """ # noqa: E501 cve: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_amazon_affected_package.py b/vulncheck_sdk/models/advisory_amazon_affected_package.py index a55a53b5..3ab1a127 100644 --- a/vulncheck_sdk/models/advisory_amazon_affected_package.py +++ b/vulncheck_sdk/models/advisory_amazon_affected_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAmazonAffectedPackage(BaseModel): """ - AdvisoryAmazonAffectedPackage + advisory.AmazonAffectedPackage """ # noqa: E501 advisory: Optional[StrictStr] = None package: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_amazon_cve.py b/vulncheck_sdk/models/advisory_amazon_cve.py index a06f9058..7e359b52 100644 --- a/vulncheck_sdk/models/advisory_amazon_cve.py +++ b/vulncheck_sdk/models/advisory_amazon_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAmazonCVE(BaseModel): """ - AdvisoryAmazonCVE + advisory.AmazonCVE """ # noqa: E501 affected: Optional[List[AdvisoryAmazonAffectedPackage]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_amd.py b/vulncheck_sdk/models/advisory_amd.py index e1532238..ca4a7a48 100644 --- a/vulncheck_sdk/models/advisory_amd.py +++ b/vulncheck_sdk/models/advisory_amd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAMD(BaseModel): """ - AdvisoryAMD + advisory.AMD """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ami.py b/vulncheck_sdk/models/advisory_ami.py index 49822b44..4ed743fb 100644 --- a/vulncheck_sdk/models/advisory_ami.py +++ b/vulncheck_sdk/models/advisory_ami.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAMI(BaseModel): """ - AdvisoryAMI + advisory.AMI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_anchore_nvd_override.py b/vulncheck_sdk/models/advisory_anchore_nvd_override.py index 3a50a2f9..34532eed 100644 --- a/vulncheck_sdk/models/advisory_anchore_nvd_override.py +++ b/vulncheck_sdk/models/advisory_anchore_nvd_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAnchoreNVDOverride(BaseModel): """ - AdvisoryAnchoreNVDOverride + advisory.AnchoreNVDOverride """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_android_advisory.py b/vulncheck_sdk/models/advisory_android_advisory.py index 7f996cb9..48fb113f 100644 --- a/vulncheck_sdk/models/advisory_android_advisory.py +++ b/vulncheck_sdk/models/advisory_android_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryAndroidAdvisory(BaseModel): """ - AdvisoryAndroidAdvisory + advisory.AndroidAdvisory """ # noqa: E501 affected: Optional[List[AdvisoryAndroidAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_android_affected.py b/vulncheck_sdk/models/advisory_android_affected.py index 80121d77..1bde41f7 100644 --- a/vulncheck_sdk/models/advisory_android_affected.py +++ b/vulncheck_sdk/models/advisory_android_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryAndroidAffected(BaseModel): """ - AdvisoryAndroidAffected + advisory.AndroidAffected """ # noqa: E501 ecosystem_specific: Optional[AdvisoryEcoSystem] = None package: Optional[AdvisoryAndroidPackage] = None diff --git a/vulncheck_sdk/models/advisory_android_event.py b/vulncheck_sdk/models/advisory_android_event.py index 2cdfffd2..476c2687 100644 --- a/vulncheck_sdk/models/advisory_android_event.py +++ b/vulncheck_sdk/models/advisory_android_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidEvent(BaseModel): """ - AdvisoryAndroidEvent + advisory.AndroidEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_android_package.py b/vulncheck_sdk/models/advisory_android_package.py index 72857337..e7fe6282 100644 --- a/vulncheck_sdk/models/advisory_android_package.py +++ b/vulncheck_sdk/models/advisory_android_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidPackage(BaseModel): """ - AdvisoryAndroidPackage + advisory.AndroidPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_android_range.py b/vulncheck_sdk/models/advisory_android_range.py index 14c0486f..7de48011 100644 --- a/vulncheck_sdk/models/advisory_android_range.py +++ b/vulncheck_sdk/models/advisory_android_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAndroidRange(BaseModel): """ - AdvisoryAndroidRange + advisory.AndroidRange """ # noqa: E501 events: Optional[List[AdvisoryAndroidEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_android_reference.py b/vulncheck_sdk/models/advisory_android_reference.py index 016c3a80..3450fd03 100644 --- a/vulncheck_sdk/models/advisory_android_reference.py +++ b/vulncheck_sdk/models/advisory_android_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAndroidReference(BaseModel): """ - AdvisoryAndroidReference + advisory.AndroidReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_active_mq.py b/vulncheck_sdk/models/advisory_apache_active_mq.py index 6eadcee2..d8467ff6 100644 --- a/vulncheck_sdk/models/advisory_apache_active_mq.py +++ b/vulncheck_sdk/models/advisory_apache_active_mq.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheActiveMQ(BaseModel): """ - AdvisoryApacheActiveMQ + advisory.ApacheActiveMQ """ # noqa: E501 affected_versions: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_archiva.py b/vulncheck_sdk/models/advisory_apache_archiva.py index d4873d05..fdb8ac3c 100644 --- a/vulncheck_sdk/models/advisory_apache_archiva.py +++ b/vulncheck_sdk/models/advisory_apache_archiva.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheArchiva(BaseModel): """ - AdvisoryApacheArchiva + advisory.ApacheArchiva """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_arrow.py b/vulncheck_sdk/models/advisory_apache_arrow.py index fde1e1ca..a2480230 100644 --- a/vulncheck_sdk/models/advisory_apache_arrow.py +++ b/vulncheck_sdk/models/advisory_apache_arrow.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheArrow(BaseModel): """ - AdvisoryApacheArrow + advisory.ApacheArrow """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_camel.py b/vulncheck_sdk/models/advisory_apache_camel.py index f8be582a..f02066d6 100644 --- a/vulncheck_sdk/models/advisory_apache_camel.py +++ b/vulncheck_sdk/models/advisory_apache_camel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCamel(BaseModel): """ - AdvisoryApacheCamel + advisory.ApacheCamel """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_commons.py b/vulncheck_sdk/models/advisory_apache_commons.py index cfa6c369..464eb867 100644 --- a/vulncheck_sdk/models/advisory_apache_commons.py +++ b/vulncheck_sdk/models/advisory_apache_commons.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCommons(BaseModel): """ - AdvisoryApacheCommons + advisory.ApacheCommons """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_couch_db.py b/vulncheck_sdk/models/advisory_apache_couch_db.py index ed53aef7..ecfb907a 100644 --- a/vulncheck_sdk/models/advisory_apache_couch_db.py +++ b/vulncheck_sdk/models/advisory_apache_couch_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheCouchDB(BaseModel): """ - AdvisoryApacheCouchDB + advisory.ApacheCouchDB """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_flink.py b/vulncheck_sdk/models/advisory_apache_flink.py index acee4d94..d2727d2f 100644 --- a/vulncheck_sdk/models/advisory_apache_flink.py +++ b/vulncheck_sdk/models/advisory_apache_flink.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheFlink(BaseModel): """ - AdvisoryApacheFlink + advisory.ApacheFlink """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_guacamole.py b/vulncheck_sdk/models/advisory_apache_guacamole.py index d63381c4..11da440d 100644 --- a/vulncheck_sdk/models/advisory_apache_guacamole.py +++ b/vulncheck_sdk/models/advisory_apache_guacamole.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheGuacamole(BaseModel): """ - AdvisoryApacheGuacamole + advisory.ApacheGuacamole """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_hadoop.py b/vulncheck_sdk/models/advisory_apache_hadoop.py index fe0d31e0..4765133b 100644 --- a/vulncheck_sdk/models/advisory_apache_hadoop.py +++ b/vulncheck_sdk/models/advisory_apache_hadoop.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheHadoop(BaseModel): """ - AdvisoryApacheHadoop + advisory.ApacheHadoop """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_http.py b/vulncheck_sdk/models/advisory_apache_http.py index ea667147..2d991ab2 100644 --- a/vulncheck_sdk/models/advisory_apache_http.py +++ b/vulncheck_sdk/models/advisory_apache_http.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheHTTP(BaseModel): """ - AdvisoryApacheHTTP + advisory.ApacheHTTP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_jsp_wiki.py b/vulncheck_sdk/models/advisory_apache_jsp_wiki.py index b68c6d34..b236b9fc 100644 --- a/vulncheck_sdk/models/advisory_apache_jsp_wiki.py +++ b/vulncheck_sdk/models/advisory_apache_jsp_wiki.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheJSPWiki(BaseModel): """ - AdvisoryApacheJSPWiki + advisory.ApacheJSPWiki """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_kafka.py b/vulncheck_sdk/models/advisory_apache_kafka.py index b21b831c..1829f3c4 100644 --- a/vulncheck_sdk/models/advisory_apache_kafka.py +++ b/vulncheck_sdk/models/advisory_apache_kafka.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheKafka(BaseModel): """ - AdvisoryApacheKafka + advisory.ApacheKafka """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_logging_services.py b/vulncheck_sdk/models/advisory_apache_logging_services.py index b8aff054..29d14e01 100644 --- a/vulncheck_sdk/models/advisory_apache_logging_services.py +++ b/vulncheck_sdk/models/advisory_apache_logging_services.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheLoggingServices(BaseModel): """ - AdvisoryApacheLoggingServices + advisory.ApacheLoggingServices """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_ni_fi.py b/vulncheck_sdk/models/advisory_apache_ni_fi.py index 42e3d886..06bd0388 100644 --- a/vulncheck_sdk/models/advisory_apache_ni_fi.py +++ b/vulncheck_sdk/models/advisory_apache_ni_fi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheNiFi(BaseModel): """ - AdvisoryApacheNiFi + advisory.ApacheNiFi """ # noqa: E501 affected_version: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_of_biz.py b/vulncheck_sdk/models/advisory_apache_of_biz.py index e66a63fe..0e555ed2 100644 --- a/vulncheck_sdk/models/advisory_apache_of_biz.py +++ b/vulncheck_sdk/models/advisory_apache_of_biz.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOFBiz(BaseModel): """ - AdvisoryApacheOFBiz + advisory.ApacheOFBiz """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_open_meetings.py b/vulncheck_sdk/models/advisory_apache_open_meetings.py index 639b6306..37f61a9b 100644 --- a/vulncheck_sdk/models/advisory_apache_open_meetings.py +++ b/vulncheck_sdk/models/advisory_apache_open_meetings.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOpenMeetings(BaseModel): """ - AdvisoryApacheOpenMeetings + advisory.ApacheOpenMeetings """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_open_office.py b/vulncheck_sdk/models/advisory_apache_open_office.py index a9fd38de..59ca6838 100644 --- a/vulncheck_sdk/models/advisory_apache_open_office.py +++ b/vulncheck_sdk/models/advisory_apache_open_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheOpenOffice(BaseModel): """ - AdvisoryApacheOpenOffice + advisory.ApacheOpenOffice """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_pulsar.py b/vulncheck_sdk/models/advisory_apache_pulsar.py index 7dcd8ab3..3d6c4ef8 100644 --- a/vulncheck_sdk/models/advisory_apache_pulsar.py +++ b/vulncheck_sdk/models/advisory_apache_pulsar.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApachePulsar(BaseModel): """ - AdvisoryApachePulsar + advisory.ApachePulsar """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_shiro.py b/vulncheck_sdk/models/advisory_apache_shiro.py index 67c7d987..87c9c995 100644 --- a/vulncheck_sdk/models/advisory_apache_shiro.py +++ b/vulncheck_sdk/models/advisory_apache_shiro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheShiro(BaseModel): """ - AdvisoryApacheShiro + advisory.ApacheShiro """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_spark.py b/vulncheck_sdk/models/advisory_apache_spark.py index 5d08a563..ceabc464 100644 --- a/vulncheck_sdk/models/advisory_apache_spark.py +++ b/vulncheck_sdk/models/advisory_apache_spark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSpark(BaseModel): """ - AdvisoryApacheSpark + advisory.ApacheSpark """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_struts.py b/vulncheck_sdk/models/advisory_apache_struts.py index 574e4c3d..377404a2 100644 --- a/vulncheck_sdk/models/advisory_apache_struts.py +++ b/vulncheck_sdk/models/advisory_apache_struts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheStruts(BaseModel): """ - AdvisoryApacheStruts + advisory.ApacheStruts """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_subversion.py b/vulncheck_sdk/models/advisory_apache_subversion.py index 160742d5..c5d20474 100644 --- a/vulncheck_sdk/models/advisory_apache_subversion.py +++ b/vulncheck_sdk/models/advisory_apache_subversion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSubversion(BaseModel): """ - AdvisoryApacheSubversion + advisory.ApacheSubversion """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_superset.py b/vulncheck_sdk/models/advisory_apache_superset.py index 7f569245..2a96619d 100644 --- a/vulncheck_sdk/models/advisory_apache_superset.py +++ b/vulncheck_sdk/models/advisory_apache_superset.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheSuperset(BaseModel): """ - AdvisoryApacheSuperset + advisory.ApacheSuperset """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apache_tomcat.py b/vulncheck_sdk/models/advisory_apache_tomcat.py index c9ecef22..a7377294 100644 --- a/vulncheck_sdk/models/advisory_apache_tomcat.py +++ b/vulncheck_sdk/models/advisory_apache_tomcat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheTomcat(BaseModel): """ - AdvisoryApacheTomcat + advisory.ApacheTomcat """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apache_zoo_keeper.py b/vulncheck_sdk/models/advisory_apache_zoo_keeper.py index 153f343f..2e85a14a 100644 --- a/vulncheck_sdk/models/advisory_apache_zoo_keeper.py +++ b/vulncheck_sdk/models/advisory_apache_zoo_keeper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryApacheZooKeeper(BaseModel): """ - AdvisoryApacheZooKeeper + advisory.ApacheZooKeeper """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_app_check.py b/vulncheck_sdk/models/advisory_app_check.py index 23de000c..2d2f0113 100644 --- a/vulncheck_sdk/models/advisory_app_check.py +++ b/vulncheck_sdk/models/advisory_app_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppCheck(BaseModel): """ - AdvisoryAppCheck + advisory.AppCheck """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_appgate.py b/vulncheck_sdk/models/advisory_appgate.py index bc505b60..943fe86a 100644 --- a/vulncheck_sdk/models/advisory_appgate.py +++ b/vulncheck_sdk/models/advisory_appgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppgate(BaseModel): """ - AdvisoryAppgate + advisory.Appgate """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_apple_advisory.py b/vulncheck_sdk/models/advisory_apple_advisory.py index bb480bdf..e45835e3 100644 --- a/vulncheck_sdk/models/advisory_apple_advisory.py +++ b/vulncheck_sdk/models/advisory_apple_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAppleAdvisory(BaseModel): """ - AdvisoryAppleAdvisory + advisory.AppleAdvisory """ # noqa: E501 components: Optional[List[AdvisoryAppleComponent]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_apple_component.py b/vulncheck_sdk/models/advisory_apple_component.py index 00778454..68a4e54c 100644 --- a/vulncheck_sdk/models/advisory_apple_component.py +++ b/vulncheck_sdk/models/advisory_apple_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAppleComponent(BaseModel): """ - AdvisoryAppleComponent + advisory.AppleComponent """ # noqa: E501 available_for: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_arch_issue.py b/vulncheck_sdk/models/advisory_arch_issue.py index 174ea13d..6f4a16f6 100644 --- a/vulncheck_sdk/models/advisory_arch_issue.py +++ b/vulncheck_sdk/models/advisory_arch_issue.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryArchIssue(BaseModel): """ - AdvisoryArchIssue + advisory.ArchIssue """ # noqa: E501 advisories: Optional[List[StrictStr]] = None affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_arista.py b/vulncheck_sdk/models/advisory_arista.py index df8387fd..585af9aa 100644 --- a/vulncheck_sdk/models/advisory_arista.py +++ b/vulncheck_sdk/models/advisory_arista.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryArista(BaseModel): """ - AdvisoryArista + advisory.Arista """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_aruba.py b/vulncheck_sdk/models/advisory_aruba.py index dca681c9..536d3709 100644 --- a/vulncheck_sdk/models/advisory_aruba.py +++ b/vulncheck_sdk/models/advisory_aruba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAruba(BaseModel): """ - AdvisoryAruba + advisory.Aruba """ # noqa: E501 csaf: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_asrg.py b/vulncheck_sdk/models/advisory_asrg.py index bc10a30b..6274360e 100644 --- a/vulncheck_sdk/models/advisory_asrg.py +++ b/vulncheck_sdk/models/advisory_asrg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryASRG(BaseModel): """ - AdvisoryASRG + advisory.ASRG """ # noqa: E501 affected_products: Optional[StrictStr] = None capec: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_asset_note.py b/vulncheck_sdk/models/advisory_asset_note.py index 27474888..56c8b5c8 100644 --- a/vulncheck_sdk/models/advisory_asset_note.py +++ b/vulncheck_sdk/models/advisory_asset_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAssetNote(BaseModel): """ - AdvisoryAssetNote + advisory.AssetNote """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_asterisk.py b/vulncheck_sdk/models/advisory_asterisk.py index 44ffcafe..66676874 100644 --- a/vulncheck_sdk/models/advisory_asterisk.py +++ b/vulncheck_sdk/models/advisory_asterisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAsterisk(BaseModel): """ - AdvisoryAsterisk + advisory.Asterisk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_astra.py b/vulncheck_sdk/models/advisory_astra.py index 9ffcf006..c09dae7a 100644 --- a/vulncheck_sdk/models/advisory_astra.py +++ b/vulncheck_sdk/models/advisory_astra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAstra(BaseModel): """ - AdvisoryAstra + advisory.Astra """ # noqa: E501 bdu: Optional[List[StrictStr]] = None bulletin_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_asus.py b/vulncheck_sdk/models/advisory_asus.py index 8b68ea0d..8e39a784 100644 --- a/vulncheck_sdk/models/advisory_asus.py +++ b/vulncheck_sdk/models/advisory_asus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAsus(BaseModel): """ - AdvisoryAsus + advisory.Asus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_atlassian_advisory.py b/vulncheck_sdk/models/advisory_atlassian_advisory.py index 9023db54..a0b639ee 100644 --- a/vulncheck_sdk/models/advisory_atlassian_advisory.py +++ b/vulncheck_sdk/models/advisory_atlassian_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtlassianAdvisory(BaseModel): """ - AdvisoryAtlassianAdvisory + advisory.AtlassianAdvisory """ # noqa: E501 affected_version: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_atlassian_products.py b/vulncheck_sdk/models/advisory_atlassian_products.py index 38a3a856..b04c0c12 100644 --- a/vulncheck_sdk/models/advisory_atlassian_products.py +++ b/vulncheck_sdk/models/advisory_atlassian_products.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtlassianProducts(BaseModel): """ - AdvisoryAtlassianProducts + advisory.AtlassianProducts """ # noqa: E501 affected: Optional[List[StrictStr]] = None fixed: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_atlassian_vuln.py b/vulncheck_sdk/models/advisory_atlassian_vuln.py index e7904340..38c3891d 100644 --- a/vulncheck_sdk/models/advisory_atlassian_vuln.py +++ b/vulncheck_sdk/models/advisory_atlassian_vuln.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryAtlassianVuln(BaseModel): """ - AdvisoryAtlassianVuln + advisory.AtlassianVuln """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_atredis.py b/vulncheck_sdk/models/advisory_atredis.py index 90661c6e..65a2c366 100644 --- a/vulncheck_sdk/models/advisory_atredis.py +++ b/vulncheck_sdk/models/advisory_atredis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAtredis(BaseModel): """ - AdvisoryAtredis + advisory.Atredis """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_audiocodes.py b/vulncheck_sdk/models/advisory_audiocodes.py index 69591d4e..6adbabf4 100644 --- a/vulncheck_sdk/models/advisory_audiocodes.py +++ b/vulncheck_sdk/models/advisory_audiocodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAudiocodes(BaseModel): """ - AdvisoryAudiocodes + advisory.Audiocodes """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_aus_cert.py b/vulncheck_sdk/models/advisory_aus_cert.py index 23c68123..c1e37453 100644 --- a/vulncheck_sdk/models/advisory_aus_cert.py +++ b/vulncheck_sdk/models/advisory_aus_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAusCert(BaseModel): """ - AdvisoryAusCert + advisory.AusCert """ # noqa: E501 body: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = Field(default=None, alias="bulletinId") diff --git a/vulncheck_sdk/models/advisory_autodesk.py b/vulncheck_sdk/models/advisory_autodesk.py index 40b2d8b2..96d2c2ec 100644 --- a/vulncheck_sdk/models/advisory_autodesk.py +++ b/vulncheck_sdk/models/advisory_autodesk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAutodesk(BaseModel): """ - AdvisoryAutodesk + advisory.Autodesk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_avaya.py b/vulncheck_sdk/models/advisory_avaya.py index ba642708..fd74b5bc 100644 --- a/vulncheck_sdk/models/advisory_avaya.py +++ b/vulncheck_sdk/models/advisory_avaya.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAvaya(BaseModel): """ - AdvisoryAvaya + advisory.Avaya """ # noqa: E501 advisory_number: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_aveva_advisory.py b/vulncheck_sdk/models/advisory_aveva_advisory.py index aa85f3d0..78502960 100644 --- a/vulncheck_sdk/models/advisory_aveva_advisory.py +++ b/vulncheck_sdk/models/advisory_aveva_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAVEVAAdvisory(BaseModel): """ - AdvisoryAVEVAAdvisory + advisory.AVEVAAdvisory """ # noqa: E501 aveva_vulnerability_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_avidml_advs.py b/vulncheck_sdk/models/advisory_avidml_advs.py index 2611f652..71db98ba 100644 --- a/vulncheck_sdk/models/advisory_avidml_advs.py +++ b/vulncheck_sdk/models/advisory_avidml_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAVIDMLAdvs(BaseModel): """ - AdvisoryAVIDMLAdvs + advisory.AVIDMLAdvs """ # noqa: E501 date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_avigilon.py b/vulncheck_sdk/models/advisory_avigilon.py index 34a87476..54a0103a 100644 --- a/vulncheck_sdk/models/advisory_avigilon.py +++ b/vulncheck_sdk/models/advisory_avigilon.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAvigilon(BaseModel): """ - AdvisoryAvigilon + advisory.Avigilon """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_award.py b/vulncheck_sdk/models/advisory_award.py index 0cf81a39..39544258 100644 --- a/vulncheck_sdk/models/advisory_award.py +++ b/vulncheck_sdk/models/advisory_award.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAward(BaseModel): """ - AdvisoryAward + advisory.Award """ # noqa: E501 amount: Optional[StrictStr] = None currency: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_aws.py b/vulncheck_sdk/models/advisory_aws.py index 1f63c5cf..6c76d6cc 100644 --- a/vulncheck_sdk/models/advisory_aws.py +++ b/vulncheck_sdk/models/advisory_aws.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAWS(BaseModel): """ - AdvisoryAWS + advisory.AWS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_axis.py b/vulncheck_sdk/models/advisory_axis.py index d77d9179..88fecde6 100644 --- a/vulncheck_sdk/models/advisory_axis.py +++ b/vulncheck_sdk/models/advisory_axis.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryAxis(BaseModel): """ - AdvisoryAxis + advisory.Axis """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_azul.py b/vulncheck_sdk/models/advisory_azul.py index 974ec084..ef9584d1 100644 --- a/vulncheck_sdk/models/advisory_azul.py +++ b/vulncheck_sdk/models/advisory_azul.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryAzul(BaseModel): """ - AdvisoryAzul + advisory.Azul """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_b_braun_advisory.py b/vulncheck_sdk/models/advisory_b_braun_advisory.py index 7e4eb554..ca78dedf 100644 --- a/vulncheck_sdk/models/advisory_b_braun_advisory.py +++ b/vulncheck_sdk/models/advisory_b_braun_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBBraunAdvisory(BaseModel): """ - AdvisoryBBraunAdvisory + advisory.BBraunAdvisory """ # noqa: E501 attention: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_bandr.py b/vulncheck_sdk/models/advisory_bandr.py index 40366e97..120c5f9e 100644 --- a/vulncheck_sdk/models/advisory_bandr.py +++ b/vulncheck_sdk/models/advisory_bandr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBandr(BaseModel): """ - AdvisoryBandr + advisory.Bandr """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_baxter_advisory.py b/vulncheck_sdk/models/advisory_baxter_advisory.py index 46e845e5..13cac173 100644 --- a/vulncheck_sdk/models/advisory_baxter_advisory.py +++ b/vulncheck_sdk/models/advisory_baxter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBaxterAdvisory(BaseModel): """ - AdvisoryBaxterAdvisory + advisory.BaxterAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bdu_advisory.py b/vulncheck_sdk/models/advisory_bdu_advisory.py index 29f43354..62f18437 100644 --- a/vulncheck_sdk/models/advisory_bdu_advisory.py +++ b/vulncheck_sdk/models/advisory_bdu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryBDUAdvisory(BaseModel): """ - AdvisoryBDUAdvisory + advisory.BDUAdvisory """ # noqa: E501 bdu_id: Optional[StrictStr] = Field(default=None, description="BDU:2022-03833") cve: Optional[List[StrictStr]] = Field(default=None, description="[]string{\"CVE-2022-28194\"}") diff --git a/vulncheck_sdk/models/advisory_bdu_cvss.py b/vulncheck_sdk/models/advisory_bdu_cvss.py index 5c530cb3..625c90ac 100644 --- a/vulncheck_sdk/models/advisory_bdu_cvss.py +++ b/vulncheck_sdk/models/advisory_bdu_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUCvss(BaseModel): """ - AdvisoryBDUCvss + advisory.BDUCvss """ # noqa: E501 vector: Optional[AdvisoryBDUVector] = None __properties: ClassVar[List[str]] = ["vector"] diff --git a/vulncheck_sdk/models/advisory_bdu_cvss3.py b/vulncheck_sdk/models/advisory_bdu_cvss3.py index 90b5d245..dd671e19 100644 --- a/vulncheck_sdk/models/advisory_bdu_cvss3.py +++ b/vulncheck_sdk/models/advisory_bdu_cvss3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUCvss3(BaseModel): """ - AdvisoryBDUCvss3 + advisory.BDUCvss3 """ # noqa: E501 vector: Optional[AdvisoryBDUVector] = None __properties: ClassVar[List[str]] = ["vector"] diff --git a/vulncheck_sdk/models/advisory_bdu_environment.py b/vulncheck_sdk/models/advisory_bdu_environment.py index f04162b6..3887f571 100644 --- a/vulncheck_sdk/models/advisory_bdu_environment.py +++ b/vulncheck_sdk/models/advisory_bdu_environment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUEnvironment(BaseModel): """ - AdvisoryBDUEnvironment + advisory.BDUEnvironment """ # noqa: E501 os: Optional[AdvisoryBDUOs] = None __properties: ClassVar[List[str]] = ["os"] diff --git a/vulncheck_sdk/models/advisory_bdu_soft.py b/vulncheck_sdk/models/advisory_bdu_soft.py index 9ca0d302..b7ed2638 100644 --- a/vulncheck_sdk/models/advisory_bdu_soft.py +++ b/vulncheck_sdk/models/advisory_bdu_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUSoft(BaseModel): """ - AdvisoryBDUSoft + advisory.BDUSoft """ # noqa: E501 name: Optional[StrictStr] = None platform: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bdu_types.py b/vulncheck_sdk/models/advisory_bdu_types.py index 31a4549e..3537298b 100644 --- a/vulncheck_sdk/models/advisory_bdu_types.py +++ b/vulncheck_sdk/models/advisory_bdu_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUTypes(BaseModel): """ - AdvisoryBDUTypes + advisory.BDUTypes """ # noqa: E501 text: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bdu_vector.py b/vulncheck_sdk/models/advisory_bdu_vector.py index e34a1f5c..22b62be9 100644 --- a/vulncheck_sdk/models/advisory_bdu_vector.py +++ b/vulncheck_sdk/models/advisory_bdu_vector.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUVector(BaseModel): """ - AdvisoryBDUVector + advisory.BDUVector """ # noqa: E501 score: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bdu_vulnerable_software.py b/vulncheck_sdk/models/advisory_bdu_vulnerable_software.py index 3fae49a1..de483d0b 100644 --- a/vulncheck_sdk/models/advisory_bdu_vulnerable_software.py +++ b/vulncheck_sdk/models/advisory_bdu_vulnerable_software.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBDUVulnerableSoftware(BaseModel): """ - AdvisoryBDUVulnerableSoftware + advisory.BDUVulnerableSoftware """ # noqa: E501 soft: Optional[AdvisoryBDUSoft] = None __properties: ClassVar[List[str]] = ["soft"] diff --git a/vulncheck_sdk/models/advisory_bduos.py b/vulncheck_sdk/models/advisory_bduos.py index 8b00db71..ff959105 100644 --- a/vulncheck_sdk/models/advisory_bduos.py +++ b/vulncheck_sdk/models/advisory_bduos.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBDUOs(BaseModel): """ - AdvisoryBDUOs + advisory.BDUOs """ # noqa: E501 name: Optional[StrictStr] = None platform: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_beckhoff_advisory.py b/vulncheck_sdk/models/advisory_beckhoff_advisory.py index 0f983e29..a245f257 100644 --- a/vulncheck_sdk/models/advisory_beckhoff_advisory.py +++ b/vulncheck_sdk/models/advisory_beckhoff_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeckhoffAdvisory(BaseModel): """ - AdvisoryBeckhoffAdvisory + advisory.BeckhoffAdvisory """ # noqa: E501 beckhoff_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_beckman_coulter.py b/vulncheck_sdk/models/advisory_beckman_coulter.py index a3691841..8ca864e7 100644 --- a/vulncheck_sdk/models/advisory_beckman_coulter.py +++ b/vulncheck_sdk/models/advisory_beckman_coulter.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeckmanCoulter(BaseModel): """ - AdvisoryBeckmanCoulter + advisory.BeckmanCoulter """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_becton_dickinson_advisory.py b/vulncheck_sdk/models/advisory_becton_dickinson_advisory.py index 9266e78f..99ab17ca 100644 --- a/vulncheck_sdk/models/advisory_becton_dickinson_advisory.py +++ b/vulncheck_sdk/models/advisory_becton_dickinson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryBectonDickinsonAdvisory(BaseModel): """ - AdvisoryBectonDickinsonAdvisory + advisory.BectonDickinsonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_belden_advisory.py b/vulncheck_sdk/models/advisory_belden_advisory.py index cbe6e158..307fbb13 100644 --- a/vulncheck_sdk/models/advisory_belden_advisory.py +++ b/vulncheck_sdk/models/advisory_belden_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeldenAdvisory(BaseModel): """ - AdvisoryBeldenAdvisory + advisory.BeldenAdvisory """ # noqa: E501 belden_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_beyond_trust.py b/vulncheck_sdk/models/advisory_beyond_trust.py index 776d43e0..97db421c 100644 --- a/vulncheck_sdk/models/advisory_beyond_trust.py +++ b/vulncheck_sdk/models/advisory_beyond_trust.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBeyondTrust(BaseModel): """ - AdvisoryBeyondTrust + advisory.BeyondTrust """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_binarly.py b/vulncheck_sdk/models/advisory_binarly.py index 301494d6..582b8e2a 100644 --- a/vulncheck_sdk/models/advisory_binarly.py +++ b/vulncheck_sdk/models/advisory_binarly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBinarly(BaseModel): """ - AdvisoryBinarly + advisory.Binarly """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bit_defender.py b/vulncheck_sdk/models/advisory_bit_defender.py index ec83c619..da067140 100644 --- a/vulncheck_sdk/models/advisory_bit_defender.py +++ b/vulncheck_sdk/models/advisory_bit_defender.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBitDefender(BaseModel): """ - AdvisoryBitDefender + advisory.BitDefender """ # noqa: E501 additional_details: Optional[StrictStr] = None affected_products: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_black_berry.py b/vulncheck_sdk/models/advisory_black_berry.py index 5072bfc3..df96e1e6 100644 --- a/vulncheck_sdk/models/advisory_black_berry.py +++ b/vulncheck_sdk/models/advisory_black_berry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBlackBerry(BaseModel): """ - AdvisoryBlackBerry + advisory.BlackBerry """ # noqa: E501 bsrt: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_bls.py b/vulncheck_sdk/models/advisory_bls.py index 4821c1c0..de48fcd7 100644 --- a/vulncheck_sdk/models/advisory_bls.py +++ b/vulncheck_sdk/models/advisory_bls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBLS(BaseModel): """ - AdvisoryBLS + advisory.BLS """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_bosch_advisory.py b/vulncheck_sdk/models/advisory_bosch_advisory.py index c6026707..24b94a19 100644 --- a/vulncheck_sdk/models/advisory_bosch_advisory.py +++ b/vulncheck_sdk/models/advisory_bosch_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBoschAdvisory(BaseModel): """ - AdvisoryBoschAdvisory + advisory.BoschAdvisory """ # noqa: E501 bosch_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_boston_scientific_advisory.py b/vulncheck_sdk/models/advisory_boston_scientific_advisory.py index 35dd8bf4..47a165a1 100644 --- a/vulncheck_sdk/models/advisory_boston_scientific_advisory.py +++ b/vulncheck_sdk/models/advisory_boston_scientific_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBostonScientificAdvisory(BaseModel): """ - AdvisoryBostonScientificAdvisory + advisory.BostonScientificAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_botnet.py b/vulncheck_sdk/models/advisory_botnet.py index 5b06e1cd..592c9381 100644 --- a/vulncheck_sdk/models/advisory_botnet.py +++ b/vulncheck_sdk/models/advisory_botnet.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryBotnet(BaseModel): """ - AdvisoryBotnet + advisory.Botnet """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/models/advisory_bugzilla.py b/vulncheck_sdk/models/advisory_bugzilla.py index 76a65b59..9626852e 100644 --- a/vulncheck_sdk/models/advisory_bugzilla.py +++ b/vulncheck_sdk/models/advisory_bugzilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryBugzilla(BaseModel): """ - AdvisoryBugzilla + advisory.Bugzilla """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ca_cyber_centre_advisory.py b/vulncheck_sdk/models/advisory_ca_cyber_centre_advisory.py index e4e83182..b154bffe 100644 --- a/vulncheck_sdk/models/advisory_ca_cyber_centre_advisory.py +++ b/vulncheck_sdk/models/advisory_ca_cyber_centre_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCACyberCentreAdvisory(BaseModel): """ - AdvisoryCACyberCentreAdvisory + advisory.CACyberCentreAdvisory """ # noqa: E501 control_systems: Optional[StrictBool] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_canvas_exploit.py b/vulncheck_sdk/models/advisory_canvas_exploit.py index 759c3daa..c1f7726c 100644 --- a/vulncheck_sdk/models/advisory_canvas_exploit.py +++ b/vulncheck_sdk/models/advisory_canvas_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCanvasExploit(BaseModel): """ - AdvisoryCanvasExploit + advisory.CanvasExploit """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_capec.py b/vulncheck_sdk/models/advisory_capec.py index 0aa04bfe..d4f9a2d6 100644 --- a/vulncheck_sdk/models/advisory_capec.py +++ b/vulncheck_sdk/models/advisory_capec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCapec(BaseModel): """ - AdvisoryCapec + advisory.Capec """ # noqa: E501 capec_id: Optional[StrictStr] = None capec_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_carestream_advisory.py b/vulncheck_sdk/models/advisory_carestream_advisory.py index e105a0a7..21b56873 100644 --- a/vulncheck_sdk/models/advisory_carestream_advisory.py +++ b/vulncheck_sdk/models/advisory_carestream_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCarestreamAdvisory(BaseModel): """ - AdvisoryCarestreamAdvisory + advisory.CarestreamAdvisory """ # noqa: E501 carestream_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_carrier.py b/vulncheck_sdk/models/advisory_carrier.py index 7002b46f..1a5a1c1b 100644 --- a/vulncheck_sdk/models/advisory_carrier.py +++ b/vulncheck_sdk/models/advisory_carrier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCarrier(BaseModel): """ - AdvisoryCarrier + advisory.Carrier """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cbl_mariner.py b/vulncheck_sdk/models/advisory_cbl_mariner.py index 01bad464..1c8c9fac 100644 --- a/vulncheck_sdk/models/advisory_cbl_mariner.py +++ b/vulncheck_sdk/models/advisory_cbl_mariner.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCBLMariner(BaseModel): """ - AdvisoryCBLMariner + advisory.CBLMariner """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_centos_package.py b/vulncheck_sdk/models/advisory_centos_package.py index 40c5907b..0a2c5f42 100644 --- a/vulncheck_sdk/models/advisory_centos_package.py +++ b/vulncheck_sdk/models/advisory_centos_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCentosPackage(BaseModel): """ - AdvisoryCentosPackage + advisory.CentosPackage """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cert_be.py b/vulncheck_sdk/models/advisory_cert_be.py index 70197d20..ec41bfb4 100644 --- a/vulncheck_sdk/models/advisory_cert_be.py +++ b/vulncheck_sdk/models/advisory_cert_be.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertBE(BaseModel): """ - AdvisoryCertBE + advisory.CertBE """ # noqa: E501 affected_software: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cert_fr_advisory.py b/vulncheck_sdk/models/advisory_cert_fr_advisory.py index 6ec16da0..7b643b2a 100644 --- a/vulncheck_sdk/models/advisory_cert_fr_advisory.py +++ b/vulncheck_sdk/models/advisory_cert_fr_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertFRAdvisory(BaseModel): """ - AdvisoryCertFRAdvisory + advisory.CertFRAdvisory """ # noqa: E501 affected_systems_fr: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cert_in.py b/vulncheck_sdk/models/advisory_cert_in.py index 8e7aeab1..c74d160d 100644 --- a/vulncheck_sdk/models/advisory_cert_in.py +++ b/vulncheck_sdk/models/advisory_cert_in.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertIN(BaseModel): """ - AdvisoryCertIN + advisory.CertIN """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cert_ir_security_alert.py b/vulncheck_sdk/models/advisory_cert_ir_security_alert.py index efee2acc..3d15bb6b 100644 --- a/vulncheck_sdk/models/advisory_cert_ir_security_alert.py +++ b/vulncheck_sdk/models/advisory_cert_ir_security_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertIRSecurityAlert(BaseModel): """ - AdvisoryCertIRSecurityAlert + advisory.CertIRSecurityAlert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cert_se.py b/vulncheck_sdk/models/advisory_cert_se.py index 64f463d0..2d9c79d5 100644 --- a/vulncheck_sdk/models/advisory_cert_se.py +++ b/vulncheck_sdk/models/advisory_cert_se.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertSE(BaseModel): """ - AdvisoryCertSE + advisory.CertSE """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cert_ua.py b/vulncheck_sdk/models/advisory_cert_ua.py index 5df559ac..8f3ae9c2 100644 --- a/vulncheck_sdk/models/advisory_cert_ua.py +++ b/vulncheck_sdk/models/advisory_cert_ua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCertUA(BaseModel): """ - AdvisoryCertUA + advisory.CertUA """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_certeu_advisory.py b/vulncheck_sdk/models/advisory_certeu_advisory.py index 6420dec1..0ee16c30 100644 --- a/vulncheck_sdk/models/advisory_certeu_advisory.py +++ b/vulncheck_sdk/models/advisory_certeu_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCERTEUAdvisory(BaseModel): """ - AdvisoryCERTEUAdvisory + advisory.CERTEUAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="advisoryId") affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") diff --git a/vulncheck_sdk/models/advisory_cesa.py b/vulncheck_sdk/models/advisory_cesa.py index 9fc419e1..05b8fc95 100644 --- a/vulncheck_sdk/models/advisory_cesa.py +++ b/vulncheck_sdk/models/advisory_cesa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCESA(BaseModel): """ - AdvisoryCESA + advisory.CESA """ # noqa: E501 arch: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_chain_guard.py b/vulncheck_sdk/models/advisory_chain_guard.py index 938584a0..d3264920 100644 --- a/vulncheck_sdk/models/advisory_chain_guard.py +++ b/vulncheck_sdk/models/advisory_chain_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChainGuard(BaseModel): """ - AdvisoryChainGuard + advisory.ChainGuard """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_chain_guard_package.py b/vulncheck_sdk/models/advisory_chain_guard_package.py index 17e7ff51..368b479e 100644 --- a/vulncheck_sdk/models/advisory_chain_guard_package.py +++ b/vulncheck_sdk/models/advisory_chain_guard_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChainGuardPackage(BaseModel): """ - AdvisoryChainGuardPackage + advisory.ChainGuardPackage """ # noqa: E501 name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryChainGuardSecFix]] = None diff --git a/vulncheck_sdk/models/advisory_chain_guard_sec_fix.py b/vulncheck_sdk/models/advisory_chain_guard_sec_fix.py index be6912db..cd7b50ae 100644 --- a/vulncheck_sdk/models/advisory_chain_guard_sec_fix.py +++ b/vulncheck_sdk/models/advisory_chain_guard_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryChainGuardSecFix(BaseModel): """ - AdvisoryChainGuardSecFix + advisory.ChainGuardSecFix """ # noqa: E501 cve: Optional[List[StrictStr]] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_check_point.py b/vulncheck_sdk/models/advisory_check_point.py index 0669b542..953a881a 100644 --- a/vulncheck_sdk/models/advisory_check_point.py +++ b/vulncheck_sdk/models/advisory_check_point.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCheckPoint(BaseModel): """ - AdvisoryCheckPoint + advisory.CheckPoint """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_chrome.py b/vulncheck_sdk/models/advisory_chrome.py index a1918968..dc9e360f 100644 --- a/vulncheck_sdk/models/advisory_chrome.py +++ b/vulncheck_sdk/models/advisory_chrome.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryChrome(BaseModel): """ - AdvisoryChrome + advisory.Chrome """ # noqa: E501 affected: Optional[List[AdvisoryAffectedChrome]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ciena.py b/vulncheck_sdk/models/advisory_ciena.py index 6a5348f2..72e712e9 100644 --- a/vulncheck_sdk/models/advisory_ciena.py +++ b/vulncheck_sdk/models/advisory_ciena.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCiena(BaseModel): """ - AdvisoryCiena + advisory.Ciena """ # noqa: E501 cves: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cis_control.py b/vulncheck_sdk/models/advisory_cis_control.py index 5ff7c33c..9396ead5 100644 --- a/vulncheck_sdk/models/advisory_cis_control.py +++ b/vulncheck_sdk/models/advisory_cis_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCISControl(BaseModel): """ - AdvisoryCISControl + advisory.CISControl """ # noqa: E501 cis_control_description: Optional[StrictStr] = None cis_control_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cisa_alert.py b/vulncheck_sdk/models/advisory_cisa_alert.py index b4c97a72..04b9130d 100644 --- a/vulncheck_sdk/models/advisory_cisa_alert.py +++ b/vulncheck_sdk/models/advisory_cisa_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCISAAlert(BaseModel): """ - AdvisoryCISAAlert + advisory.CISAAlert """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") alert_id: Optional[StrictStr] = Field(default=None, alias="alertID") diff --git a/vulncheck_sdk/models/advisory_cisa_csaf_adv.py b/vulncheck_sdk/models/advisory_cisa_csaf_adv.py index 0cb293e0..b67477cd 100644 --- a/vulncheck_sdk/models/advisory_cisa_csaf_adv.py +++ b/vulncheck_sdk/models/advisory_cisa_csaf_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCisaCsafAdv(BaseModel): """ - AdvisoryCisaCsafAdv + advisory.CisaCsafAdv """ # noqa: E501 csaf_json: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cisco_advisory.py b/vulncheck_sdk/models/advisory_cisco_advisory.py index f2b1635a..565b2d8b 100644 --- a/vulncheck_sdk/models/advisory_cisco_advisory.py +++ b/vulncheck_sdk/models/advisory_cisco_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCiscoAdvisory(BaseModel): """ - AdvisoryCiscoAdvisory + advisory.CiscoAdvisory """ # noqa: E501 cisco_bug_id: Optional[StrictStr] = Field(default=None, description="multiple", alias="ciscoBugId") csaf: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cisco_csaf.py b/vulncheck_sdk/models/advisory_cisco_csaf.py index 7d5e8ee7..8e03be6a 100644 --- a/vulncheck_sdk/models/advisory_cisco_csaf.py +++ b/vulncheck_sdk/models/advisory_cisco_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryCiscoCSAF(BaseModel): """ - AdvisoryCiscoCSAF + advisory.CiscoCSAF """ # noqa: E501 - csaf: Optional[Dict[str, Any]] = None + csaf: Optional[Any] = None cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None identifier: Optional[StrictStr] = None @@ -75,6 +75,11 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if csaf (nullable) is None + # and model_fields_set contains the field + if self.csaf is None and "csaf" in self.model_fields_set: + _dict['csaf'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_cisco_known_good_value.py b/vulncheck_sdk/models/advisory_cisco_known_good_value.py index 7386fd67..a1633ffe 100644 --- a/vulncheck_sdk/models/advisory_cisco_known_good_value.py +++ b/vulncheck_sdk/models/advisory_cisco_known_good_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCiscoKnownGoodValue(BaseModel): """ - AdvisoryCiscoKnownGoodValue + advisory.CiscoKnownGoodValue """ # noqa: E501 biv_category: Optional[StrictStr] = None biv_hash: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_citrix_advisory.py b/vulncheck_sdk/models/advisory_citrix_advisory.py index 1b149e32..e9fd9e41 100644 --- a/vulncheck_sdk/models/advisory_citrix_advisory.py +++ b/vulncheck_sdk/models/advisory_citrix_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCitrixAdvisory(BaseModel): """ - AdvisoryCitrixAdvisory + advisory.CitrixAdvisory """ # noqa: E501 citrix_id: Optional[StrictStr] = Field(default=None, alias="citrixId") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_claroty_vulnerability.py b/vulncheck_sdk/models/advisory_claroty_vulnerability.py index 22da0d85..00bb1329 100644 --- a/vulncheck_sdk/models/advisory_claroty_vulnerability.py +++ b/vulncheck_sdk/models/advisory_claroty_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryClarotyVulnerability(BaseModel): """ - AdvisoryClarotyVulnerability + advisory.ClarotyVulnerability """ # noqa: E501 advisory_url: Optional[StrictStr] = None claroty_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cloud_bees.py b/vulncheck_sdk/models/advisory_cloud_bees.py index 00fb8d01..d2d1947a 100644 --- a/vulncheck_sdk/models/advisory_cloud_bees.py +++ b/vulncheck_sdk/models/advisory_cloud_bees.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCloudBees(BaseModel): """ - AdvisoryCloudBees + advisory.CloudBees """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cloud_vuln_db_advisory.py b/vulncheck_sdk/models/advisory_cloud_vuln_db_advisory.py index 74629900..88624aae 100644 --- a/vulncheck_sdk/models/advisory_cloud_vuln_db_advisory.py +++ b/vulncheck_sdk/models/advisory_cloud_vuln_db_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCloudVulnDBAdvisory(BaseModel): """ - AdvisoryCloudVulnDBAdvisory + advisory.CloudVulnDBAdvisory """ # noqa: E501 affected_services: Optional[StrictStr] = Field(default=None, alias="affectedServices") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cnnvd_entry_json.py b/vulncheck_sdk/models/advisory_cnnvd_entry_json.py index 07d6df5f..8ad08ed7 100644 --- a/vulncheck_sdk/models/advisory_cnnvd_entry_json.py +++ b/vulncheck_sdk/models/advisory_cnnvd_entry_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCNNVDEntryJSON(BaseModel): """ - AdvisoryCNNVDEntryJSON + advisory.CNNVDEntryJSON """ # noqa: E501 bugtraq_id: Optional[StrictStr] = Field(default=None, alias="bugtraq-id") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cnvd_bulletin.py b/vulncheck_sdk/models/advisory_cnvd_bulletin.py index 92f10696..3e489c78 100644 --- a/vulncheck_sdk/models/advisory_cnvd_bulletin.py +++ b/vulncheck_sdk/models/advisory_cnvd_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,12 +25,12 @@ class AdvisoryCNVDBulletin(BaseModel): """ - AdvisoryCNVDBulletin + advisory.CNVDBulletin """ # noqa: E501 cnta: Optional[StrictStr] = None cnvd: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cnvd_flaw.py b/vulncheck_sdk/models/advisory_cnvd_flaw.py index 8d3fda12..7baf5b6c 100644 --- a/vulncheck_sdk/models/advisory_cnvd_flaw.py +++ b/vulncheck_sdk/models/advisory_cnvd_flaw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCNVDFlaw(BaseModel): """ - AdvisoryCNVDFlaw + advisory.CNVDFlaw """ # noqa: E501 affected_products_cn: Optional[StrictStr] = None bugtraq_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_codesys_advisory.py b/vulncheck_sdk/models/advisory_codesys_advisory.py index 6ffda70d..357af45a 100644 --- a/vulncheck_sdk/models/advisory_codesys_advisory.py +++ b/vulncheck_sdk/models/advisory_codesys_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCodesysAdvisory(BaseModel): """ - AdvisoryCodesysAdvisory + advisory.CodesysAdvisory """ # noqa: E501 codesys_id: Optional[StrictStr] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault.py b/vulncheck_sdk/models/advisory_comm_vault.py index 3b8895a1..1e3ab092 100644 --- a/vulncheck_sdk/models/advisory_comm_vault.py +++ b/vulncheck_sdk/models/advisory_comm_vault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryCommVault(BaseModel): """ - AdvisoryCommVault + advisory.CommVault """ # noqa: E501 cve: Optional[List[StrictStr]] = None cve_details: Optional[List[AdvisoryCommVaultCVEDetails]] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault_cve_details.py b/vulncheck_sdk/models/advisory_comm_vault_cve_details.py index 76353436..cf3c09b2 100644 --- a/vulncheck_sdk/models/advisory_comm_vault_cve_details.py +++ b/vulncheck_sdk/models/advisory_comm_vault_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultCVEDetails(BaseModel): """ - AdvisoryCommVaultCVEDetails + advisory.CommVaultCVEDetails """ # noqa: E501 cve_id: Optional[StrictStr] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault_impacted_product.py b/vulncheck_sdk/models/advisory_comm_vault_impacted_product.py index 2975f9a8..18e1a262 100644 --- a/vulncheck_sdk/models/advisory_comm_vault_impacted_product.py +++ b/vulncheck_sdk/models/advisory_comm_vault_impacted_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCommVaultImpactedProduct(BaseModel): """ - AdvisoryCommVaultImpactedProduct + advisory.CommVaultImpactedProduct """ # noqa: E501 description: Optional[StrictStr] = None impacted_product_details: Optional[List[AdvisoryCommVaultImpactedProductDetails]] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault_impacted_product_details.py b/vulncheck_sdk/models/advisory_comm_vault_impacted_product_details.py index 90cbd9d9..3bbad949 100644 --- a/vulncheck_sdk/models/advisory_comm_vault_impacted_product_details.py +++ b/vulncheck_sdk/models/advisory_comm_vault_impacted_product_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultImpactedProductDetails(BaseModel): """ - AdvisoryCommVaultImpactedProductDetails + advisory.CommVaultImpactedProductDetails """ # noqa: E501 affected_versions: Optional[StrictStr] = None platforms: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault_resolution.py b/vulncheck_sdk/models/advisory_comm_vault_resolution.py index 4e37c8e1..742da370 100644 --- a/vulncheck_sdk/models/advisory_comm_vault_resolution.py +++ b/vulncheck_sdk/models/advisory_comm_vault_resolution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCommVaultResolution(BaseModel): """ - AdvisoryCommVaultResolution + advisory.CommVaultResolution """ # noqa: E501 description: Optional[StrictStr] = None resolution_details: Optional[List[AdvisoryCommVaultResolutionDetails]] = None diff --git a/vulncheck_sdk/models/advisory_comm_vault_resolution_details.py b/vulncheck_sdk/models/advisory_comm_vault_resolution_details.py index d88fbdd1..0d85eaa2 100644 --- a/vulncheck_sdk/models/advisory_comm_vault_resolution_details.py +++ b/vulncheck_sdk/models/advisory_comm_vault_resolution_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCommVaultResolutionDetails(BaseModel): """ - AdvisoryCommVaultResolutionDetails + advisory.CommVaultResolutionDetails """ # noqa: E501 feature_release: Optional[StrictStr] = None maintenance_release: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_compass_security.py b/vulncheck_sdk/models/advisory_compass_security.py index 17a0512d..b98eafe5 100644 --- a/vulncheck_sdk/models/advisory_compass_security.py +++ b/vulncheck_sdk/models/advisory_compass_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCompassSecurity(BaseModel): """ - AdvisoryCompassSecurity + advisory.CompassSecurity """ # noqa: E501 csnc_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_container_os.py b/vulncheck_sdk/models/advisory_container_os.py index a60fed82..e7cc353b 100644 --- a/vulncheck_sdk/models/advisory_container_os.py +++ b/vulncheck_sdk/models/advisory_container_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryContainerOS(BaseModel): """ - AdvisoryContainerOS + advisory.ContainerOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_core_impact_exploit.py b/vulncheck_sdk/models/advisory_core_impact_exploit.py index 67e6cd23..2301a6e0 100644 --- a/vulncheck_sdk/models/advisory_core_impact_exploit.py +++ b/vulncheck_sdk/models/advisory_core_impact_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCoreImpactExploit(BaseModel): """ - AdvisoryCoreImpactExploit + advisory.CoreImpactExploit """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_correction.py b/vulncheck_sdk/models/advisory_correction.py index 12387126..61c9ad21 100644 --- a/vulncheck_sdk/models/advisory_correction.py +++ b/vulncheck_sdk/models/advisory_correction.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCorrection(BaseModel): """ - AdvisoryCorrection + advisory.Correction """ # noqa: E501 corrected_at: Optional[StrictStr] = Field(default=None, alias="correctedAt") orelease: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cos_update.py b/vulncheck_sdk/models/advisory_cos_update.py index cbb67979..f53f1bd3 100644 --- a/vulncheck_sdk/models/advisory_cos_update.py +++ b/vulncheck_sdk/models/advisory_cos_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCOSUpdate(BaseModel): """ - AdvisoryCOSUpdate + advisory.COSUpdate """ # noqa: E501 changed: Optional[List[StrictStr]] = None featured: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_cpe_match.py b/vulncheck_sdk/models/advisory_cpe_match.py index 530286b9..66a8ebd6 100644 --- a/vulncheck_sdk/models/advisory_cpe_match.py +++ b/vulncheck_sdk/models/advisory_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCPEMatch(BaseModel): """ - AdvisoryCPEMatch + advisory.CPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/models/advisory_cpe_node.py b/vulncheck_sdk/models/advisory_cpe_node.py index 54849060..c2150d57 100644 --- a/vulncheck_sdk/models/advisory_cpe_node.py +++ b/vulncheck_sdk/models/advisory_cpe_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCPENode(BaseModel): """ - AdvisoryCPENode + advisory.CPENode """ # noqa: E501 cpe_match: Optional[List[AdvisoryCPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/advisory_credit.py b/vulncheck_sdk/models/advisory_credit.py index 5a10ebfc..428f3e5f 100644 --- a/vulncheck_sdk/models/advisory_credit.py +++ b/vulncheck_sdk/models/advisory_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCredit(BaseModel): """ - AdvisoryCredit + advisory.Credit """ # noqa: E501 lang: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_crestron.py b/vulncheck_sdk/models/advisory_crestron.py index 2a9ba11d..05a19744 100644 --- a/vulncheck_sdk/models/advisory_crestron.py +++ b/vulncheck_sdk/models/advisory_crestron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCrestron(BaseModel): """ - AdvisoryCrestron + advisory.Crestron """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_crowd_sec.py b/vulncheck_sdk/models/advisory_crowd_sec.py index e8d84cb1..f537e8a7 100644 --- a/vulncheck_sdk/models/advisory_crowd_sec.py +++ b/vulncheck_sdk/models/advisory_crowd_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCrowdSec(BaseModel): """ - AdvisoryCrowdSec + advisory.CrowdSec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_csaf.py b/vulncheck_sdk/models/advisory_csaf.py index 0a7e6135..a09682d2 100644 --- a/vulncheck_sdk/models/advisory_csaf.py +++ b/vulncheck_sdk/models/advisory_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,11 +29,11 @@ class AdvisoryCSAF(BaseModel): """ - AdvisoryCSAF + advisory.CSAF """ # noqa: E501 - document: Optional[AdvisoryDocumentMetadata] = Field(default=None, description="Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property") + document: Optional[AdvisoryDocumentMetadata] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes") - product_tree: Optional[AdvisoryProductBranch] = Field(default=None, description="ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property") + product_tree: Optional[AdvisoryProductBranch] = None vulnerabilities: Optional[List[AdvisoryCSAFVulnerability]] = Field(default=None, description="Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property") __properties: ClassVar[List[str]] = ["document", "notes", "product_tree", "vulnerabilities"] diff --git a/vulncheck_sdk/models/advisory_csaf_note.py b/vulncheck_sdk/models/advisory_csaf_note.py index 3ff687aa..c08866bc 100644 --- a/vulncheck_sdk/models/advisory_csaf_note.py +++ b/vulncheck_sdk/models/advisory_csaf_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCSAFNote(BaseModel): """ - AdvisoryCSAFNote + advisory.CSAFNote """ # noqa: E501 audience: Optional[StrictStr] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_csaf_reference.py b/vulncheck_sdk/models/advisory_csaf_reference.py index d09855d5..fe538a78 100644 --- a/vulncheck_sdk/models/advisory_csaf_reference.py +++ b/vulncheck_sdk/models/advisory_csaf_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCSAFReference(BaseModel): """ - AdvisoryCSAFReference + advisory.CSAFReference """ # noqa: E501 category: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_csaf_relationship.py b/vulncheck_sdk/models/advisory_csaf_relationship.py index e6ba54ce..bddb8582 100644 --- a/vulncheck_sdk/models/advisory_csaf_relationship.py +++ b/vulncheck_sdk/models/advisory_csaf_relationship.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCSAFRelationship(BaseModel): """ - AdvisoryCSAFRelationship + advisory.CSAFRelationship """ # noqa: E501 category: Optional[StrictStr] = None full_product_name: Optional[AdvisoryProduct] = None diff --git a/vulncheck_sdk/models/advisory_csaf_score.py b/vulncheck_sdk/models/advisory_csaf_score.py index b8d8fce4..ca4174cc 100644 --- a/vulncheck_sdk/models/advisory_csaf_score.py +++ b/vulncheck_sdk/models/advisory_csaf_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryCSAFScore(BaseModel): """ - AdvisoryCSAFScore + advisory.CSAFScore """ # noqa: E501 cvss_v2: Optional[AdvisoryCVSSV2] = None cvss_v3: Optional[AdvisoryCVSSV3] = None diff --git a/vulncheck_sdk/models/advisory_csaf_vulnerability.py b/vulncheck_sdk/models/advisory_csaf_vulnerability.py index e5ee92aa..c707ad04 100644 --- a/vulncheck_sdk/models/advisory_csaf_vulnerability.py +++ b/vulncheck_sdk/models/advisory_csaf_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class AdvisoryCSAFVulnerability(BaseModel): """ - AdvisoryCSAFVulnerability + advisory.CSAFVulnerability """ # noqa: E501 cve: Optional[StrictStr] = Field(default=None, description="MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve") cwe: Optional[AdvisoryCwe] = None diff --git a/vulncheck_sdk/models/advisory_curl.py b/vulncheck_sdk/models/advisory_curl.py index e997252b..20d1adf1 100644 --- a/vulncheck_sdk/models/advisory_curl.py +++ b/vulncheck_sdk/models/advisory_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCurl(BaseModel): """ - AdvisoryCurl + advisory.Curl """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_curl_affected.py b/vulncheck_sdk/models/advisory_curl_affected.py index a1eb1e10..e4464ae1 100644 --- a/vulncheck_sdk/models/advisory_curl_affected.py +++ b/vulncheck_sdk/models/advisory_curl_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryCurlAffected(BaseModel): """ - AdvisoryCurlAffected + advisory.CurlAffected """ # noqa: E501 ranges: Optional[List[AdvisoryCurlRange]] = None versions: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_curl_credit.py b/vulncheck_sdk/models/advisory_curl_credit.py index 5a27f1d6..c4caa2c4 100644 --- a/vulncheck_sdk/models/advisory_curl_credit.py +++ b/vulncheck_sdk/models/advisory_curl_credit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlCredit(BaseModel): """ - AdvisoryCurlCredit + advisory.CurlCredit """ # noqa: E501 name: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_curl_cwe.py b/vulncheck_sdk/models/advisory_curl_cwe.py index 41c5b575..212e8048 100644 --- a/vulncheck_sdk/models/advisory_curl_cwe.py +++ b/vulncheck_sdk/models/advisory_curl_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlCWE(BaseModel): """ - AdvisoryCurlCWE + advisory.CurlCWE """ # noqa: E501 desc: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_curl_range.py b/vulncheck_sdk/models/advisory_curl_range.py index d5905bbb..a3f86d1c 100644 --- a/vulncheck_sdk/models/advisory_curl_range.py +++ b/vulncheck_sdk/models/advisory_curl_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCurlRange(BaseModel): """ - AdvisoryCurlRange + advisory.CurlRange """ # noqa: E501 events: Optional[List[Dict[str, StrictStr]]] = None repo: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cve_detail.py b/vulncheck_sdk/models/advisory_cve_detail.py index 1c88309d..5407de9f 100644 --- a/vulncheck_sdk/models/advisory_cve_detail.py +++ b/vulncheck_sdk/models/advisory_cve_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEDetail(BaseModel): """ - AdvisoryCVEDetail + advisory.CVEDetail """ # noqa: E501 base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") cveid: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cve_details_link.py b/vulncheck_sdk/models/advisory_cve_details_link.py index b625a7d0..b969c03f 100644 --- a/vulncheck_sdk/models/advisory_cve_details_link.py +++ b/vulncheck_sdk/models/advisory_cve_details_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEDetailsLink(BaseModel): """ - AdvisoryCVEDetailsLink + advisory.CVEDetailsLink """ # noqa: E501 url: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cve_reference.py b/vulncheck_sdk/models/advisory_cve_reference.py index b29bd9d7..5872c15d 100644 --- a/vulncheck_sdk/models/advisory_cve_reference.py +++ b/vulncheck_sdk/models/advisory_cve_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVEReference(BaseModel): """ - AdvisoryCVEReference + advisory.CVEReference """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cvrf.py b/vulncheck_sdk/models/advisory_cvrf.py index 74c8c8b4..aff454b3 100644 --- a/vulncheck_sdk/models/advisory_cvrf.py +++ b/vulncheck_sdk/models/advisory_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,28 +18,17 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability from typing import Optional, Set from typing_extensions import Self class AdvisoryCvrf(BaseModel): """ - AdvisoryCvrf + advisory.Cvrf """ # noqa: E501 cve: Optional[List[StrictStr]] = None - notes: Optional[List[AdvisoryDocumentNote]] = None - product_tree: Optional[AdvisoryProductTree] = Field(default=None, alias="productTree") - references: Optional[List[AdvisoryCVRFReference]] = None - title: Optional[StrictStr] = None - tracking: Optional[AdvisoryDocumentTracking] = None - vulnerabilities: Optional[List[AdvisoryVulnerability]] = None - __properties: ClassVar[List[str]] = ["cve", "notes", "productTree", "references", "title", "tracking", "vulnerabilities"] + __properties: ClassVar[List[str]] = ["cve"] model_config = ConfigDict( populate_by_name=True, @@ -80,33 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in notes (list) - _items = [] - if self.notes: - for _item_notes in self.notes: - if _item_notes: - _items.append(_item_notes.to_dict()) - _dict['notes'] = _items - # override the default output from pydantic by calling `to_dict()` of product_tree - if self.product_tree: - _dict['productTree'] = self.product_tree.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of tracking - if self.tracking: - _dict['tracking'] = self.tracking.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in vulnerabilities (list) - _items = [] - if self.vulnerabilities: - for _item_vulnerabilities in self.vulnerabilities: - if _item_vulnerabilities: - _items.append(_item_vulnerabilities.to_dict()) - _dict['vulnerabilities'] = _items return _dict @classmethod @@ -119,13 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cve": obj.get("cve"), - "notes": [AdvisoryDocumentNote.from_dict(_item) for _item in obj["notes"]] if obj.get("notes") is not None else None, - "productTree": AdvisoryProductTree.from_dict(obj["productTree"]) if obj.get("productTree") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "title": obj.get("title"), - "tracking": AdvisoryDocumentTracking.from_dict(obj["tracking"]) if obj.get("tracking") is not None else None, - "vulnerabilities": [AdvisoryVulnerability.from_dict(_item) for _item in obj["vulnerabilities"]] if obj.get("vulnerabilities") is not None else None + "cve": obj.get("cve") }) return _obj diff --git a/vulncheck_sdk/models/advisory_cvrf_reference.py b/vulncheck_sdk/models/advisory_cvrf_reference.py deleted file mode 100644 index e62a271a..00000000 --- a/vulncheck_sdk/models/advisory_cvrf_reference.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCVRFReference(BaseModel): - """ - AdvisoryCVRFReference - """ # noqa: E501 - description: Optional[StrictStr] = None - url: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["description", "url"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "description": obj.get("description"), - "url": obj.get("url") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_cvss.py b/vulncheck_sdk/models/advisory_cvss.py index 9cc213aa..4760c02c 100644 --- a/vulncheck_sdk/models/advisory_cvss.py +++ b/vulncheck_sdk/models/advisory_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSS(BaseModel): """ - AdvisoryCVSS + advisory.CVSS """ # noqa: E501 score: Optional[StrictStr] = None severity: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cvsss_v23.py b/vulncheck_sdk/models/advisory_cvsss_v23.py index 9f4b60da..4b95699b 100644 --- a/vulncheck_sdk/models/advisory_cvsss_v23.py +++ b/vulncheck_sdk/models/advisory_cvsss_v23.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCvsssV23(BaseModel): """ - AdvisoryCvsssV23 + advisory.CvsssV2_3 """ # noqa: E501 basescore: Optional[StrictStr] = None temporalscore: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cvssv2.py b/vulncheck_sdk/models/advisory_cvssv2.py index 4d6347a4..9fc67c13 100644 --- a/vulncheck_sdk/models/advisory_cvssv2.py +++ b/vulncheck_sdk/models/advisory_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV2(BaseModel): """ - AdvisoryCVSSV2 + advisory.CVSSV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/models/advisory_cvssv3.py b/vulncheck_sdk/models/advisory_cvssv3.py index 881da650..f913eeb7 100644 --- a/vulncheck_sdk/models/advisory_cvssv3.py +++ b/vulncheck_sdk/models/advisory_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV3(BaseModel): """ - AdvisoryCVSSV3 + advisory.CVSSV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/models/advisory_cvssv40.py b/vulncheck_sdk/models/advisory_cvssv40.py index fa7bf159..12ae4b29 100644 --- a/vulncheck_sdk/models/advisory_cvssv40.py +++ b/vulncheck_sdk/models/advisory_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV40(BaseModel): """ - AdvisoryCVSSV40 + this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") recovery: Optional[StrictStr] = Field(default=None, alias="Recovery") diff --git a/vulncheck_sdk/models/advisory_cvssv40_threat.py b/vulncheck_sdk/models/advisory_cvssv40_threat.py index 3ca22f61..0ea1d936 100644 --- a/vulncheck_sdk/models/advisory_cvssv40_threat.py +++ b/vulncheck_sdk/models/advisory_cvssv40_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCVSSV40Threat(BaseModel): """ - AdvisoryCVSSV40Threat + advisory.CVSSV40Threat """ # noqa: E501 base_threat_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseThreatScore") base_threat_severity: Optional[StrictStr] = Field(default=None, alias="baseThreatSeverity") diff --git a/vulncheck_sdk/models/advisory_cwe.py b/vulncheck_sdk/models/advisory_cwe.py index fafcbeb7..7ee8ecbb 100644 --- a/vulncheck_sdk/models/advisory_cwe.py +++ b/vulncheck_sdk/models/advisory_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCwe(BaseModel): """ - AdvisoryCwe + advisory.Cwe """ # noqa: E501 id: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cwe_acceptance_level.py b/vulncheck_sdk/models/advisory_cwe_acceptance_level.py index d4d7d910..86c56db5 100644 --- a/vulncheck_sdk/models/advisory_cwe_acceptance_level.py +++ b/vulncheck_sdk/models/advisory_cwe_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCweAcceptanceLevel(BaseModel): """ - AdvisoryCweAcceptanceLevel + advisory.CweAcceptanceLevel """ # noqa: E501 description: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/models/advisory_cwe_data.py b/vulncheck_sdk/models/advisory_cwe_data.py index 372fe6dd..a46b3f50 100644 --- a/vulncheck_sdk/models/advisory_cwe_data.py +++ b/vulncheck_sdk/models/advisory_cwe_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryCweData(BaseModel): """ - AdvisoryCweData + advisory.CweData """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_cwes.py b/vulncheck_sdk/models/advisory_cwes.py index 0560e081..dc294e63 100644 --- a/vulncheck_sdk/models/advisory_cwes.py +++ b/vulncheck_sdk/models/advisory_cwes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,19 +18,17 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictInt +from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode from typing import Optional, Set from typing_extensions import Self class AdvisoryCwes(BaseModel): """ - AdvisoryCwes + advisory.Cwes """ # noqa: E501 - nodes: Optional[List[AdvisoryCWENode]] = None - total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") - __properties: ClassVar[List[str]] = ["nodes", "totalCount"] + nodes: Optional[List[Dict[str, Any]]] = None + __properties: ClassVar[List[str]] = ["nodes"] model_config = ConfigDict( populate_by_name=True, @@ -71,13 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in nodes (list) - _items = [] - if self.nodes: - for _item_nodes in self.nodes: - if _item_nodes: - _items.append(_item_nodes.to_dict()) - _dict['nodes'] = _items return _dict @classmethod @@ -90,8 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "nodes": [AdvisoryCWENode.from_dict(_item) for _item in obj["nodes"]] if obj.get("nodes") is not None else None, - "totalCount": obj.get("totalCount") + "nodes": obj.get("nodes") }) return _obj diff --git a/vulncheck_sdk/models/advisory_cycle.py b/vulncheck_sdk/models/advisory_cycle.py index 812309b2..48a1a06e 100644 --- a/vulncheck_sdk/models/advisory_cycle.py +++ b/vulncheck_sdk/models/advisory_cycle.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,20 +25,20 @@ class AdvisoryCycle(BaseModel): """ - AdvisoryCycle + advisory.Cycle """ # noqa: E501 codename: Optional[StrictStr] = None cycle: Optional[StrictStr] = None - discontinued: Optional[Dict[str, Any]] = None - eol: Optional[Dict[str, Any]] = None - extended_support: Optional[Dict[str, Any]] = Field(default=None, alias="extendedSupport") + discontinued: Optional[Any] = None + eol: Optional[Any] = None + extended_support: Optional[Any] = Field(default=None, alias="extendedSupport") latest: Optional[StrictStr] = None latest_release_date: Optional[StrictStr] = Field(default=None, alias="latestReleaseDate") link: Optional[StrictStr] = None - lts: Optional[Dict[str, Any]] = None + lts: Optional[Any] = None release_date: Optional[StrictStr] = Field(default=None, alias="releaseDate") release_label: Optional[StrictStr] = Field(default=None, alias="releaseLabel") - support: Optional[Dict[str, Any]] = None + support: Optional[Any] = None __properties: ClassVar[List[str]] = ["codename", "cycle", "discontinued", "eol", "extendedSupport", "latest", "latestReleaseDate", "link", "lts", "releaseDate", "releaseLabel", "support"] model_config = ConfigDict( @@ -80,6 +80,31 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if discontinued (nullable) is None + # and model_fields_set contains the field + if self.discontinued is None and "discontinued" in self.model_fields_set: + _dict['discontinued'] = None + + # set to None if eol (nullable) is None + # and model_fields_set contains the field + if self.eol is None and "eol" in self.model_fields_set: + _dict['eol'] = None + + # set to None if extended_support (nullable) is None + # and model_fields_set contains the field + if self.extended_support is None and "extended_support" in self.model_fields_set: + _dict['extendedSupport'] = None + + # set to None if lts (nullable) is None + # and model_fields_set contains the field + if self.lts is None and "lts" in self.model_fields_set: + _dict['lts'] = None + + # set to None if support (nullable) is None + # and model_fields_set contains the field + if self.support is None and "support" in self.model_fields_set: + _dict['support'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_d_link.py b/vulncheck_sdk/models/advisory_d_link.py index cac66eed..a63c90d6 100644 --- a/vulncheck_sdk/models/advisory_d_link.py +++ b/vulncheck_sdk/models/advisory_d_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDLink(BaseModel): """ - AdvisoryDLink + advisory.DLink """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_dahua.py b/vulncheck_sdk/models/advisory_dahua.py index d4508d41..26ad22ca 100644 --- a/vulncheck_sdk/models/advisory_dahua.py +++ b/vulncheck_sdk/models/advisory_dahua.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDahua(BaseModel): """ - AdvisoryDahua + advisory.Dahua """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_dan_foss_cve_details.py b/vulncheck_sdk/models/advisory_dan_foss_cve_details.py index 1a5fa19f..b2b6a880 100644 --- a/vulncheck_sdk/models/advisory_dan_foss_cve_details.py +++ b/vulncheck_sdk/models/advisory_dan_foss_cve_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDanFossCVEDetails(BaseModel): """ - AdvisoryDanFossCVEDetails + advisory.DanFossCVEDetails """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_danfoss.py b/vulncheck_sdk/models/advisory_danfoss.py index bd90be0d..a2cf1c3a 100644 --- a/vulncheck_sdk/models/advisory_danfoss.py +++ b/vulncheck_sdk/models/advisory_danfoss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDanfoss(BaseModel): """ - AdvisoryDanfoss + advisory.Danfoss """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_dassault.py b/vulncheck_sdk/models/advisory_dassault.py index 5b5bfd83..ee7f7b4a 100644 --- a/vulncheck_sdk/models/advisory_dassault.py +++ b/vulncheck_sdk/models/advisory_dassault.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDassault(BaseModel): """ - AdvisoryDassault + advisory.Dassault """ # noqa: E501 affected_products: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_date_time.py b/vulncheck_sdk/models/advisory_date_time.py deleted file mode 100644 index cd1d72b0..00000000 --- a/vulncheck_sdk/models/advisory_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDateTime(BaseModel): - """ - AdvisoryDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_db_specific.py b/vulncheck_sdk/models/advisory_db_specific.py index cebf1b6a..03ca99ba 100644 --- a/vulncheck_sdk/models/advisory_db_specific.py +++ b/vulncheck_sdk/models/advisory_db_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryDBSpecific(BaseModel): """ - AdvisoryDBSpecific + advisory.DBSpecific """ # noqa: E501 cwe: Optional[AdvisoryCurlCWE] = Field(default=None, alias="CWE") award: Optional[AdvisoryAward] = None diff --git a/vulncheck_sdk/models/advisory_debian_cve.py b/vulncheck_sdk/models/advisory_debian_cve.py index 2e34bf52..1df3fc26 100644 --- a/vulncheck_sdk/models/advisory_debian_cve.py +++ b/vulncheck_sdk/models/advisory_debian_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDebianCVE(BaseModel): """ - AdvisoryDebianCVE + advisory.DebianCVE """ # noqa: E501 cve: Optional[StrictStr] = None debianbug: Optional[StrictInt] = None diff --git a/vulncheck_sdk/models/advisory_debian_security_advisory.py b/vulncheck_sdk/models/advisory_debian_security_advisory.py index 824c949d..495eaee6 100644 --- a/vulncheck_sdk/models/advisory_debian_security_advisory.py +++ b/vulncheck_sdk/models/advisory_debian_security_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDebianSecurityAdvisory(BaseModel): """ - AdvisoryDebianSecurityAdvisory + advisory.DebianSecurityAdvisory """ # noqa: E501 affected_packages: Optional[List[AdvisoryAffectedDebianPackage]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_dell.py b/vulncheck_sdk/models/advisory_dell.py index 481646cf..6ba37f33 100644 --- a/vulncheck_sdk/models/advisory_dell.py +++ b/vulncheck_sdk/models/advisory_dell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryDell(BaseModel): """ - AdvisoryDell + advisory.Dell """ # noqa: E501 article_number: Optional[StrictStr] = Field(default=None, alias="articleNumber") combined_product_list: Optional[StrictStr] = Field(default=None, alias="combinedProductList") diff --git a/vulncheck_sdk/models/advisory_dell_cve.py b/vulncheck_sdk/models/advisory_dell_cve.py index 53d883b0..b6d601e1 100644 --- a/vulncheck_sdk/models/advisory_dell_cve.py +++ b/vulncheck_sdk/models/advisory_dell_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDellCVE(BaseModel): """ - AdvisoryDellCVE + advisory.DellCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_delta_advisory.py b/vulncheck_sdk/models/advisory_delta_advisory.py index 21f627bf..e641c1e6 100644 --- a/vulncheck_sdk/models/advisory_delta_advisory.py +++ b/vulncheck_sdk/models/advisory_delta_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDeltaAdvisory(BaseModel): """ - AdvisoryDeltaAdvisory + advisory.DeltaAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_dfn_cert.py b/vulncheck_sdk/models/advisory_dfn_cert.py index a2b3eaac..2771dd98 100644 --- a/vulncheck_sdk/models/advisory_dfn_cert.py +++ b/vulncheck_sdk/models/advisory_dfn_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDFNCert(BaseModel): """ - AdvisoryDFNCert + advisory.DFNCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_distro_package.py b/vulncheck_sdk/models/advisory_distro_package.py index 3347257b..b398d4ae 100644 --- a/vulncheck_sdk/models/advisory_distro_package.py +++ b/vulncheck_sdk/models/advisory_distro_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryDistroPackage(BaseModel): """ - AdvisoryDistroPackage + advisory.DistroPackage """ # noqa: E501 binary: Optional[StrictBool] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_distro_version.py b/vulncheck_sdk/models/advisory_distro_version.py index 829417ef..432c7a6e 100644 --- a/vulncheck_sdk/models/advisory_distro_version.py +++ b/vulncheck_sdk/models/advisory_distro_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDistroVersion(BaseModel): """ - AdvisoryDistroVersion + advisory.DistroVersion """ # noqa: E501 arch: Optional[StrictStr] = None published_date: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_django.py b/vulncheck_sdk/models/advisory_django.py index 57ebd5e5..5c4273ce 100644 --- a/vulncheck_sdk/models/advisory_django.py +++ b/vulncheck_sdk/models/advisory_django.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDjango(BaseModel): """ - AdvisoryDjango + advisory.Django """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_dnn.py b/vulncheck_sdk/models/advisory_dnn.py index 5d656ce1..725471b2 100644 --- a/vulncheck_sdk/models/advisory_dnn.py +++ b/vulncheck_sdk/models/advisory_dnn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDNN(BaseModel): """ - AdvisoryDNN + advisory.DNN """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_document_metadata.py b/vulncheck_sdk/models/advisory_document_metadata.py index 9579c890..adf7d178 100644 --- a/vulncheck_sdk/models/advisory_document_metadata.py +++ b/vulncheck_sdk/models/advisory_document_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,11 +29,11 @@ class AdvisoryDocumentMetadata(BaseModel): """ - AdvisoryDocumentMetadata + Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property """ # noqa: E501 category: Optional[StrictStr] = None csaf_version: Optional[StrictStr] = None - distribution: Optional[Dict[str, Any]] = None + distribution: Optional[Dict[str, Any]] = Field(default=None, description="advisory.CSAFDistribution") lang: Optional[StrictStr] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="used by ncsc") publisher: Optional[AdvisoryPublisher] = None diff --git a/vulncheck_sdk/models/advisory_document_publisher.py b/vulncheck_sdk/models/advisory_document_publisher.py index fd1e707c..6092a992 100644 --- a/vulncheck_sdk/models/advisory_document_publisher.py +++ b/vulncheck_sdk/models/advisory_document_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDocumentPublisher(BaseModel): """ - AdvisoryDocumentPublisher + advisory.DocumentPublisher """ # noqa: E501 contact_details: Optional[StrictStr] = None issuing_authority: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_document_tracking.py b/vulncheck_sdk/models/advisory_document_tracking.py deleted file mode 100644 index 045ae657..00000000 --- a/vulncheck_sdk/models/advisory_document_tracking.py +++ /dev/null @@ -1,106 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentTracking(BaseModel): - """ - AdvisoryDocumentTracking - """ # noqa: E501 - current_release_date: Optional[StrictStr] = Field(default=None, alias="currentReleaseDate") - id: Optional[StrictStr] = None - initial_release_date: Optional[StrictStr] = Field(default=None, alias="initialReleaseDate") - revision_history: Optional[List[AdvisoryRevision]] = Field(default=None, alias="revisionHistory") - status: Optional[StrictStr] = None - version: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["currentReleaseDate", "id", "initialReleaseDate", "revisionHistory", "status", "version"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in revision_history (list) - _items = [] - if self.revision_history: - for _item_revision_history in self.revision_history: - if _item_revision_history: - _items.append(_item_revision_history.to_dict()) - _dict['revisionHistory'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "currentReleaseDate": obj.get("currentReleaseDate"), - "id": obj.get("id"), - "initialReleaseDate": obj.get("initialReleaseDate"), - "revisionHistory": [AdvisoryRevision.from_dict(_item) for _item in obj["revisionHistory"]] if obj.get("revisionHistory") is not None else None, - "status": obj.get("status"), - "version": obj.get("version") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_dot_cms.py b/vulncheck_sdk/models/advisory_dot_cms.py index 97e2618d..8a406711 100644 --- a/vulncheck_sdk/models/advisory_dot_cms.py +++ b/vulncheck_sdk/models/advisory_dot_cms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDotCMS(BaseModel): """ - AdvisoryDotCMS + advisory.DotCMS """ # noqa: E501 credit: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_dragos_advisory.py b/vulncheck_sdk/models/advisory_dragos_advisory.py index 9a9c17c4..9bc38512 100644 --- a/vulncheck_sdk/models/advisory_dragos_advisory.py +++ b/vulncheck_sdk/models/advisory_dragos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDragosAdvisory(BaseModel): """ - AdvisoryDragosAdvisory + advisory.DragosAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_draytek.py b/vulncheck_sdk/models/advisory_draytek.py index be174b15..3658c4f7 100644 --- a/vulncheck_sdk/models/advisory_draytek.py +++ b/vulncheck_sdk/models/advisory_draytek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDraytek(BaseModel): """ - AdvisoryDraytek + advisory.Draytek """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_drupal.py b/vulncheck_sdk/models/advisory_drupal.py index 7c4d3932..e3d23401 100644 --- a/vulncheck_sdk/models/advisory_drupal.py +++ b/vulncheck_sdk/models/advisory_drupal.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryDrupal(BaseModel): """ - AdvisoryDrupal + advisory.Drupal """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_eaton_advisory.py b/vulncheck_sdk/models/advisory_eaton_advisory.py index b0fbcffb..e1fad07f 100644 --- a/vulncheck_sdk/models/advisory_eaton_advisory.py +++ b/vulncheck_sdk/models/advisory_eaton_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEatonAdvisory(BaseModel): """ - AdvisoryEatonAdvisory + advisory.EatonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_eco_system.py b/vulncheck_sdk/models/advisory_eco_system.py index af016ec2..027b4ade 100644 --- a/vulncheck_sdk/models/advisory_eco_system.py +++ b/vulncheck_sdk/models/advisory_eco_system.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEcoSystem(BaseModel): """ - AdvisoryEcoSystem + advisory.EcoSystem """ # noqa: E501 severity: Optional[StrictStr] = None spl: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_elastic.py b/vulncheck_sdk/models/advisory_elastic.py index 234ebf37..14e17bf8 100644 --- a/vulncheck_sdk/models/advisory_elastic.py +++ b/vulncheck_sdk/models/advisory_elastic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryElastic(BaseModel): """ - AdvisoryElastic + advisory.Elastic """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_elspec.py b/vulncheck_sdk/models/advisory_elspec.py index a714f3e9..46ec6d4c 100644 --- a/vulncheck_sdk/models/advisory_elspec.py +++ b/vulncheck_sdk/models/advisory_elspec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryElspec(BaseModel): """ - AdvisoryElspec + advisory.Elspec """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_emerging_threats_snort.py b/vulncheck_sdk/models/advisory_emerging_threats_snort.py index cc47b249..ba66f259 100644 --- a/vulncheck_sdk/models/advisory_emerging_threats_snort.py +++ b/vulncheck_sdk/models/advisory_emerging_threats_snort.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEmergingThreatsSnort(BaseModel): """ - AdvisoryEmergingThreatsSnort + advisory.EmergingThreatsSnort """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_emerson_advisory.py b/vulncheck_sdk/models/advisory_emerson_advisory.py index b2dde065..dfaf81aa 100644 --- a/vulncheck_sdk/models/advisory_emerson_advisory.py +++ b/vulncheck_sdk/models/advisory_emerson_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEmersonAdvisory(BaseModel): """ - AdvisoryEmersonAdvisory + advisory.EmersonAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_end_of_life.py b/vulncheck_sdk/models/advisory_end_of_life.py index dac7e066..61b25351 100644 --- a/vulncheck_sdk/models/advisory_end_of_life.py +++ b/vulncheck_sdk/models/advisory_end_of_life.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryEndOfLife(BaseModel): """ - AdvisoryEndOfLife + advisory.EndOfLife """ # noqa: E501 cve: Optional[List[StrictStr]] = None cycles: Optional[List[AdvisoryCycle]] = None diff --git a/vulncheck_sdk/models/advisory_endress.py b/vulncheck_sdk/models/advisory_endress.py index 87feb39b..a1d675a5 100644 --- a/vulncheck_sdk/models/advisory_endress.py +++ b/vulncheck_sdk/models/advisory_endress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEndress(BaseModel): """ - AdvisoryEndress + advisory.Endress """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_enisa_id_product.py b/vulncheck_sdk/models/advisory_enisa_id_product.py index f9f18dff..a3cd1a12 100644 --- a/vulncheck_sdk/models/advisory_enisa_id_product.py +++ b/vulncheck_sdk/models/advisory_enisa_id_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEnisaIDProduct(BaseModel): """ - AdvisoryEnisaIDProduct + advisory.EnisaIDProduct """ # noqa: E501 id: Optional[StrictStr] = None product_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_enisa_id_vendor.py b/vulncheck_sdk/models/advisory_enisa_id_vendor.py index c2c93583..40590457 100644 --- a/vulncheck_sdk/models/advisory_enisa_id_vendor.py +++ b/vulncheck_sdk/models/advisory_enisa_id_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEnisaIDVendor(BaseModel): """ - AdvisoryEnisaIDVendor + advisory.EnisaIDVendor """ # noqa: E501 id: Optional[StrictStr] = None vendor_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_eol_alibaba.py b/vulncheck_sdk/models/advisory_eol_alibaba.py index b4dc4803..3dea209d 100644 --- a/vulncheck_sdk/models/advisory_eol_alibaba.py +++ b/vulncheck_sdk/models/advisory_eol_alibaba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLAlibaba(BaseModel): """ - AdvisoryEOLAlibaba + advisory.EOLAlibaba """ # noqa: E501 cve: Optional[List[StrictStr]] = None eol_date: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_eol_microsoft.py b/vulncheck_sdk/models/advisory_eol_microsoft.py index 4f467c94..9bd2efba 100644 --- a/vulncheck_sdk/models/advisory_eol_microsoft.py +++ b/vulncheck_sdk/models/advisory_eol_microsoft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLMicrosoft(BaseModel): """ - AdvisoryEOLMicrosoft + advisory.EOLMicrosoft """ # noqa: E501 cve: Optional[List[StrictStr]] = None edition: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_eol_release_data.py b/vulncheck_sdk/models/advisory_eol_release_data.py index 774e6c39..722fc13e 100644 --- a/vulncheck_sdk/models/advisory_eol_release_data.py +++ b/vulncheck_sdk/models/advisory_eol_release_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEOLReleaseData(BaseModel): """ - AdvisoryEOLReleaseData + advisory.EOLReleaseData """ # noqa: E501 already_eol: Optional[StrictBool] = None branch: Optional[StrictStr] = Field(default=None, description="Alpine Linux") diff --git a/vulncheck_sdk/models/advisory_euvd.py b/vulncheck_sdk/models/advisory_euvd.py index a3a6025b..a05876c7 100644 --- a/vulncheck_sdk/models/advisory_euvd.py +++ b/vulncheck_sdk/models/advisory_euvd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryEUVD(BaseModel): """ - AdvisoryEUVD + advisory.EUVD """ # noqa: E501 aliases: Optional[List[StrictStr]] = None assigner: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_event.py b/vulncheck_sdk/models/advisory_event.py index c9c4aa0d..c5f250d1 100644 --- a/vulncheck_sdk/models/advisory_event.py +++ b/vulncheck_sdk/models/advisory_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryEvent(BaseModel): """ - AdvisoryEvent + advisory.Event """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_exodus_intel.py b/vulncheck_sdk/models/advisory_exodus_intel.py index cbff2674..cf9c1e24 100644 --- a/vulncheck_sdk/models/advisory_exodus_intel.py +++ b/vulncheck_sdk/models/advisory_exodus_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExodusIntel(BaseModel): """ - AdvisoryExodusIntel + advisory.ExodusIntel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_exploit_db_exploitv2.py b/vulncheck_sdk/models/advisory_exploit_db_exploitv2.py index 088ec089..9d16b734 100644 --- a/vulncheck_sdk/models/advisory_exploit_db_exploitv2.py +++ b/vulncheck_sdk/models/advisory_exploit_db_exploitv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExploitDBExploitv2(BaseModel): """ - AdvisoryExploitDBExploitv2 + advisory.ExploitDBExploitv2 """ # noqa: E501 author: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_external_references.py b/vulncheck_sdk/models/advisory_external_references.py index ad50c131..d346c4b3 100644 --- a/vulncheck_sdk/models/advisory_external_references.py +++ b/vulncheck_sdk/models/advisory_external_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryExternalReferences(BaseModel): """ - AdvisoryExternalReferences + advisory.ExternalReferences """ # noqa: E501 description: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_f5.py b/vulncheck_sdk/models/advisory_f5.py index 9339a3d6..c3ee8092 100644 --- a/vulncheck_sdk/models/advisory_f5.py +++ b/vulncheck_sdk/models/advisory_f5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryF5(BaseModel): """ - AdvisoryF5 + advisory.F5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_f_secure.py b/vulncheck_sdk/models/advisory_f_secure.py index dfa04cc5..02717689 100644 --- a/vulncheck_sdk/models/advisory_f_secure.py +++ b/vulncheck_sdk/models/advisory_f_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFSecure(BaseModel): """ - AdvisoryFSecure + advisory.FSecure """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_fanuc.py b/vulncheck_sdk/models/advisory_fanuc.py index 33d9641b..22c73779 100644 --- a/vulncheck_sdk/models/advisory_fanuc.py +++ b/vulncheck_sdk/models/advisory_fanuc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFanuc(BaseModel): """ - AdvisoryFanuc + advisory.Fanuc """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_fastly.py b/vulncheck_sdk/models/advisory_fastly.py index 983369ba..0ee25881 100644 --- a/vulncheck_sdk/models/advisory_fastly.py +++ b/vulncheck_sdk/models/advisory_fastly.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFastly(BaseModel): """ - AdvisoryFastly + advisory.Fastly """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_festo.py b/vulncheck_sdk/models/advisory_festo.py index eca057f2..8136acf5 100644 --- a/vulncheck_sdk/models/advisory_festo.py +++ b/vulncheck_sdk/models/advisory_festo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFesto(BaseModel): """ - AdvisoryFesto + advisory.Festo """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_file_cloud.py b/vulncheck_sdk/models/advisory_file_cloud.py index 9f119ada..863ec8ee 100644 --- a/vulncheck_sdk/models/advisory_file_cloud.py +++ b/vulncheck_sdk/models/advisory_file_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFileCloud(BaseModel): """ - AdvisoryFileCloud + advisory.FileCloud """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_file_zilla.py b/vulncheck_sdk/models/advisory_file_zilla.py index 340102b3..04f599a6 100644 --- a/vulncheck_sdk/models/advisory_file_zilla.py +++ b/vulncheck_sdk/models/advisory_file_zilla.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFileZilla(BaseModel): """ - AdvisoryFileZilla + advisory.FileZilla """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_fix_aff.py b/vulncheck_sdk/models/advisory_fix_aff.py index 59b3d4f2..1940d267 100644 --- a/vulncheck_sdk/models/advisory_fix_aff.py +++ b/vulncheck_sdk/models/advisory_fix_aff.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFixAff(BaseModel): """ - AdvisoryFixAff + advisory.FixAff """ # noqa: E501 affected_since: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_flag.py b/vulncheck_sdk/models/advisory_flag.py index b93f5c74..fad3e4a1 100644 --- a/vulncheck_sdk/models/advisory_flag.py +++ b/vulncheck_sdk/models/advisory_flag.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryFlag(BaseModel): """ - AdvisoryFlag + advisory.Flag """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") group_ids: Optional[List[StrictStr]] = None label: Optional[StrictStr] = None product_ids: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_flatt_security.py b/vulncheck_sdk/models/advisory_flatt_security.py index c6a3688c..8d477fe3 100644 --- a/vulncheck_sdk/models/advisory_flatt_security.py +++ b/vulncheck_sdk/models/advisory_flatt_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFlattSecurity(BaseModel): """ - AdvisoryFlattSecurity + advisory.FlattSecurity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_forge_rock.py b/vulncheck_sdk/models/advisory_forge_rock.py index 16a9d93c..7fd494b6 100644 --- a/vulncheck_sdk/models/advisory_forge_rock.py +++ b/vulncheck_sdk/models/advisory_forge_rock.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryForgeRock(BaseModel): """ - AdvisoryForgeRock + advisory.ForgeRock """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_fortinet_advisory.py b/vulncheck_sdk/models/advisory_fortinet_advisory.py index ff1256cb..0f152d2c 100644 --- a/vulncheck_sdk/models/advisory_fortinet_advisory.py +++ b/vulncheck_sdk/models/advisory_fortinet_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFortinetAdvisory(BaseModel): """ - AdvisoryFortinetAdvisory + advisory.FortinetAdvisory """ # noqa: E501 acknowledgement: Optional[StrictStr] = None affected_products: Optional[List[StrictStr]] = Field(default=None, alias="affectedProducts") diff --git a/vulncheck_sdk/models/advisory_fortinet_ips.py b/vulncheck_sdk/models/advisory_fortinet_ips.py index aeaf5ccd..ed1a9313 100644 --- a/vulncheck_sdk/models/advisory_fortinet_ips.py +++ b/vulncheck_sdk/models/advisory_fortinet_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFortinetIPS(BaseModel): """ - AdvisoryFortinetIPS + advisory.FortinetIPS """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_foxit.py b/vulncheck_sdk/models/advisory_foxit.py index fa53a199..6803a5d9 100644 --- a/vulncheck_sdk/models/advisory_foxit.py +++ b/vulncheck_sdk/models/advisory_foxit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryFoxit(BaseModel): """ - AdvisoryFoxit + advisory.Foxit """ # noqa: E501 affected: Optional[List[AdvisoryFoxitAffected]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_foxit_affected.py b/vulncheck_sdk/models/advisory_foxit_affected.py index 83e4b3af..61d37561 100644 --- a/vulncheck_sdk/models/advisory_foxit_affected.py +++ b/vulncheck_sdk/models/advisory_foxit_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFoxitAffected(BaseModel): """ - AdvisoryFoxitAffected + advisory.FoxitAffected """ # noqa: E501 product: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_fresenius.py b/vulncheck_sdk/models/advisory_fresenius.py index 4aa1b097..00de2adb 100644 --- a/vulncheck_sdk/models/advisory_fresenius.py +++ b/vulncheck_sdk/models/advisory_fresenius.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryFresenius(BaseModel): """ - AdvisoryFresenius + advisory.Fresenius """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gallagher.py b/vulncheck_sdk/models/advisory_gallagher.py index 9c69b7a2..353e5e35 100644 --- a/vulncheck_sdk/models/advisory_gallagher.py +++ b/vulncheck_sdk/models/advisory_gallagher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGallagher(BaseModel): """ - AdvisoryGallagher + advisory.Gallagher """ # noqa: E501 active_exploitation: Optional[StrictBool] = Field(default=None, alias="activeExploitation") affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gcp.py b/vulncheck_sdk/models/advisory_gcp.py index c0d28f04..4fa8cb6e 100644 --- a/vulncheck_sdk/models/advisory_gcp.py +++ b/vulncheck_sdk/models/advisory_gcp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGCP(BaseModel): """ - AdvisoryGCP + advisory.GCP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ge_gas.py b/vulncheck_sdk/models/advisory_ge_gas.py index 5ed8411a..214f73d4 100644 --- a/vulncheck_sdk/models/advisory_ge_gas.py +++ b/vulncheck_sdk/models/advisory_ge_gas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGEGas(BaseModel): """ - AdvisoryGEGas + advisory.GEGas """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ge_healthcare_advisory.py b/vulncheck_sdk/models/advisory_ge_healthcare_advisory.py index e49cf833..6dda242d 100644 --- a/vulncheck_sdk/models/advisory_ge_healthcare_advisory.py +++ b/vulncheck_sdk/models/advisory_ge_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGEHealthcareAdvisory(BaseModel): """ - AdvisoryGEHealthcareAdvisory + advisory.GEHealthcareAdvisory """ # noqa: E501 base_score: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_gen.py b/vulncheck_sdk/models/advisory_gen.py index fe71ae21..fb4f2dc8 100644 --- a/vulncheck_sdk/models/advisory_gen.py +++ b/vulncheck_sdk/models/advisory_gen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGen(BaseModel): """ - AdvisoryGen + advisory.Gen """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_genetec.py b/vulncheck_sdk/models/advisory_genetec.py index 3269ee2f..3a0afb6f 100644 --- a/vulncheck_sdk/models/advisory_genetec.py +++ b/vulncheck_sdk/models/advisory_genetec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGenetec(BaseModel): """ - AdvisoryGenetec + advisory.Genetec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gh_advisory_json_lean.py b/vulncheck_sdk/models/advisory_gh_advisory_json_lean.py index 707a6c05..16618c9b 100644 --- a/vulncheck_sdk/models/advisory_gh_advisory_json_lean.py +++ b/vulncheck_sdk/models/advisory_gh_advisory_json_lean.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryGHAdvisoryJSONLean(BaseModel): """ - AdvisoryGHAdvisoryJSONLean + advisory.GHAdvisoryJSONLean """ # noqa: E501 classification: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_gh_cvss.py b/vulncheck_sdk/models/advisory_gh_cvss.py index b5d4af4e..e398d368 100644 --- a/vulncheck_sdk/models/advisory_gh_cvss.py +++ b/vulncheck_sdk/models/advisory_gh_cvss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHCvss(BaseModel): """ - AdvisoryGHCvss + advisory.GHCvss """ # noqa: E501 score: Optional[Union[StrictFloat, StrictInt]] = None vector_string: Optional[StrictStr] = Field(default=None, alias="vectorString") diff --git a/vulncheck_sdk/models/advisory_gh_identifier.py b/vulncheck_sdk/models/advisory_gh_identifier.py index 3eec14a4..ab32374d 100644 --- a/vulncheck_sdk/models/advisory_gh_identifier.py +++ b/vulncheck_sdk/models/advisory_gh_identifier.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHIdentifier(BaseModel): """ - AdvisoryGHIdentifier + advisory.GHIdentifier """ # noqa: E501 type: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gh_node.py b/vulncheck_sdk/models/advisory_gh_node.py index 311d6025..7de7d1fd 100644 --- a/vulncheck_sdk/models/advisory_gh_node.py +++ b/vulncheck_sdk/models/advisory_gh_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHNode(BaseModel): """ - AdvisoryGHNode + advisory.GHNode """ # noqa: E501 package: Optional[AdvisoryGHPackage] = None severity: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gh_package.py b/vulncheck_sdk/models/advisory_gh_package.py index b491a48d..3a68c0c8 100644 --- a/vulncheck_sdk/models/advisory_gh_package.py +++ b/vulncheck_sdk/models/advisory_gh_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHPackage(BaseModel): """ - AdvisoryGHPackage + advisory.GHPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gh_reference.py b/vulncheck_sdk/models/advisory_gh_reference.py index bcba2156..30fb64a0 100644 --- a/vulncheck_sdk/models/advisory_gh_reference.py +++ b/vulncheck_sdk/models/advisory_gh_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHReference(BaseModel): """ - AdvisoryGHReference + advisory.GHReference """ # noqa: E501 url: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["url"] diff --git a/vulncheck_sdk/models/advisory_gh_vulnerabilities.py b/vulncheck_sdk/models/advisory_gh_vulnerabilities.py index 4022932b..e3c53970 100644 --- a/vulncheck_sdk/models/advisory_gh_vulnerabilities.py +++ b/vulncheck_sdk/models/advisory_gh_vulnerabilities.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHVulnerabilities(BaseModel): """ - AdvisoryGHVulnerabilities + advisory.GHVulnerabilities """ # noqa: E501 nodes: Optional[List[AdvisoryGHNode]] = None total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") diff --git a/vulncheck_sdk/models/advisory_ghsa.py b/vulncheck_sdk/models/advisory_ghsa.py index 126ae83e..ef28f0c0 100644 --- a/vulncheck_sdk/models/advisory_ghsa.py +++ b/vulncheck_sdk/models/advisory_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHSA(BaseModel): """ - AdvisoryGHSA + advisory.GHSA """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_affected.py b/vulncheck_sdk/models/advisory_ghsa_affected.py index a2a7975e..37e0ee05 100644 --- a/vulncheck_sdk/models/advisory_ghsa_affected.py +++ b/vulncheck_sdk/models/advisory_ghsa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryGHSAAffected(BaseModel): """ - AdvisoryGHSAAffected + advisory.GHSAAffected """ # noqa: E501 ecosystem_specific: Optional[AdvisoryGHSAEcoSystemSpecific] = None package: Optional[AdvisoryGHSAPackage] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_database_specific.py b/vulncheck_sdk/models/advisory_ghsa_database_specific.py index 04973beb..b474eceb 100644 --- a/vulncheck_sdk/models/advisory_ghsa_database_specific.py +++ b/vulncheck_sdk/models/advisory_ghsa_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSADatabaseSpecific(BaseModel): """ - AdvisoryGHSADatabaseSpecific + advisory.GHSADatabaseSpecific """ # noqa: E501 cwe_ids: Optional[List[StrictStr]] = None github_reviewed: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_eco_system_specific.py b/vulncheck_sdk/models/advisory_ghsa_eco_system_specific.py index 6f3d5954..e08d3aae 100644 --- a/vulncheck_sdk/models/advisory_ghsa_eco_system_specific.py +++ b/vulncheck_sdk/models/advisory_ghsa_eco_system_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAEcoSystemSpecific(BaseModel): """ - AdvisoryGHSAEcoSystemSpecific + advisory.GHSAEcoSystemSpecific """ # noqa: E501 affected_functions: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["affected_functions"] diff --git a/vulncheck_sdk/models/advisory_ghsa_event.py b/vulncheck_sdk/models/advisory_ghsa_event.py index 6977cbab..f4188a08 100644 --- a/vulncheck_sdk/models/advisory_ghsa_event.py +++ b/vulncheck_sdk/models/advisory_ghsa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAEvent(BaseModel): """ - AdvisoryGHSAEvent + advisory.GHSAEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_package.py b/vulncheck_sdk/models/advisory_ghsa_package.py index 55b41de6..663d197e 100644 --- a/vulncheck_sdk/models/advisory_ghsa_package.py +++ b/vulncheck_sdk/models/advisory_ghsa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAPackage(BaseModel): """ - AdvisoryGHSAPackage + advisory.GHSAPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_range.py b/vulncheck_sdk/models/advisory_ghsa_range.py index 712f63d5..eef2f9ac 100644 --- a/vulncheck_sdk/models/advisory_ghsa_range.py +++ b/vulncheck_sdk/models/advisory_ghsa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGHSARange(BaseModel): """ - AdvisoryGHSARange + advisory.GHSARange """ # noqa: E501 events: Optional[List[AdvisoryGHSAEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_reference.py b/vulncheck_sdk/models/advisory_ghsa_reference.py index 08b26fbb..60decfcf 100644 --- a/vulncheck_sdk/models/advisory_ghsa_reference.py +++ b/vulncheck_sdk/models/advisory_ghsa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSAReference(BaseModel): """ - AdvisoryGHSAReference + advisory.GHSAReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ghsa_severity.py b/vulncheck_sdk/models/advisory_ghsa_severity.py index 500e4342..f3255b05 100644 --- a/vulncheck_sdk/models/advisory_ghsa_severity.py +++ b/vulncheck_sdk/models/advisory_ghsa_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGHSASeverity(BaseModel): """ - AdvisoryGHSASeverity + advisory.GHSASeverity """ # noqa: E501 score: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gigabyte.py b/vulncheck_sdk/models/advisory_gigabyte.py index fcb78765..425f2a12 100644 --- a/vulncheck_sdk/models/advisory_gigabyte.py +++ b/vulncheck_sdk/models/advisory_gigabyte.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGigabyte(BaseModel): """ - AdvisoryGigabyte + advisory.Gigabyte """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_git_hub_exploit.py b/vulncheck_sdk/models/advisory_git_hub_exploit.py index efa55cf5..d5845dbb 100644 --- a/vulncheck_sdk/models/advisory_git_hub_exploit.py +++ b/vulncheck_sdk/models/advisory_git_hub_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitHubExploit(BaseModel): """ - AdvisoryGitHubExploit + advisory.GitHubExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_git_lab_exploit.py b/vulncheck_sdk/models/advisory_git_lab_exploit.py index c4de6b9f..098953a5 100644 --- a/vulncheck_sdk/models/advisory_git_lab_exploit.py +++ b/vulncheck_sdk/models/advisory_git_lab_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitLabExploit(BaseModel): """ - AdvisoryGitLabExploit + advisory.GitLabExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gitee_exploit.py b/vulncheck_sdk/models/advisory_gitee_exploit.py index 1ae4e8e3..9d396d37 100644 --- a/vulncheck_sdk/models/advisory_gitee_exploit.py +++ b/vulncheck_sdk/models/advisory_gitee_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGiteeExploit(BaseModel): """ - AdvisoryGiteeExploit + advisory.GiteeExploit """ # noqa: E501 clone_https_url: Optional[StrictStr] = None clone_ssh_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_gitlab_advisory.py b/vulncheck_sdk/models/advisory_gitlab_advisory.py index a3216175..2a4e6034 100644 --- a/vulncheck_sdk/models/advisory_gitlab_advisory.py +++ b/vulncheck_sdk/models/advisory_gitlab_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGitlabAdvisory(BaseModel): """ - AdvisoryGitlabAdvisory + advisory.GitlabAdvisory """ # noqa: E501 affected_range: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None @@ -33,7 +33,7 @@ class AdvisoryGitlabAdvisory(BaseModel): cvss_v2: Optional[StrictStr] = None cvss_v3: Optional[StrictStr] = None cwe: Optional[List[StrictStr]] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None filename: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_glibc.py b/vulncheck_sdk/models/advisory_glibc.py index 8a13c5b4..89760f0f 100644 --- a/vulncheck_sdk/models/advisory_glibc.py +++ b/vulncheck_sdk/models/advisory_glibc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGlibc(BaseModel): """ - AdvisoryGlibc + advisory.Glibc """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_gmo_cyber_security.py b/vulncheck_sdk/models/advisory_gmo_cyber_security.py index 57a7789e..b94660ff 100644 --- a/vulncheck_sdk/models/advisory_gmo_cyber_security.py +++ b/vulncheck_sdk/models/advisory_gmo_cyber_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGMOCyberSecurity(BaseModel): """ - AdvisoryGMOCyberSecurity + advisory.GMOCyberSecurity """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_gnu_tls.py b/vulncheck_sdk/models/advisory_gnu_tls.py index a2686f55..40a895fb 100644 --- a/vulncheck_sdk/models/advisory_gnu_tls.py +++ b/vulncheck_sdk/models/advisory_gnu_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGnuTLS(BaseModel): """ - AdvisoryGnuTLS + advisory.GnuTLS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_go_credits.py b/vulncheck_sdk/models/advisory_go_credits.py index 57ce9e97..e697cca1 100644 --- a/vulncheck_sdk/models/advisory_go_credits.py +++ b/vulncheck_sdk/models/advisory_go_credits.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoCredits(BaseModel): """ - AdvisoryGoCredits + advisory.GoCredits """ # noqa: E501 name: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["name"] diff --git a/vulncheck_sdk/models/advisory_go_event.py b/vulncheck_sdk/models/advisory_go_event.py index 4b8c3d31..4c28ced8 100644 --- a/vulncheck_sdk/models/advisory_go_event.py +++ b/vulncheck_sdk/models/advisory_go_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoEvent(BaseModel): """ - AdvisoryGoEvent + advisory.GoEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_affected.py b/vulncheck_sdk/models/advisory_go_vuln_affected.py index 4752946d..a54e1a5d 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_affected.py +++ b/vulncheck_sdk/models/advisory_go_vuln_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryGoVulnAffected(BaseModel): """ - AdvisoryGoVulnAffected + advisory.GoVulnAffected """ # noqa: E501 database_specific: Optional[AdvisoryGoVulnDatabaseSpecific] = None ecosystem_specific: Optional[AdvisoryGoVulnEcosystemSpecific] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_database_specific.py b/vulncheck_sdk/models/advisory_go_vuln_database_specific.py index d8e93ac2..e365e90a 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_database_specific.py +++ b/vulncheck_sdk/models/advisory_go_vuln_database_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnDatabaseSpecific(BaseModel): """ - AdvisoryGoVulnDatabaseSpecific + advisory.GoVulnDatabaseSpecific """ # noqa: E501 url: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["url"] diff --git a/vulncheck_sdk/models/advisory_go_vuln_ecosystem_specific.py b/vulncheck_sdk/models/advisory_go_vuln_ecosystem_specific.py index e6cf633e..7b426cf9 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_ecosystem_specific.py +++ b/vulncheck_sdk/models/advisory_go_vuln_ecosystem_specific.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGoVulnEcosystemSpecific(BaseModel): """ - AdvisoryGoVulnEcosystemSpecific + advisory.GoVulnEcosystemSpecific """ # noqa: E501 imports: Optional[List[AdvisoryGoVulnImport]] = None __properties: ClassVar[List[str]] = ["imports"] diff --git a/vulncheck_sdk/models/advisory_go_vuln_import.py b/vulncheck_sdk/models/advisory_go_vuln_import.py index ebb925e8..f958aafc 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_import.py +++ b/vulncheck_sdk/models/advisory_go_vuln_import.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnImport(BaseModel): """ - AdvisoryGoVulnImport + advisory.GoVulnImport """ # noqa: E501 path: Optional[StrictStr] = None symbols: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_json.py b/vulncheck_sdk/models/advisory_go_vuln_json.py index 5ca214a3..4aa2129f 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_json.py +++ b/vulncheck_sdk/models/advisory_go_vuln_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryGoVulnJSON(BaseModel): """ - AdvisoryGoVulnJSON + advisory.GoVulnJSON """ # noqa: E501 advisory_url: Optional[StrictStr] = None affected: Optional[List[AdvisoryGoVulnAffected]] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_package.py b/vulncheck_sdk/models/advisory_go_vuln_package.py index ba33b8f7..0c2e16e9 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_package.py +++ b/vulncheck_sdk/models/advisory_go_vuln_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnPackage(BaseModel): """ - AdvisoryGoVulnPackage + advisory.GoVulnPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_ranges.py b/vulncheck_sdk/models/advisory_go_vuln_ranges.py index a7efec58..ec3b1f04 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_ranges.py +++ b/vulncheck_sdk/models/advisory_go_vuln_ranges.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGoVulnRanges(BaseModel): """ - AdvisoryGoVulnRanges + advisory.GoVulnRanges """ # noqa: E501 events: Optional[List[AdvisoryGoEvent]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_go_vuln_reference.py b/vulncheck_sdk/models/advisory_go_vuln_reference.py index 4ff91d8e..8f333156 100644 --- a/vulncheck_sdk/models/advisory_go_vuln_reference.py +++ b/vulncheck_sdk/models/advisory_go_vuln_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGoVulnReference(BaseModel): """ - AdvisoryGoVulnReference + advisory.GoVulnReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_grafana.py b/vulncheck_sdk/models/advisory_grafana.py index 525e6220..fe041d5a 100644 --- a/vulncheck_sdk/models/advisory_grafana.py +++ b/vulncheck_sdk/models/advisory_grafana.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGrafana(BaseModel): """ - AdvisoryGrafana + advisory.Grafana """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_grey_noise_detection.py b/vulncheck_sdk/models/advisory_grey_noise_detection.py index 8d11361d..52302f59 100644 --- a/vulncheck_sdk/models/advisory_grey_noise_detection.py +++ b/vulncheck_sdk/models/advisory_grey_noise_detection.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryGreyNoiseDetection(BaseModel): """ - AdvisoryGreyNoiseDetection + advisory.GreyNoiseDetection """ # noqa: E501 category: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_grey_noise_tags.py b/vulncheck_sdk/models/advisory_grey_noise_tags.py index 9014ce03..0defaf17 100644 --- a/vulncheck_sdk/models/advisory_grey_noise_tags.py +++ b/vulncheck_sdk/models/advisory_grey_noise_tags.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryGreyNoiseTags(BaseModel): """ - AdvisoryGreyNoiseTags + advisory.GreyNoiseTags """ # noqa: E501 category: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hacktivity.py b/vulncheck_sdk/models/advisory_hacktivity.py index 2c3422d4..5458fc46 100644 --- a/vulncheck_sdk/models/advisory_hacktivity.py +++ b/vulncheck_sdk/models/advisory_hacktivity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHacktivity(BaseModel): """ - AdvisoryHacktivity + advisory.Hacktivity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hardware_update.py b/vulncheck_sdk/models/advisory_hardware_update.py index 139bb918..aad397aa 100644 --- a/vulncheck_sdk/models/advisory_hardware_update.py +++ b/vulncheck_sdk/models/advisory_hardware_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHardwareUpdate(BaseModel): """ - AdvisoryHardwareUpdate + advisory.HardwareUpdate """ # noqa: E501 affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_harmony_os.py b/vulncheck_sdk/models/advisory_harmony_os.py index 83390d53..f6ac834d 100644 --- a/vulncheck_sdk/models/advisory_harmony_os.py +++ b/vulncheck_sdk/models/advisory_harmony_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHarmonyOS(BaseModel): """ - AdvisoryHarmonyOS + advisory.HarmonyOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hashi_corp.py b/vulncheck_sdk/models/advisory_hashi_corp.py index 2247ab13..38109e99 100644 --- a/vulncheck_sdk/models/advisory_hashi_corp.py +++ b/vulncheck_sdk/models/advisory_hashi_corp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHashiCorp(BaseModel): """ - AdvisoryHashiCorp + advisory.HashiCorp """ # noqa: E501 affected_products: Optional[StrictStr] = None background: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_haskell_affected.py b/vulncheck_sdk/models/advisory_haskell_affected.py index 9338ec81..70014b86 100644 --- a/vulncheck_sdk/models/advisory_haskell_affected.py +++ b/vulncheck_sdk/models/advisory_haskell_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryHaskellAffected(BaseModel): """ - AdvisoryHaskellAffected + advisory.HaskellAffected """ # noqa: E501 affected_constraint: Optional[StrictStr] = None affected_versions: Optional[List[AdvisoryHaskellVersion]] = None diff --git a/vulncheck_sdk/models/advisory_haskell_sadb_advisory.py b/vulncheck_sdk/models/advisory_haskell_sadb_advisory.py index 3b6a2d0e..7ba0f281 100644 --- a/vulncheck_sdk/models/advisory_haskell_sadb_advisory.py +++ b/vulncheck_sdk/models/advisory_haskell_sadb_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryHaskellSADBAdvisory(BaseModel): """ - AdvisoryHaskellSADBAdvisory + advisory.HaskellSADBAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_packages: Optional[List[AdvisoryHaskellAffected]] = None diff --git a/vulncheck_sdk/models/advisory_haskell_version.py b/vulncheck_sdk/models/advisory_haskell_version.py index 8fc12bc5..bd9ea93b 100644 --- a/vulncheck_sdk/models/advisory_haskell_version.py +++ b/vulncheck_sdk/models/advisory_haskell_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHaskellVersion(BaseModel): """ - AdvisoryHaskellVersion + advisory.HaskellVersion """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hcl.py b/vulncheck_sdk/models/advisory_hcl.py index 0ef412c6..d90c838d 100644 --- a/vulncheck_sdk/models/advisory_hcl.py +++ b/vulncheck_sdk/models/advisory_hcl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHCL(BaseModel): """ - AdvisoryHCL + advisory.HCL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hik_vision.py b/vulncheck_sdk/models/advisory_hik_vision.py index a6a2a2e2..c67d99f6 100644 --- a/vulncheck_sdk/models/advisory_hik_vision.py +++ b/vulncheck_sdk/models/advisory_hik_vision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHIKVision(BaseModel): """ - AdvisoryHIKVision + advisory.HIKVision """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_hillrom_advisory.py b/vulncheck_sdk/models/advisory_hillrom_advisory.py index 7137d068..1c9b5f40 100644 --- a/vulncheck_sdk/models/advisory_hillrom_advisory.py +++ b/vulncheck_sdk/models/advisory_hillrom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHillromAdvisory(BaseModel): """ - AdvisoryHillromAdvisory + advisory.HillromAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_hitachi.py b/vulncheck_sdk/models/advisory_hitachi.py index 9b4202b1..35b43d00 100644 --- a/vulncheck_sdk/models/advisory_hitachi.py +++ b/vulncheck_sdk/models/advisory_hitachi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHitachi(BaseModel): """ - AdvisoryHitachi + advisory.Hitachi """ # noqa: E501 affected_products: Optional[StrictStr] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_hitachi_energy.py b/vulncheck_sdk/models/advisory_hitachi_energy.py index d59c6fa0..4865a8e6 100644 --- a/vulncheck_sdk/models/advisory_hitachi_energy.py +++ b/vulncheck_sdk/models/advisory_hitachi_energy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHitachiEnergy(BaseModel): """ - AdvisoryHitachiEnergy + advisory.HitachiEnergy """ # noqa: E501 advisory_id: Optional[StrictStr] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hk_cert.py b/vulncheck_sdk/models/advisory_hk_cert.py index 67a86de0..5d428435 100644 --- a/vulncheck_sdk/models/advisory_hk_cert.py +++ b/vulncheck_sdk/models/advisory_hk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHKCert(BaseModel): """ - AdvisoryHKCert + advisory.HKCert """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_hms.py b/vulncheck_sdk/models/advisory_hms.py index 099d6659..2ab8b030 100644 --- a/vulncheck_sdk/models/advisory_hms.py +++ b/vulncheck_sdk/models/advisory_hms.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHMS(BaseModel): """ - AdvisoryHMS + advisory.HMS """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_honeywell.py b/vulncheck_sdk/models/advisory_honeywell.py index 9f56e04e..bfa9528c 100644 --- a/vulncheck_sdk/models/advisory_honeywell.py +++ b/vulncheck_sdk/models/advisory_honeywell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHoneywell(BaseModel): """ - AdvisoryHoneywell + advisory.Honeywell """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hp.py b/vulncheck_sdk/models/advisory_hp.py index 51857400..41cc8cad 100644 --- a/vulncheck_sdk/models/advisory_hp.py +++ b/vulncheck_sdk/models/advisory_hp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHP(BaseModel): """ - AdvisoryHP + advisory.HP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_hpe.py b/vulncheck_sdk/models/advisory_hpe.py index 97a307a2..d9b1e1d0 100644 --- a/vulncheck_sdk/models/advisory_hpe.py +++ b/vulncheck_sdk/models/advisory_hpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHPE(BaseModel): """ - AdvisoryHPE + advisory.HPE """ # noqa: E501 csaf: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_huawei.py b/vulncheck_sdk/models/advisory_huawei.py index b78655bb..3d3a3554 100644 --- a/vulncheck_sdk/models/advisory_huawei.py +++ b/vulncheck_sdk/models/advisory_huawei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuawei(BaseModel): """ - AdvisoryHuawei + advisory.Huawei """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_huawei_euler_os.py b/vulncheck_sdk/models/advisory_huawei_euler_os.py index 91f2a608..37ecc211 100644 --- a/vulncheck_sdk/models/advisory_huawei_euler_os.py +++ b/vulncheck_sdk/models/advisory_huawei_euler_os.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuaweiEulerOS(BaseModel): """ - AdvisoryHuaweiEulerOS + advisory.HuaweiEulerOS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_huawei_ips.py b/vulncheck_sdk/models/advisory_huawei_ips.py index 003c50fe..b727eb96 100644 --- a/vulncheck_sdk/models/advisory_huawei_ips.py +++ b/vulncheck_sdk/models/advisory_huawei_ips.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryHuaweiIPS(BaseModel): """ - AdvisoryHuaweiIPS + advisory.HuaweiIPS """ # noqa: E501 cnnvd: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_i_val.py b/vulncheck_sdk/models/advisory_i_val.py index 48694de2..659ba04c 100644 --- a/vulncheck_sdk/models/advisory_i_val.py +++ b/vulncheck_sdk/models/advisory_i_val.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIVal(BaseModel): """ - AdvisoryIVal + advisory.IVal """ # noqa: E501 value: Optional[StrictStr] = Field(default=None, alias="Value") __properties: ClassVar[List[str]] = ["Value"] diff --git a/vulncheck_sdk/models/advisory_iava.py b/vulncheck_sdk/models/advisory_iava.py index f3fff991..c22eb817 100644 --- a/vulncheck_sdk/models/advisory_iava.py +++ b/vulncheck_sdk/models/advisory_iava.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIAVA(BaseModel): """ - AdvisoryIAVA + advisory.IAVA """ # noqa: E501 iava: Optional[StrictStr] = Field(default=None, alias="IAVA") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ibm.py b/vulncheck_sdk/models/advisory_ibm.py index e460a43f..5ded7f4c 100644 --- a/vulncheck_sdk/models/advisory_ibm.py +++ b/vulncheck_sdk/models/advisory_ibm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIBM(BaseModel): """ - AdvisoryIBM + advisory.IBM """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_idemia.py b/vulncheck_sdk/models/advisory_idemia.py index 09102042..944a229d 100644 --- a/vulncheck_sdk/models/advisory_idemia.py +++ b/vulncheck_sdk/models/advisory_idemia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIdemia(BaseModel): """ - AdvisoryIdemia + advisory.Idemia """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_igel.py b/vulncheck_sdk/models/advisory_igel.py index 9d06653e..1d34ea2e 100644 --- a/vulncheck_sdk/models/advisory_igel.py +++ b/vulncheck_sdk/models/advisory_igel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIgel(BaseModel): """ - AdvisoryIgel + advisory.Igel """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_impact.py b/vulncheck_sdk/models/advisory_impact.py index 6d12f1bc..fd55c6f3 100644 --- a/vulncheck_sdk/models/advisory_impact.py +++ b/vulncheck_sdk/models/advisory_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryImpact(BaseModel): """ - AdvisoryImpact + advisory.Impact """ # noqa: E501 capec_id: Optional[StrictStr] = Field(default=None, alias="capecId") descriptions: Optional[List[AdvisoryMDescriptions]] = None diff --git a/vulncheck_sdk/models/advisory_incibe_advisory.py b/vulncheck_sdk/models/advisory_incibe_advisory.py index efb724ab..8f9fcd4d 100644 --- a/vulncheck_sdk/models/advisory_incibe_advisory.py +++ b/vulncheck_sdk/models/advisory_incibe_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIncibeAdvisory(BaseModel): """ - AdvisoryIncibeAdvisory + advisory.IncibeAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_intel.py b/vulncheck_sdk/models/advisory_intel.py index 7612d313..84bf7d87 100644 --- a/vulncheck_sdk/models/advisory_intel.py +++ b/vulncheck_sdk/models/advisory_intel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIntel(BaseModel): """ - AdvisoryIntel + advisory.Intel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ip_intel_record.py b/vulncheck_sdk/models/advisory_ip_intel_record.py index aa82128a..e5491d9d 100644 --- a/vulncheck_sdk/models/advisory_ip_intel_record.py +++ b/vulncheck_sdk/models/advisory_ip_intel_record.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryIpIntelRecord(BaseModel): """ - AdvisoryIpIntelRecord + advisory.IpIntelRecord """ # noqa: E501 asn: Optional[StrictStr] = None city: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_israeli_alert.py b/vulncheck_sdk/models/advisory_israeli_alert.py index dd71b3e6..678772be 100644 --- a/vulncheck_sdk/models/advisory_israeli_alert.py +++ b/vulncheck_sdk/models/advisory_israeli_alert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIsraeliAlert(BaseModel): """ - AdvisoryIsraeliAlert + advisory.IsraeliAlert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_israeli_vulnerability.py b/vulncheck_sdk/models/advisory_israeli_vulnerability.py index 43dd71e2..473101da 100644 --- a/vulncheck_sdk/models/advisory_israeli_vulnerability.py +++ b/vulncheck_sdk/models/advisory_israeli_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIsraeliVulnerability(BaseModel): """ - AdvisoryIsraeliVulnerability + advisory.IsraeliVulnerability """ # noqa: E501 ilvnid: Optional[StrictStr] = Field(default=None, alias="ILVNId") affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_issued.py b/vulncheck_sdk/models/advisory_issued.py deleted file mode 100644 index 13353408..00000000 --- a/vulncheck_sdk/models/advisory_issued.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryIssued(BaseModel): - """ - AdvisoryIssued - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_istio.py b/vulncheck_sdk/models/advisory_istio.py index af1cf211..ce351762 100644 --- a/vulncheck_sdk/models/advisory_istio.py +++ b/vulncheck_sdk/models/advisory_istio.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIstio(BaseModel): """ - AdvisoryIstio + advisory.Istio """ # noqa: E501 affected_version: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_itw.py b/vulncheck_sdk/models/advisory_itw.py index 63760634..cddb61a5 100644 --- a/vulncheck_sdk/models/advisory_itw.py +++ b/vulncheck_sdk/models/advisory_itw.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryITW(BaseModel): """ - AdvisoryITW + advisory.ITW """ # noqa: E501 cve: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_itw_exploit.py b/vulncheck_sdk/models/advisory_itw_exploit.py index 31265cd6..dfe0d6d6 100644 --- a/vulncheck_sdk/models/advisory_itw_exploit.py +++ b/vulncheck_sdk/models/advisory_itw_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryITWExploit(BaseModel): """ - AdvisoryITWExploit + advisory.ITWExploit """ # noqa: E501 advisory: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ivanti.py b/vulncheck_sdk/models/advisory_ivanti.py index 1771642c..2bc05076 100644 --- a/vulncheck_sdk/models/advisory_ivanti.py +++ b/vulncheck_sdk/models/advisory_ivanti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIvanti(BaseModel): """ - AdvisoryIvanti + advisory.Ivanti """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ivanti_rss.py b/vulncheck_sdk/models/advisory_ivanti_rss.py index 42530021..6dd7184c 100644 --- a/vulncheck_sdk/models/advisory_ivanti_rss.py +++ b/vulncheck_sdk/models/advisory_ivanti_rss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryIvantiRSS(BaseModel): """ - AdvisoryIvantiRSS + advisory.IvantiRSS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_j_frog.py b/vulncheck_sdk/models/advisory_j_frog.py index d3807d0b..397daaaa 100644 --- a/vulncheck_sdk/models/advisory_j_frog.py +++ b/vulncheck_sdk/models/advisory_j_frog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryJFrog(BaseModel): """ - AdvisoryJFrog + advisory.JFrog """ # noqa: E501 cpes: Optional[List[AdvisoryNVD20CVECPEMatch]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_jenkins.py b/vulncheck_sdk/models/advisory_jenkins.py index bad0969f..253f9983 100644 --- a/vulncheck_sdk/models/advisory_jenkins.py +++ b/vulncheck_sdk/models/advisory_jenkins.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJenkins(BaseModel): """ - AdvisoryJenkins + advisory.Jenkins """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_jet_brains.py b/vulncheck_sdk/models/advisory_jet_brains.py index 672ab6bb..9466b28f 100644 --- a/vulncheck_sdk/models/advisory_jet_brains.py +++ b/vulncheck_sdk/models/advisory_jet_brains.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJetBrains(BaseModel): """ - AdvisoryJetBrains + advisory.JetBrains """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_jnj_advisory.py b/vulncheck_sdk/models/advisory_jnj_advisory.py index 49e78200..9c9ecaee 100644 --- a/vulncheck_sdk/models/advisory_jnj_advisory.py +++ b/vulncheck_sdk/models/advisory_jnj_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJNJAdvisory(BaseModel): """ - AdvisoryJNJAdvisory + advisory.JNJAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_johnson_controls.py b/vulncheck_sdk/models/advisory_johnson_controls.py index b432bfbd..78e8dcb3 100644 --- a/vulncheck_sdk/models/advisory_johnson_controls.py +++ b/vulncheck_sdk/models/advisory_johnson_controls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJohnsonControls(BaseModel): """ - AdvisoryJohnsonControls + advisory.JohnsonControls """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_juniper.py b/vulncheck_sdk/models/advisory_juniper.py index 5709f5c1..fd68ead0 100644 --- a/vulncheck_sdk/models/advisory_juniper.py +++ b/vulncheck_sdk/models/advisory_juniper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJuniper(BaseModel): """ - AdvisoryJuniper + advisory.Juniper """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_jvn.py b/vulncheck_sdk/models/advisory_jvn.py index 6780e152..818f790c 100644 --- a/vulncheck_sdk/models/advisory_jvn.py +++ b/vulncheck_sdk/models/advisory_jvn.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVN(BaseModel): """ - AdvisoryJVN + advisory.JVN """ # noqa: E501 affected_en: Optional[StrictStr] = None affected_ja: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_jvn_advisory_item.py b/vulncheck_sdk/models/advisory_jvn_advisory_item.py index 9aae1aea..b8027beb 100644 --- a/vulncheck_sdk/models/advisory_jvn_advisory_item.py +++ b/vulncheck_sdk/models/advisory_jvn_advisory_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryJVNAdvisoryItem(BaseModel): """ - AdvisoryJVNAdvisoryItem + advisory.JVNAdvisoryItem """ # noqa: E501 cpe: Optional[List[AdvisoryJVNCPE]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_jvn_reference.py b/vulncheck_sdk/models/advisory_jvn_reference.py index e9c3929b..6ef362cb 100644 --- a/vulncheck_sdk/models/advisory_jvn_reference.py +++ b/vulncheck_sdk/models/advisory_jvn_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVNReference(BaseModel): """ - AdvisoryJVNReference + advisory.JVNReference """ # noqa: E501 id: Optional[StrictStr] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_jvncpe.py b/vulncheck_sdk/models/advisory_jvncpe.py index 39705f7f..2bcf8b5f 100644 --- a/vulncheck_sdk/models/advisory_jvncpe.py +++ b/vulncheck_sdk/models/advisory_jvncpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryJVNCPE(BaseModel): """ - AdvisoryJVNCPE + advisory.JVNCPE """ # noqa: E501 cpe: Optional[StrictStr] = None product: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_k8_s.py b/vulncheck_sdk/models/advisory_k8_s.py index d4ee7573..42a86ca9 100644 --- a/vulncheck_sdk/models/advisory_k8_s.py +++ b/vulncheck_sdk/models/advisory_k8_s.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryK8S(BaseModel): """ - AdvisoryK8S + advisory.K8S """ # noqa: E501 content: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_kaspersky_icscert_advisory.py b/vulncheck_sdk/models/advisory_kaspersky_icscert_advisory.py index e58e1f09..78e09eda 100644 --- a/vulncheck_sdk/models/advisory_kaspersky_icscert_advisory.py +++ b/vulncheck_sdk/models/advisory_kaspersky_icscert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKasperskyICSCERTAdvisory(BaseModel): """ - AdvisoryKasperskyICSCERTAdvisory + advisory.KasperskyICSCERTAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_kb.py b/vulncheck_sdk/models/advisory_kb.py index 73ed6f3c..cc790f3f 100644 --- a/vulncheck_sdk/models/advisory_kb.py +++ b/vulncheck_sdk/models/advisory_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKb(BaseModel): """ - AdvisoryKb + advisory.Kb """ # noqa: E501 kb_url: Optional[StrictStr] = None ms_date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_kb_threat_description.py b/vulncheck_sdk/models/advisory_kb_threat_description.py index cb723947..5ec393c0 100644 --- a/vulncheck_sdk/models/advisory_kb_threat_description.py +++ b/vulncheck_sdk/models/advisory_kb_threat_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKbThreatDescription(BaseModel): """ - AdvisoryKbThreatDescription + advisory.KbThreatDescription """ # noqa: E501 dos: Optional[StrictStr] = None exploited: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_kev_catalog_vulnerability.py b/vulncheck_sdk/models/advisory_kev_catalog_vulnerability.py index 5bddd31e..7304d1cc 100644 --- a/vulncheck_sdk/models/advisory_kev_catalog_vulnerability.py +++ b/vulncheck_sdk/models/advisory_kev_catalog_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKEVCatalogVulnerability(BaseModel): """ - AdvisoryKEVCatalogVulnerability + advisory.KEVCatalogVulnerability """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwes: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_kore_logic.py b/vulncheck_sdk/models/advisory_kore_logic.py index 14b7b8fa..4890f72d 100644 --- a/vulncheck_sdk/models/advisory_kore_logic.py +++ b/vulncheck_sdk/models/advisory_kore_logic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKoreLogic(BaseModel): """ - AdvisoryKoreLogic + advisory.KoreLogic """ # noqa: E501 affected_product: Optional[StrictStr] = None affected_vendor: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_kr_cert_advisory.py b/vulncheck_sdk/models/advisory_kr_cert_advisory.py index 9dd89932..39103df1 100644 --- a/vulncheck_sdk/models/advisory_kr_cert_advisory.py +++ b/vulncheck_sdk/models/advisory_kr_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKRCertAdvisory(BaseModel): """ - AdvisoryKRCertAdvisory + advisory.KRCertAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_kunbus.py b/vulncheck_sdk/models/advisory_kunbus.py index 5614b0d2..e844fedf 100644 --- a/vulncheck_sdk/models/advisory_kunbus.py +++ b/vulncheck_sdk/models/advisory_kunbus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryKunbus(BaseModel): """ - AdvisoryKunbus + advisory.Kunbus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_lantronix.py b/vulncheck_sdk/models/advisory_lantronix.py index 38b26395..13c103df 100644 --- a/vulncheck_sdk/models/advisory_lantronix.py +++ b/vulncheck_sdk/models/advisory_lantronix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLantronix(BaseModel): """ - AdvisoryLantronix + advisory.Lantronix """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_lenovo.py b/vulncheck_sdk/models/advisory_lenovo.py index ed1a65de..8d89c8f3 100644 --- a/vulncheck_sdk/models/advisory_lenovo.py +++ b/vulncheck_sdk/models/advisory_lenovo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLenovo(BaseModel): """ - AdvisoryLenovo + advisory.Lenovo """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_lexmark_advisory.py b/vulncheck_sdk/models/advisory_lexmark_advisory.py index cd474d7d..24dd5da5 100644 --- a/vulncheck_sdk/models/advisory_lexmark_advisory.py +++ b/vulncheck_sdk/models/advisory_lexmark_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryLexmarkAdvisory(BaseModel): """ - AdvisoryLexmarkAdvisory + advisory.LexmarkAdvisory """ # noqa: E501 affected_products: Optional[List[AdvisoryAffectedProduct]] = Field(default=None, alias="affectedProducts") cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_lg.py b/vulncheck_sdk/models/advisory_lg.py index 053d568f..5c9df1fa 100644 --- a/vulncheck_sdk/models/advisory_lg.py +++ b/vulncheck_sdk/models/advisory_lg.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLG(BaseModel): """ - AdvisoryLG + advisory.LG """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_libre_office.py b/vulncheck_sdk/models/advisory_libre_office.py index 6c556dd8..cbf41670 100644 --- a/vulncheck_sdk/models/advisory_libre_office.py +++ b/vulncheck_sdk/models/advisory_libre_office.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLibreOffice(BaseModel): """ - AdvisoryLibreOffice + advisory.LibreOffice """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_linux.py b/vulncheck_sdk/models/advisory_linux.py index a224ff7e..c53b5075 100644 --- a/vulncheck_sdk/models/advisory_linux.py +++ b/vulncheck_sdk/models/advisory_linux.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLinux(BaseModel): """ - AdvisoryLinux + advisory.Linux """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_log_source.py b/vulncheck_sdk/models/advisory_log_source.py index 5b6db587..1b0fd43b 100644 --- a/vulncheck_sdk/models/advisory_log_source.py +++ b/vulncheck_sdk/models/advisory_log_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryLogSource(BaseModel): """ - AdvisoryLogSource + advisory.LogSource """ # noqa: E501 category: Optional[StrictStr] = None definition: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_lol_advs.py b/vulncheck_sdk/models/advisory_lol_advs.py index a32b6eb9..28fb0513 100644 --- a/vulncheck_sdk/models/advisory_lol_advs.py +++ b/vulncheck_sdk/models/advisory_lol_advs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,13 +25,13 @@ class AdvisoryLolAdvs(BaseModel): """ - AdvisoryLolAdvs + advisory.LolAdvs """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None - lol_json: Optional[Dict[str, Dict[str, Any]]] = None + lol_json: Optional[Dict[str, Any]] = None mitre_id: Optional[StrictStr] = None references: Optional[List[StrictStr]] = None updated_at: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_m_affected.py b/vulncheck_sdk/models/advisory_m_affected.py index bc03047c..95ae5f9e 100644 --- a/vulncheck_sdk/models/advisory_m_affected.py +++ b/vulncheck_sdk/models/advisory_m_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMAffected(BaseModel): """ - AdvisoryMAffected + advisory.MAffected """ # noqa: E501 collection_url: Optional[StrictStr] = Field(default=None, alias="collectionURL") cpes: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_m_branch.py b/vulncheck_sdk/models/advisory_m_branch.py index 4806e5c6..9a64a003 100644 --- a/vulncheck_sdk/models/advisory_m_branch.py +++ b/vulncheck_sdk/models/advisory_m_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMBranch(BaseModel): """ - AdvisoryMBranch + advisory.MBranch """ # noqa: E501 branch: Optional[List[AdvisoryMBranch]] = Field(default=None, alias="Branch") full_product_name: Optional[List[AdvisoryMFullProductName]] = Field(default=None, alias="FullProductName") diff --git a/vulncheck_sdk/models/advisory_m_cna.py b/vulncheck_sdk/models/advisory_m_cna.py index ac718970..ec01320e 100644 --- a/vulncheck_sdk/models/advisory_m_cna.py +++ b/vulncheck_sdk/models/advisory_m_cna.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -35,7 +35,7 @@ class AdvisoryMCna(BaseModel): """ - AdvisoryMCna + advisory.MCna """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None cpe_applicability: Optional[List[AdvisoryMCPEApplicability]] = Field(default=None, alias="cpeApplicability") diff --git a/vulncheck_sdk/models/advisory_m_containers.py b/vulncheck_sdk/models/advisory_m_containers.py index f71af0d3..04cdef56 100644 --- a/vulncheck_sdk/models/advisory_m_containers.py +++ b/vulncheck_sdk/models/advisory_m_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMContainers(BaseModel): """ - AdvisoryMContainers + advisory.MContainers """ # noqa: E501 adp: Optional[List[AdvisoryADPContainer]] = None cna: Optional[AdvisoryMCna] = None diff --git a/vulncheck_sdk/models/advisory_m_cve_metadata.py b/vulncheck_sdk/models/advisory_m_cve_metadata.py index 6fff1111..4d5b902e 100644 --- a/vulncheck_sdk/models/advisory_m_cve_metadata.py +++ b/vulncheck_sdk/models/advisory_m_cve_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCveMetadata(BaseModel): """ - AdvisoryMCveMetadata + advisory.MCveMetadata """ # noqa: E501 assigner_org_id: Optional[StrictStr] = Field(default=None, alias="assignerOrgId") assigner_short_name: Optional[StrictStr] = Field(default=None, alias="assignerShortName") diff --git a/vulncheck_sdk/models/advisory_m_cvss_v20.py b/vulncheck_sdk/models/advisory_m_cvss_v20.py index b900566f..ecd982ab 100644 --- a/vulncheck_sdk/models/advisory_m_cvss_v20.py +++ b/vulncheck_sdk/models/advisory_m_cvss_v20.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV20(BaseModel): """ - AdvisoryMCvssV20 + advisory.MCvssV20 """ # noqa: E501 access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") diff --git a/vulncheck_sdk/models/advisory_m_cvss_v30.py b/vulncheck_sdk/models/advisory_m_cvss_v30.py index e3b3a204..10654828 100644 --- a/vulncheck_sdk/models/advisory_m_cvss_v30.py +++ b/vulncheck_sdk/models/advisory_m_cvss_v30.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV30(BaseModel): """ - AdvisoryMCvssV30 + advisory.MCvssV30 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/models/advisory_m_cvss_v31.py b/vulncheck_sdk/models/advisory_m_cvss_v31.py index 6dfa1c7a..c21df0ca 100644 --- a/vulncheck_sdk/models/advisory_m_cvss_v31.py +++ b/vulncheck_sdk/models/advisory_m_cvss_v31.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV31(BaseModel): """ - AdvisoryMCvssV31 + advisory.MCvssV31 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/models/advisory_m_cvss_v40.py b/vulncheck_sdk/models/advisory_m_cvss_v40.py index 467409f2..35b7cffe 100644 --- a/vulncheck_sdk/models/advisory_m_cvss_v40.py +++ b/vulncheck_sdk/models/advisory_m_cvss_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCvssV40(BaseModel): """ - AdvisoryMCvssV40 + advisory.MCvssV40 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_requirements: Optional[StrictStr] = Field(default=None, alias="attackRequirements") diff --git a/vulncheck_sdk/models/advisory_m_descriptions.py b/vulncheck_sdk/models/advisory_m_descriptions.py index 6594d4ff..56367415 100644 --- a/vulncheck_sdk/models/advisory_m_descriptions.py +++ b/vulncheck_sdk/models/advisory_m_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMDescriptions(BaseModel): """ - AdvisoryMDescriptions + advisory.MDescriptions """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_m_document_tracking.py b/vulncheck_sdk/models/advisory_m_document_tracking.py index 0de8fe0e..7b5611d8 100644 --- a/vulncheck_sdk/models/advisory_m_document_tracking.py +++ b/vulncheck_sdk/models/advisory_m_document_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMDocumentTracking(BaseModel): """ - AdvisoryMDocumentTracking + advisory.MDocumentTracking """ # noqa: E501 current_release_date: Optional[StrictStr] = Field(default=None, alias="CurrentReleaseDate") initial_release_date: Optional[StrictStr] = Field(default=None, alias="InitialReleaseDate") diff --git a/vulncheck_sdk/models/advisory_m_files.py b/vulncheck_sdk/models/advisory_m_files.py index 21bf7f5d..a71b144b 100644 --- a/vulncheck_sdk/models/advisory_m_files.py +++ b/vulncheck_sdk/models/advisory_m_files.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMFiles(BaseModel): """ - AdvisoryMFiles + advisory.MFiles """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_m_full_product_name.py b/vulncheck_sdk/models/advisory_m_full_product_name.py index 99ecf91d..53d7ae14 100644 --- a/vulncheck_sdk/models/advisory_m_full_product_name.py +++ b/vulncheck_sdk/models/advisory_m_full_product_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMFullProductName(BaseModel): """ - AdvisoryMFullProductName + advisory.MFullProductName """ # noqa: E501 cpe: Optional[StrictStr] = Field(default=None, alias="CPE") product_id: Optional[StrictStr] = Field(default=None, alias="ProductID") diff --git a/vulncheck_sdk/models/advisory_m_identification.py b/vulncheck_sdk/models/advisory_m_identification.py index 2a5eef59..ed70eee6 100644 --- a/vulncheck_sdk/models/advisory_m_identification.py +++ b/vulncheck_sdk/models/advisory_m_identification.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMIdentification(BaseModel): """ - AdvisoryMIdentification + advisory.MIdentification """ # noqa: E501 alias: Optional[AdvisoryIVal] = None id: Optional[AdvisoryIVal] = None diff --git a/vulncheck_sdk/models/advisory_m_item.py b/vulncheck_sdk/models/advisory_m_item.py index 8029888f..d02d098b 100644 --- a/vulncheck_sdk/models/advisory_m_item.py +++ b/vulncheck_sdk/models/advisory_m_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMItem(BaseModel): """ - AdvisoryMItem + advisory.MItem """ # noqa: E501 items: Optional[List[AdvisoryMItem]] = Field(default=None, alias="Items") name: Optional[StrictStr] = Field(default=None, alias="Name") diff --git a/vulncheck_sdk/models/advisory_m_nodes.py b/vulncheck_sdk/models/advisory_m_nodes.py index 89044ce9..d8531f54 100644 --- a/vulncheck_sdk/models/advisory_m_nodes.py +++ b/vulncheck_sdk/models/advisory_m_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMNodes(BaseModel): """ - AdvisoryMNodes + advisory.MNodes """ # noqa: E501 cpe_match: Optional[List[AdvisoryMCPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/advisory_m_problem_types.py b/vulncheck_sdk/models/advisory_m_problem_types.py index 3e97b1bd..9d8d9c62 100644 --- a/vulncheck_sdk/models/advisory_m_problem_types.py +++ b/vulncheck_sdk/models/advisory_m_problem_types.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMProblemTypes(BaseModel): """ - AdvisoryMProblemTypes + advisory.MProblemTypes """ # noqa: E501 descriptions: Optional[List[AdvisoryPTMDescriptions]] = None __properties: ClassVar[List[str]] = ["descriptions"] diff --git a/vulncheck_sdk/models/advisory_m_product_status.py b/vulncheck_sdk/models/advisory_m_product_status.py index 2941dc98..d0a328cb 100644 --- a/vulncheck_sdk/models/advisory_m_product_status.py +++ b/vulncheck_sdk/models/advisory_m_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMProductStatus(BaseModel): """ - AdvisoryMProductStatus + advisory.MProductStatus """ # noqa: E501 product_id: Optional[List[StrictStr]] = Field(default=None, alias="ProductID") type: Optional[StrictInt] = Field(default=None, description="diff") diff --git a/vulncheck_sdk/models/advisory_m_product_tree.py b/vulncheck_sdk/models/advisory_m_product_tree.py index bbb3a5d3..bc743260 100644 --- a/vulncheck_sdk/models/advisory_m_product_tree.py +++ b/vulncheck_sdk/models/advisory_m_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMProductTree(BaseModel): """ - AdvisoryMProductTree + advisory.MProductTree """ # noqa: E501 branch: Optional[List[AdvisoryMBranch]] = Field(default=None, alias="Branch") full_product_name: Optional[List[AdvisoryMFullProductName]] = Field(default=None, alias="FullProductName") diff --git a/vulncheck_sdk/models/advisory_m_provider_metadata.py b/vulncheck_sdk/models/advisory_m_provider_metadata.py index 4db58079..33947bd5 100644 --- a/vulncheck_sdk/models/advisory_m_provider_metadata.py +++ b/vulncheck_sdk/models/advisory_m_provider_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMProviderMetadata(BaseModel): """ - AdvisoryMProviderMetadata + OK """ # noqa: E501 date_updated: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time", alias="dateUpdated") org_id: Optional[StrictStr] = Field(default=None, alias="orgId") diff --git a/vulncheck_sdk/models/advisory_m_reference.py b/vulncheck_sdk/models/advisory_m_reference.py index edff1bae..055d168e 100644 --- a/vulncheck_sdk/models/advisory_m_reference.py +++ b/vulncheck_sdk/models/advisory_m_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMReference(BaseModel): """ - AdvisoryMReference + advisory.MReference """ # noqa: E501 name: Optional[StrictStr] = None tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_m_remediation.py b/vulncheck_sdk/models/advisory_m_remediation.py index 5ccbedeb..c88929e4 100644 --- a/vulncheck_sdk/models/advisory_m_remediation.py +++ b/vulncheck_sdk/models/advisory_m_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,10 +27,10 @@ class AdvisoryMRemediation(BaseModel): """ - AdvisoryMRemediation + advisory.MRemediation """ # noqa: E501 affected_files: Optional[List[AdvisoryAffectedFile]] = Field(default=None, alias="AffectedFiles") - var_date: Optional[StrictStr] = Field(default=None, alias="Date") + date: Optional[StrictStr] = Field(default=None, alias="Date") date_specified: Optional[StrictBool] = Field(default=None, alias="DateSpecified") description: Optional[AdvisoryIVal] = Field(default=None, alias="Description") fixed_build: Optional[StrictStr] = Field(default=None, alias="FixedBuild") diff --git a/vulncheck_sdk/models/advisory_m_version.py b/vulncheck_sdk/models/advisory_m_version.py index e85b3099..b4fcc5f1 100644 --- a/vulncheck_sdk/models/advisory_m_version.py +++ b/vulncheck_sdk/models/advisory_m_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMVersion(BaseModel): """ - AdvisoryMVersion + advisory.MVersion """ # noqa: E501 less_than: Optional[StrictStr] = Field(default=None, alias="lessThan") less_than_or_equal: Optional[StrictStr] = Field(default=None, alias="lessThanOrEqual") diff --git a/vulncheck_sdk/models/advisory_m_vulnerability.py b/vulncheck_sdk/models/advisory_m_vulnerability.py index 15fbf38e..9fa8fe46 100644 --- a/vulncheck_sdk/models/advisory_m_vulnerability.py +++ b/vulncheck_sdk/models/advisory_m_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class AdvisoryMVulnerability(BaseModel): """ - AdvisoryMVulnerability + advisory.MVulnerability """ # noqa: E501 product_statuses: Optional[List[AdvisoryMProductStatus]] = Field(default=None, alias="ProductStatuses") remediations: Optional[List[AdvisoryMRemediation]] = Field(default=None, alias="Remediations") diff --git a/vulncheck_sdk/models/advisory_ma_cert.py b/vulncheck_sdk/models/advisory_ma_cert.py index 727c76be..1aa2e8aa 100644 --- a/vulncheck_sdk/models/advisory_ma_cert.py +++ b/vulncheck_sdk/models/advisory_ma_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMACert(BaseModel): """ - AdvisoryMACert + advisory.MACert """ # noqa: E501 affected_systems_fr: Optional[StrictStr] = None assessment_fr: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_malicious_package.py b/vulncheck_sdk/models/advisory_malicious_package.py index 20809513..073ee2ae 100644 --- a/vulncheck_sdk/models/advisory_malicious_package.py +++ b/vulncheck_sdk/models/advisory_malicious_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMaliciousPackage(BaseModel): """ - AdvisoryMaliciousPackage + advisory.MaliciousPackage """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_manage_engine.py b/vulncheck_sdk/models/advisory_manage_engine.py index 75dced28..8fce8de9 100644 --- a/vulncheck_sdk/models/advisory_manage_engine.py +++ b/vulncheck_sdk/models/advisory_manage_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryManageEngine(BaseModel): """ - AdvisoryManageEngine + advisory.ManageEngine """ # noqa: E501 advisory: Optional[StrictStr] = Field(default=None, alias="ADVISORY") added_time: Optional[StrictStr] = Field(default=None, alias="Added_Time") diff --git a/vulncheck_sdk/models/advisory_manage_engine_advisory.py b/vulncheck_sdk/models/advisory_manage_engine_advisory.py index d9de78dc..1414322c 100644 --- a/vulncheck_sdk/models/advisory_manage_engine_advisory.py +++ b/vulncheck_sdk/models/advisory_manage_engine_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryManageEngineAdvisory(BaseModel): """ - AdvisoryManageEngineAdvisory + advisory.ManageEngineAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mbed_tls.py b/vulncheck_sdk/models/advisory_mbed_tls.py index 76cf1f3b..f0bad92b 100644 --- a/vulncheck_sdk/models/advisory_mbed_tls.py +++ b/vulncheck_sdk/models/advisory_mbed_tls.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMbedTLS(BaseModel): """ - AdvisoryMbedTLS + advisory.MbedTLS """ # noqa: E501 affects: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_mc_afee.py b/vulncheck_sdk/models/advisory_mc_afee.py index bdd12881..4f1d235f 100644 --- a/vulncheck_sdk/models/advisory_mc_afee.py +++ b/vulncheck_sdk/models/advisory_mc_afee.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMcAfee(BaseModel): """ - AdvisoryMcAfee + advisory.McAfee """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mc_afee_score.py b/vulncheck_sdk/models/advisory_mc_afee_score.py index 3b5b7df2..7d57bd25 100644 --- a/vulncheck_sdk/models/advisory_mc_afee_score.py +++ b/vulncheck_sdk/models/advisory_mc_afee_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMcAfeeScore(BaseModel): """ - AdvisoryMcAfeeScore + advisory.McAfeeScore """ # noqa: E501 base: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mcpe_applicability.py b/vulncheck_sdk/models/advisory_mcpe_applicability.py index da6e8059..56db060a 100644 --- a/vulncheck_sdk/models/advisory_mcpe_applicability.py +++ b/vulncheck_sdk/models/advisory_mcpe_applicability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMCPEApplicability(BaseModel): """ - AdvisoryMCPEApplicability + advisory.MCPEApplicability """ # noqa: E501 negate: Optional[StrictBool] = None nodes: Optional[List[AdvisoryMNodes]] = None diff --git a/vulncheck_sdk/models/advisory_mcpe_match.py b/vulncheck_sdk/models/advisory_mcpe_match.py index e5a6d814..0f6a14d1 100644 --- a/vulncheck_sdk/models/advisory_mcpe_match.py +++ b/vulncheck_sdk/models/advisory_mcpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMCPEMatch(BaseModel): """ - AdvisoryMCPEMatch + advisory.MCPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/models/advisory_me_product.py b/vulncheck_sdk/models/advisory_me_product.py index d8f5f366..bfee4ed3 100644 --- a/vulncheck_sdk/models/advisory_me_product.py +++ b/vulncheck_sdk/models/advisory_me_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMEProduct(BaseModel): """ - AdvisoryMEProduct + advisory.MEProduct """ # noqa: E501 id: Optional[StrictStr] = Field(default=None, alias="ID") display_value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mediatek.py b/vulncheck_sdk/models/advisory_mediatek.py index f831dd9f..ddb39277 100644 --- a/vulncheck_sdk/models/advisory_mediatek.py +++ b/vulncheck_sdk/models/advisory_mediatek.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMediatek(BaseModel): """ - AdvisoryMediatek + advisory.Mediatek """ # noqa: E501 affected_chipsets: Optional[List[StrictStr]] = None affected_software: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_medtronic_advisory.py b/vulncheck_sdk/models/advisory_medtronic_advisory.py index 5cc8ffaa..f4e12246 100644 --- a/vulncheck_sdk/models/advisory_medtronic_advisory.py +++ b/vulncheck_sdk/models/advisory_medtronic_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMedtronicAdvisory(BaseModel): """ - AdvisoryMedtronicAdvisory + advisory.MedtronicAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_mendix.py b/vulncheck_sdk/models/advisory_mendix.py index d0e3d3e6..99f7df99 100644 --- a/vulncheck_sdk/models/advisory_mendix.py +++ b/vulncheck_sdk/models/advisory_mendix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMendix(BaseModel): """ - AdvisoryMendix + advisory.Mendix """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_meta_advisories.py b/vulncheck_sdk/models/advisory_meta_advisories.py index 09494eee..faeab471 100644 --- a/vulncheck_sdk/models/advisory_meta_advisories.py +++ b/vulncheck_sdk/models/advisory_meta_advisories.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMetaAdvisories(BaseModel): """ - AdvisoryMetaAdvisories + advisory.MetaAdvisories """ # noqa: E501 affected: Optional[List[AdvisoryMAffected]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_meta_data.py b/vulncheck_sdk/models/advisory_meta_data.py index abd897ae..c2537ea5 100644 --- a/vulncheck_sdk/models/advisory_meta_data.py +++ b/vulncheck_sdk/models/advisory_meta_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryMetaData(BaseModel): """ - AdvisoryMetaData + advisory.MetaData """ # noqa: E501 advisory: Optional[AdvisoryAdvisoryDetails] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_metasploit_exploit.py b/vulncheck_sdk/models/advisory_metasploit_exploit.py index 22fbfd46..92c50e8d 100644 --- a/vulncheck_sdk/models/advisory_metasploit_exploit.py +++ b/vulncheck_sdk/models/advisory_metasploit_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetasploitExploit(BaseModel): """ - AdvisoryMetasploitExploit + advisory.MetasploitExploit """ # noqa: E501 author: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_metric.py b/vulncheck_sdk/models/advisory_metric.py index 2ac5f238..320d5c91 100644 --- a/vulncheck_sdk/models/advisory_metric.py +++ b/vulncheck_sdk/models/advisory_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisoryMetric(BaseModel): """ - AdvisoryMetric + advisory.Metric """ # noqa: E501 cvss_v2_0: Optional[AdvisoryMCvssV20] = Field(default=None, alias="cvssV2_0") cvss_v3_0: Optional[AdvisoryMCvssV30] = Field(default=None, alias="cvssV3_0") diff --git a/vulncheck_sdk/models/advisory_metric_scenario.py b/vulncheck_sdk/models/advisory_metric_scenario.py index 0fcacb3c..d0712ef1 100644 --- a/vulncheck_sdk/models/advisory_metric_scenario.py +++ b/vulncheck_sdk/models/advisory_metric_scenario.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetricScenario(BaseModel): """ - AdvisoryMetricScenario + advisory.MetricScenario """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_metrics_other.py b/vulncheck_sdk/models/advisory_metrics_other.py index 51845306..b8cc222b 100644 --- a/vulncheck_sdk/models/advisory_metrics_other.py +++ b/vulncheck_sdk/models/advisory_metrics_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMetricsOther(BaseModel): """ - AdvisoryMetricsOther + advisory.MetricsOther """ # noqa: E501 content: Optional[Dict[str, Any]] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_microsoft_csaf.py b/vulncheck_sdk/models/advisory_microsoft_csaf.py index c1d44d8b..573e6867 100644 --- a/vulncheck_sdk/models/advisory_microsoft_csaf.py +++ b/vulncheck_sdk/models/advisory_microsoft_csaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMicrosoftCSAF(BaseModel): """ - AdvisoryMicrosoftCSAF + advisory.MicrosoftCSAF """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_microsoft_cvrf.py b/vulncheck_sdk/models/advisory_microsoft_cvrf.py index d5b0b315..5a5484b7 100644 --- a/vulncheck_sdk/models/advisory_microsoft_cvrf.py +++ b/vulncheck_sdk/models/advisory_microsoft_cvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMicrosoftCVRF(BaseModel): """ - AdvisoryMicrosoftCVRF + advisory.MicrosoftCVRF """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvrf: Optional[AdvisoryMSCVRF] = None diff --git a/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py b/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py index 807523aa..73a4c12d 100644 --- a/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py +++ b/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,11 +26,11 @@ class AdvisoryMicrosoftDriverBlockList(BaseModel): """ - AdvisoryMicrosoftDriverBlockList + advisory.MicrosoftDriverBlockList """ # noqa: E501 date_added: Optional[StrictStr] = None file_id: Optional[StrictStr] = Field(default=None, description="From FileAttrib or Deny") - file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = Field(default=None, description="File-level metadata") + file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = None __properties: ClassVar[List[str]] = ["date_added", "file_id", "file_metadata"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/advisory_microsoft_file_metadata.py b/vulncheck_sdk/models/advisory_microsoft_file_metadata.py index 6bd15b5a..cc4f551a 100644 --- a/vulncheck_sdk/models/advisory_microsoft_file_metadata.py +++ b/vulncheck_sdk/models/advisory_microsoft_file_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMicrosoftFileMetadata(BaseModel): """ - AdvisoryMicrosoftFileMetadata + File-level metadata """ # noqa: E501 file_name: Optional[StrictStr] = Field(default=None, description="Full path (FilePath + FileName or FriendlyName)") maximum_file_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_microsoft_kb.py b/vulncheck_sdk/models/advisory_microsoft_kb.py index 4f85aa39..f091b356 100644 --- a/vulncheck_sdk/models/advisory_microsoft_kb.py +++ b/vulncheck_sdk/models/advisory_microsoft_kb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMicrosoftKb(BaseModel): """ - AdvisoryMicrosoftKb + advisory.MicrosoftKb """ # noqa: E501 cve: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mikrotik.py b/vulncheck_sdk/models/advisory_mikrotik.py index 792547ce..6973a0f5 100644 --- a/vulncheck_sdk/models/advisory_mikrotik.py +++ b/vulncheck_sdk/models/advisory_mikrotik.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMikrotik(BaseModel): """ - AdvisoryMikrotik + advisory.Mikrotik """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mindray.py b/vulncheck_sdk/models/advisory_mindray.py index 8ab1fea9..c2f8366e 100644 --- a/vulncheck_sdk/models/advisory_mindray.py +++ b/vulncheck_sdk/models/advisory_mindray.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMindray(BaseModel): """ - AdvisoryMindray + advisory.Mindray """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_misp_meta.py b/vulncheck_sdk/models/advisory_misp_meta.py index f6a5acd1..eda85e5c 100644 --- a/vulncheck_sdk/models/advisory_misp_meta.py +++ b/vulncheck_sdk/models/advisory_misp_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMispMeta(BaseModel): """ - AdvisoryMispMeta + advisory.MispMeta """ # noqa: E501 attribution_confidence: Optional[StrictStr] = Field(default=None, alias="attribution-confidence") cfr_suspected_state_sponsor: Optional[StrictStr] = Field(default=None, alias="cfr-suspected-state-sponsor") diff --git a/vulncheck_sdk/models/advisory_misp_related_item.py b/vulncheck_sdk/models/advisory_misp_related_item.py index 1d4cd2cc..5b4ebcf2 100644 --- a/vulncheck_sdk/models/advisory_misp_related_item.py +++ b/vulncheck_sdk/models/advisory_misp_related_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMispRelatedItem(BaseModel): """ - AdvisoryMispRelatedItem + advisory.MispRelatedItem """ # noqa: E501 dest_uuid: Optional[StrictStr] = Field(default=None, alias="dest-uuid") tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_misp_value.py b/vulncheck_sdk/models/advisory_misp_value.py index 4362924b..28108dd2 100644 --- a/vulncheck_sdk/models/advisory_misp_value.py +++ b/vulncheck_sdk/models/advisory_misp_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMispValue(BaseModel): """ - AdvisoryMispValue + advisory.MispValue """ # noqa: E501 description: Optional[StrictStr] = None meta: Optional[AdvisoryMispMeta] = None diff --git a/vulncheck_sdk/models/advisory_misp_value_no_id.py b/vulncheck_sdk/models/advisory_misp_value_no_id.py index 36c507b9..4e0d2f1e 100644 --- a/vulncheck_sdk/models/advisory_misp_value_no_id.py +++ b/vulncheck_sdk/models/advisory_misp_value_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMISPValueNoID(BaseModel): """ - AdvisoryMISPValueNoID + advisory.MISPValueNoID """ # noqa: E501 description: Optional[StrictStr] = None meta: Optional[AdvisoryMispMeta] = None diff --git a/vulncheck_sdk/models/advisory_mitel.py b/vulncheck_sdk/models/advisory_mitel.py index 6d0d81a4..eda77374 100644 --- a/vulncheck_sdk/models/advisory_mitel.py +++ b/vulncheck_sdk/models/advisory_mitel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitel(BaseModel): """ - AdvisoryMitel + advisory.Mitel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_attack_group_no_id.py b/vulncheck_sdk/models/advisory_mitre_attack_group_no_id.py index 55f05bc2..3af27b11 100644 --- a/vulncheck_sdk/models/advisory_mitre_attack_group_no_id.py +++ b/vulncheck_sdk/models/advisory_mitre_attack_group_no_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMITREAttackGroupNoID(BaseModel): """ - AdvisoryMITREAttackGroupNoID + advisory.MITREAttackGroupNoID """ # noqa: E501 aliases: Optional[List[StrictStr]] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_attack_ref.py b/vulncheck_sdk/models/advisory_mitre_attack_ref.py index db4227b5..0939ad87 100644 --- a/vulncheck_sdk/models/advisory_mitre_attack_ref.py +++ b/vulncheck_sdk/models/advisory_mitre_attack_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitreAttackRef(BaseModel): """ - AdvisoryMitreAttackRef + advisory.MitreAttackRef """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_attack_tech_with_refs.py b/vulncheck_sdk/models/advisory_mitre_attack_tech_with_refs.py index 4d459a3c..e26c8a45 100644 --- a/vulncheck_sdk/models/advisory_mitre_attack_tech_with_refs.py +++ b/vulncheck_sdk/models/advisory_mitre_attack_tech_with_refs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMitreAttackTechWithRefs(BaseModel): """ - AdvisoryMitreAttackTechWithRefs + advisory.MitreAttackTechWithRefs """ # noqa: E501 domain: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_attack_technique.py b/vulncheck_sdk/models/advisory_mitre_attack_technique.py index a8b14a49..ebf2024b 100644 --- a/vulncheck_sdk/models/advisory_mitre_attack_technique.py +++ b/vulncheck_sdk/models/advisory_mitre_attack_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitreAttackTechnique(BaseModel): """ - AdvisoryMitreAttackTechnique + advisory.MitreAttackTechnique """ # noqa: E501 sub_technique: Optional[StrictStr] = None sub_technique_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_cve_list_v5.py b/vulncheck_sdk/models/advisory_mitre_cve_list_v5.py index 29f1a233..da915538 100644 --- a/vulncheck_sdk/models/advisory_mitre_cve_list_v5.py +++ b/vulncheck_sdk/models/advisory_mitre_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMitreCVEListV5(BaseModel): """ - AdvisoryMitreCVEListV5 + advisory.MitreCVEListV5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitre_cve_list_v5_ref.py b/vulncheck_sdk/models/advisory_mitre_cve_list_v5_ref.py index b5340c29..d44cb6e0 100644 --- a/vulncheck_sdk/models/advisory_mitre_cve_list_v5_ref.py +++ b/vulncheck_sdk/models/advisory_mitre_cve_list_v5_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryMitreCVEListV5Ref(BaseModel): """ - AdvisoryMitreCVEListV5Ref + advisory.MitreCVEListV5Ref """ # noqa: E501 containers: Optional[AdvisoryMContainers] = None cve_metadata: Optional[AdvisoryMCveMetadata] = Field(default=None, alias="cveMetadata") diff --git a/vulncheck_sdk/models/advisory_mitre_group_cti.py b/vulncheck_sdk/models/advisory_mitre_group_cti.py index 6a2195d3..5ca81e91 100644 --- a/vulncheck_sdk/models/advisory_mitre_group_cti.py +++ b/vulncheck_sdk/models/advisory_mitre_group_cti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMitreGroupCTI(BaseModel): """ - AdvisoryMitreGroupCTI + advisory.MitreGroupCTI """ # noqa: E501 aliases: Optional[List[StrictStr]] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_mitsubishi_electric_advisory.py b/vulncheck_sdk/models/advisory_mitsubishi_electric_advisory.py index f622df39..9975ed6e 100644 --- a/vulncheck_sdk/models/advisory_mitsubishi_electric_advisory.py +++ b/vulncheck_sdk/models/advisory_mitsubishi_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMitsubishiElectricAdvisory(BaseModel): """ - AdvisoryMitsubishiElectricAdvisory + advisory.MitsubishiElectricAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_mongo_db.py b/vulncheck_sdk/models/advisory_mongo_db.py index 3562343b..5d3b0974 100644 --- a/vulncheck_sdk/models/advisory_mongo_db.py +++ b/vulncheck_sdk/models/advisory_mongo_db.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMongoDB(BaseModel): """ - AdvisoryMongoDB + advisory.MongoDB """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_moxa_advisory.py b/vulncheck_sdk/models/advisory_moxa_advisory.py index c0f2fdef..0a7a4d17 100644 --- a/vulncheck_sdk/models/advisory_moxa_advisory.py +++ b/vulncheck_sdk/models/advisory_moxa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMoxaAdvisory(BaseModel): """ - AdvisoryMoxaAdvisory + advisory.MoxaAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_mozilla_advisory.py b/vulncheck_sdk/models/advisory_mozilla_advisory.py index 6d8ed053..f7ff7273 100644 --- a/vulncheck_sdk/models/advisory_mozilla_advisory.py +++ b/vulncheck_sdk/models/advisory_mozilla_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryMozillaAdvisory(BaseModel): """ - AdvisoryMozillaAdvisory + advisory.MozillaAdvisory """ # noqa: E501 affected_components: Optional[List[AdvisoryMozillaComponent]] = None bugzilla: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_mozilla_component.py b/vulncheck_sdk/models/advisory_mozilla_component.py index 5e0797a7..d5df0e3a 100644 --- a/vulncheck_sdk/models/advisory_mozilla_component.py +++ b/vulncheck_sdk/models/advisory_mozilla_component.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMozillaComponent(BaseModel): """ - AdvisoryMozillaComponent + advisory.MozillaComponent """ # noqa: E501 bugzilla: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ms_document_title.py b/vulncheck_sdk/models/advisory_ms_document_title.py index 68d5e3f1..867b63a2 100644 --- a/vulncheck_sdk/models/advisory_ms_document_title.py +++ b/vulncheck_sdk/models/advisory_ms_document_title.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryMSDocumentTitle(BaseModel): """ - AdvisoryMSDocumentTitle + advisory.MSDocumentTitle """ # noqa: E501 value: Optional[StrictStr] = Field(default=None, alias="Value") __properties: ClassVar[List[str]] = ["Value"] diff --git a/vulncheck_sdk/models/advisory_mscvrf.py b/vulncheck_sdk/models/advisory_mscvrf.py index 18280df1..1d7f3b77 100644 --- a/vulncheck_sdk/models/advisory_mscvrf.py +++ b/vulncheck_sdk/models/advisory_mscvrf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisoryMSCVRF(BaseModel): """ - AdvisoryMSCVRF + advisory.MSCVRF """ # noqa: E501 document_title: Optional[AdvisoryMSDocumentTitle] = Field(default=None, alias="DocumentTitle") document_tracking: Optional[AdvisoryMDocumentTracking] = Field(default=None, alias="DocumentTracking") diff --git a/vulncheck_sdk/models/advisory_naver.py b/vulncheck_sdk/models/advisory_naver.py index 67884704..b6a54ea9 100644 --- a/vulncheck_sdk/models/advisory_naver.py +++ b/vulncheck_sdk/models/advisory_naver.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNaver(BaseModel): """ - AdvisoryNaver + advisory.Naver """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ncsc.py b/vulncheck_sdk/models/advisory_ncsc.py index 2f426e48..abfc9b4c 100644 --- a/vulncheck_sdk/models/advisory_ncsc.py +++ b/vulncheck_sdk/models/advisory_ncsc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNCSC(BaseModel): """ - AdvisoryNCSC + advisory.NCSC """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ncsccve.py b/vulncheck_sdk/models/advisory_ncsccve.py index 2aa085c4..7d2500cf 100644 --- a/vulncheck_sdk/models/advisory_ncsccve.py +++ b/vulncheck_sdk/models/advisory_ncsccve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNCSCCVE(BaseModel): """ - AdvisoryNCSCCVE + advisory.NCSCCVE """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_nec.py b/vulncheck_sdk/models/advisory_nec.py index 0553c55c..6fd3ca45 100644 --- a/vulncheck_sdk/models/advisory_nec.py +++ b/vulncheck_sdk/models/advisory_nec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNEC(BaseModel): """ - AdvisoryNEC + advisory.NEC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nessus.py b/vulncheck_sdk/models/advisory_nessus.py index 7317b36b..e6e16152 100644 --- a/vulncheck_sdk/models/advisory_nessus.py +++ b/vulncheck_sdk/models/advisory_nessus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNessus(BaseModel): """ - AdvisoryNessus + advisory.Nessus """ # noqa: E501 cpe: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_net_app.py b/vulncheck_sdk/models/advisory_net_app.py index e3a93168..0bd9543c 100644 --- a/vulncheck_sdk/models/advisory_net_app.py +++ b/vulncheck_sdk/models/advisory_net_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetApp(BaseModel): """ - AdvisoryNetApp + advisory.NetApp """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_netatalk.py b/vulncheck_sdk/models/advisory_netatalk.py index fdcfe407..17463865 100644 --- a/vulncheck_sdk/models/advisory_netatalk.py +++ b/vulncheck_sdk/models/advisory_netatalk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetatalk(BaseModel): """ - AdvisoryNetatalk + advisory.Netatalk """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_netgate.py b/vulncheck_sdk/models/advisory_netgate.py index 418b6097..6c021deb 100644 --- a/vulncheck_sdk/models/advisory_netgate.py +++ b/vulncheck_sdk/models/advisory_netgate.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetgate(BaseModel): """ - AdvisoryNetgate + advisory.Netgate """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_netgear.py b/vulncheck_sdk/models/advisory_netgear.py index a0d163a0..fa508725 100644 --- a/vulncheck_sdk/models/advisory_netgear.py +++ b/vulncheck_sdk/models/advisory_netgear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetgear(BaseModel): """ - AdvisoryNetgear + advisory.Netgear """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_netskope.py b/vulncheck_sdk/models/advisory_netskope.py index a1ad1e22..64b45d80 100644 --- a/vulncheck_sdk/models/advisory_netskope.py +++ b/vulncheck_sdk/models/advisory_netskope.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNetskope(BaseModel): """ - AdvisoryNetskope + advisory.Netskope """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_nexpose.py b/vulncheck_sdk/models/advisory_nexpose.py index eee3bd96..e39f5177 100644 --- a/vulncheck_sdk/models/advisory_nexpose.py +++ b/vulncheck_sdk/models/advisory_nexpose.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNexpose(BaseModel): """ - AdvisoryNexpose + advisory.Nexpose """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nginx_advisory.py b/vulncheck_sdk/models/advisory_nginx_advisory.py index 7a2bd131..0e9160d5 100644 --- a/vulncheck_sdk/models/advisory_nginx_advisory.py +++ b/vulncheck_sdk/models/advisory_nginx_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNginxAdvisory(BaseModel): """ - AdvisoryNginxAdvisory + advisory.NginxAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nhs.py b/vulncheck_sdk/models/advisory_nhs.py index 9681fd4b..3198d276 100644 --- a/vulncheck_sdk/models/advisory_nhs.py +++ b/vulncheck_sdk/models/advisory_nhs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNHS(BaseModel): """ - AdvisoryNHS + advisory.NHS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ni.py b/vulncheck_sdk/models/advisory_ni.py index 31ac72f6..8124f688 100644 --- a/vulncheck_sdk/models/advisory_ni.py +++ b/vulncheck_sdk/models/advisory_ni.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNI(BaseModel): """ - AdvisoryNI + advisory.NI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nist_control.py b/vulncheck_sdk/models/advisory_nist_control.py index 4c90a531..1a83536e 100644 --- a/vulncheck_sdk/models/advisory_nist_control.py +++ b/vulncheck_sdk/models/advisory_nist_control.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNISTControl(BaseModel): """ - AdvisoryNISTControl + advisory.NISTControl """ # noqa: E501 cis_controls: Optional[List[AdvisoryCISControl]] = None nist_control_family: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_node_author.py b/vulncheck_sdk/models/advisory_node_author.py index 677c4864..904aee40 100644 --- a/vulncheck_sdk/models/advisory_node_author.py +++ b/vulncheck_sdk/models/advisory_node_author.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNodeAuthor(BaseModel): """ - AdvisoryNodeAuthor + advisory.NodeAuthor """ # noqa: E501 author: Optional[StrictStr] = None username: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_node_js.py b/vulncheck_sdk/models/advisory_node_js.py index 2e3bf124..3847d94c 100644 --- a/vulncheck_sdk/models/advisory_node_js.py +++ b/vulncheck_sdk/models/advisory_node_js.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNodeJS(BaseModel): """ - AdvisoryNodeJS + advisory.NodeJS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_node_security.py b/vulncheck_sdk/models/advisory_node_security.py index 2ec34d91..97efec6f 100644 --- a/vulncheck_sdk/models/advisory_node_security.py +++ b/vulncheck_sdk/models/advisory_node_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNodeSecurity(BaseModel): """ - AdvisoryNodeSecurity + advisory.NodeSecurity """ # noqa: E501 affected_environments: Optional[List[StrictStr]] = None author: Optional[AdvisoryNodeAuthor] = None diff --git a/vulncheck_sdk/models/advisory_nokia.py b/vulncheck_sdk/models/advisory_nokia.py index 14dca9e1..e2490a0f 100644 --- a/vulncheck_sdk/models/advisory_nokia.py +++ b/vulncheck_sdk/models/advisory_nokia.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNokia(BaseModel): """ - AdvisoryNokia + advisory.Nokia """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_note.py b/vulncheck_sdk/models/advisory_note.py index 994e8672..5e133204 100644 --- a/vulncheck_sdk/models/advisory_note.py +++ b/vulncheck_sdk/models/advisory_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNote(BaseModel): """ - AdvisoryNote + advisory.Note """ # noqa: E501 ordinal: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_note_pad_plus_plus.py b/vulncheck_sdk/models/advisory_note_pad_plus_plus.py index a30ad19d..43ad561d 100644 --- a/vulncheck_sdk/models/advisory_note_pad_plus_plus.py +++ b/vulncheck_sdk/models/advisory_note_pad_plus_plus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNotePadPlusPlus(BaseModel): """ - AdvisoryNotePadPlusPlus + advisory.NotePadPlusPlus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nozomi.py b/vulncheck_sdk/models/advisory_nozomi.py index 806a7143..95282ee8 100644 --- a/vulncheck_sdk/models/advisory_nozomi.py +++ b/vulncheck_sdk/models/advisory_nozomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNozomi(BaseModel): """ - AdvisoryNozomi + advisory.Nozomi """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ntp.py b/vulncheck_sdk/models/advisory_ntp.py index 4f34e1fa..7f790602 100644 --- a/vulncheck_sdk/models/advisory_ntp.py +++ b/vulncheck_sdk/models/advisory_ntp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNTP(BaseModel): """ - AdvisoryNTP + advisory.NTP """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_nuclei.py b/vulncheck_sdk/models/advisory_nuclei.py index 9fc962e1..1aa66138 100644 --- a/vulncheck_sdk/models/advisory_nuclei.py +++ b/vulncheck_sdk/models/advisory_nuclei.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNuclei(BaseModel): """ - AdvisoryNuclei + advisory.Nuclei """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nvd20_configuration.py b/vulncheck_sdk/models/advisory_nvd20_configuration.py index c2d851ab..eb87ff4c 100644 --- a/vulncheck_sdk/models/advisory_nvd20_configuration.py +++ b/vulncheck_sdk/models/advisory_nvd20_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNVD20Configuration(BaseModel): """ - AdvisoryNVD20Configuration + advisory.NVD20Configuration """ # noqa: E501 negate: Optional[StrictBool] = None nodes: Optional[List[AdvisoryNVD20Node]] = None diff --git a/vulncheck_sdk/models/advisory_nvd20_cvecpe_match.py b/vulncheck_sdk/models/advisory_nvd20_cvecpe_match.py index 9fc43781..851e87d4 100644 --- a/vulncheck_sdk/models/advisory_nvd20_cvecpe_match.py +++ b/vulncheck_sdk/models/advisory_nvd20_cvecpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNVD20CVECPEMatch(BaseModel): """ - AdvisoryNVD20CVECPEMatch + advisory.NVD20CVECPEMatch """ # noqa: E501 criteria: Optional[StrictStr] = None match_criteria_id: Optional[StrictStr] = Field(default=None, alias="matchCriteriaId") diff --git a/vulncheck_sdk/models/advisory_nvd20_node.py b/vulncheck_sdk/models/advisory_nvd20_node.py index 8dcf0eaa..dc2f2137 100644 --- a/vulncheck_sdk/models/advisory_nvd20_node.py +++ b/vulncheck_sdk/models/advisory_nvd20_node.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryNVD20Node(BaseModel): """ - AdvisoryNVD20Node + advisory.NVD20Node """ # noqa: E501 cpe_match: Optional[List[AdvisoryNVD20CVECPEMatch]] = Field(default=None, alias="cpeMatch") negate: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/advisory_nvd20_source.py b/vulncheck_sdk/models/advisory_nvd20_source.py index fcf9c632..a2a337b8 100644 --- a/vulncheck_sdk/models/advisory_nvd20_source.py +++ b/vulncheck_sdk/models/advisory_nvd20_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryNVD20Source(BaseModel): """ - AdvisoryNVD20Source + advisory.NVD20Source """ # noqa: E501 contact_email: Optional[StrictStr] = Field(default=None, alias="contactEmail") created: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_nvdcpe_dictionary.py b/vulncheck_sdk/models/advisory_nvdcpe_dictionary.py index 81459832..735ae846 100644 --- a/vulncheck_sdk/models/advisory_nvdcpe_dictionary.py +++ b/vulncheck_sdk/models/advisory_nvdcpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNVDCPEDictionary(BaseModel): """ - AdvisoryNVDCPEDictionary + advisory.NVDCPEDictionary """ # noqa: E501 backup_only: Optional[StrictStr] = Field(default=None, alias="backupOnly") __properties: ClassVar[List[str]] = ["backupOnly"] diff --git a/vulncheck_sdk/models/advisory_nvidia_revision.py b/vulncheck_sdk/models/advisory_nvidia_revision.py index c32b4b8b..f4171ab6 100644 --- a/vulncheck_sdk/models/advisory_nvidia_revision.py +++ b/vulncheck_sdk/models/advisory_nvidia_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryNvidiaRevision(BaseModel): """ - AdvisoryNvidiaRevision + advisory.NvidiaRevision """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[StrictStr] = None revision: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "description", "revision"] diff --git a/vulncheck_sdk/models/advisory_nz_advisory.py b/vulncheck_sdk/models/advisory_nz_advisory.py index f655be64..6fb66f76 100644 --- a/vulncheck_sdk/models/advisory_nz_advisory.py +++ b/vulncheck_sdk/models/advisory_nz_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryNZAdvisory(BaseModel): """ - AdvisoryNZAdvisory + advisory.NZAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_o_curl.py b/vulncheck_sdk/models/advisory_o_curl.py index de02c32c..42a837b7 100644 --- a/vulncheck_sdk/models/advisory_o_curl.py +++ b/vulncheck_sdk/models/advisory_o_curl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryOCurl(BaseModel): """ - AdvisoryOCurl + advisory.OCurl """ # noqa: E501 affected: Optional[List[AdvisoryCurlAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_octopus_deploy.py b/vulncheck_sdk/models/advisory_octopus_deploy.py index 628823db..016cb652 100644 --- a/vulncheck_sdk/models/advisory_octopus_deploy.py +++ b/vulncheck_sdk/models/advisory_octopus_deploy.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOctopusDeploy(BaseModel): """ - AdvisoryOctopusDeploy + advisory.OctopusDeploy """ # noqa: E501 advisory_number: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_okta.py b/vulncheck_sdk/models/advisory_okta.py index 47329626..65e843f7 100644 --- a/vulncheck_sdk/models/advisory_okta.py +++ b/vulncheck_sdk/models/advisory_okta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOkta(BaseModel): """ - AdvisoryOkta + advisory.Okta """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_omron.py b/vulncheck_sdk/models/advisory_omron.py index af048682..e786c116 100644 --- a/vulncheck_sdk/models/advisory_omron.py +++ b/vulncheck_sdk/models/advisory_omron.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOmron(BaseModel): """ - AdvisoryOmron + advisory.Omron """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_one_e.py b/vulncheck_sdk/models/advisory_one_e.py index 83976ed6..4445c38a 100644 --- a/vulncheck_sdk/models/advisory_one_e.py +++ b/vulncheck_sdk/models/advisory_one_e.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOneE(BaseModel): """ - AdvisoryOneE + advisory.OneE """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_open_bsd.py b/vulncheck_sdk/models/advisory_open_bsd.py index 1cb1f606..3198dfe1 100644 --- a/vulncheck_sdk/models/advisory_open_bsd.py +++ b/vulncheck_sdk/models/advisory_open_bsd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenBSD(BaseModel): """ - AdvisoryOpenBSD + advisory.OpenBSD """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_open_cvdb.py b/vulncheck_sdk/models/advisory_open_cvdb.py index 58f9c5db..ae58e07f 100644 --- a/vulncheck_sdk/models/advisory_open_cvdb.py +++ b/vulncheck_sdk/models/advisory_open_cvdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenCVDB(BaseModel): """ - AdvisoryOpenCVDB + advisory.OpenCVDB """ # noqa: E501 affected_platforms: Optional[List[StrictStr]] = None affected_services: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_open_jdk.py b/vulncheck_sdk/models/advisory_open_jdk.py index da374d32..7e659e0b 100644 --- a/vulncheck_sdk/models/advisory_open_jdk.py +++ b/vulncheck_sdk/models/advisory_open_jdk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenJDK(BaseModel): """ - AdvisoryOpenJDK + advisory.OpenJDK """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_open_jdkcve.py b/vulncheck_sdk/models/advisory_open_jdkcve.py index 84317d4e..966efcf0 100644 --- a/vulncheck_sdk/models/advisory_open_jdkcve.py +++ b/vulncheck_sdk/models/advisory_open_jdkcve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenJDKCVE(BaseModel): """ - AdvisoryOpenJDKCVE + advisory.OpenJDKCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_open_ssh.py b/vulncheck_sdk/models/advisory_open_ssh.py index c46e992e..c719f2a1 100644 --- a/vulncheck_sdk/models/advisory_open_ssh.py +++ b/vulncheck_sdk/models/advisory_open_ssh.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenSSH(BaseModel): """ - AdvisoryOpenSSH + advisory.OpenSSH """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_open_ssl_sec_adv.py b/vulncheck_sdk/models/advisory_open_ssl_sec_adv.py index 84f9a613..773ce014 100644 --- a/vulncheck_sdk/models/advisory_open_ssl_sec_adv.py +++ b/vulncheck_sdk/models/advisory_open_ssl_sec_adv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenSSLSecAdv(BaseModel): """ - AdvisoryOpenSSLSecAdv + advisory.OpenSSLSecAdv """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_open_ssl_vulnerability.py b/vulncheck_sdk/models/advisory_open_ssl_vulnerability.py index 0f75495b..7cdf366f 100644 --- a/vulncheck_sdk/models/advisory_open_ssl_vulnerability.py +++ b/vulncheck_sdk/models/advisory_open_ssl_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOpenSSLVulnerability(BaseModel): """ - AdvisoryOpenSSLVulnerability + advisory.OpenSSLVulnerability """ # noqa: E501 cve: Optional[List[StrictStr]] = None fixed: Optional[List[AdvisoryFixAff]] = None diff --git a/vulncheck_sdk/models/advisory_open_stack.py b/vulncheck_sdk/models/advisory_open_stack.py index b651d34d..4448094d 100644 --- a/vulncheck_sdk/models/advisory_open_stack.py +++ b/vulncheck_sdk/models/advisory_open_stack.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpenStack(BaseModel): """ - AdvisoryOpenStack + advisory.OpenStack """ # noqa: E501 affects: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_opengear.py b/vulncheck_sdk/models/advisory_opengear.py index 6162e82b..db455ef9 100644 --- a/vulncheck_sdk/models/advisory_opengear.py +++ b/vulncheck_sdk/models/advisory_opengear.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOpengear(BaseModel): """ - AdvisoryOpengear + advisory.Opengear """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_oracle_cpu.py b/vulncheck_sdk/models/advisory_oracle_cpu.py index 94edbd24..39084215 100644 --- a/vulncheck_sdk/models/advisory_oracle_cpu.py +++ b/vulncheck_sdk/models/advisory_oracle_cpu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOracleCPU(BaseModel): """ - AdvisoryOracleCPU + advisory.OracleCPU """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_oracle_cpucsaf.py b/vulncheck_sdk/models/advisory_oracle_cpucsaf.py index fa545a3c..d64eb2cb 100644 --- a/vulncheck_sdk/models/advisory_oracle_cpucsaf.py +++ b/vulncheck_sdk/models/advisory_oracle_cpucsaf.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOracleCPUCSAF(BaseModel): """ - AdvisoryOracleCPUCSAF + advisory.OracleCPUCSAF """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_original_ghsa.py b/vulncheck_sdk/models/advisory_original_ghsa.py index 0598eb97..f4ed2287 100644 --- a/vulncheck_sdk/models/advisory_original_ghsa.py +++ b/vulncheck_sdk/models/advisory_original_ghsa.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisoryOriginalGHSA(BaseModel): """ - AdvisoryOriginalGHSA + advisory.OriginalGHSA """ # noqa: E501 affected: Optional[List[AdvisoryGHSAAffected]] = None aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_osv.py b/vulncheck_sdk/models/advisory_osv.py index 9baf92bb..3a3f0ed3 100644 --- a/vulncheck_sdk/models/advisory_osv.py +++ b/vulncheck_sdk/models/advisory_osv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOSV(BaseModel): """ - AdvisoryOSV + advisory.OSV """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_osv_obj.py b/vulncheck_sdk/models/advisory_osv_obj.py index fa2824bf..837fe127 100644 --- a/vulncheck_sdk/models/advisory_osv_obj.py +++ b/vulncheck_sdk/models/advisory_osv_obj.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryOSVObj(BaseModel): """ - AdvisoryOSVObj + advisory.OSVObj """ # noqa: E501 affected: Optional[List[AdvisoryAffected]] = Field(default=None, description="collection based on https://ossf.github.io/osv-schema/") aliases: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_osv_package.py b/vulncheck_sdk/models/advisory_osv_package.py index 9f99f578..d5a3bb47 100644 --- a/vulncheck_sdk/models/advisory_osv_package.py +++ b/vulncheck_sdk/models/advisory_osv_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOSVPackage(BaseModel): """ - AdvisoryOSVPackage + advisory.OSVPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_osv_reference.py b/vulncheck_sdk/models/advisory_osv_reference.py index b1b0b1b5..14c1f64e 100644 --- a/vulncheck_sdk/models/advisory_osv_reference.py +++ b/vulncheck_sdk/models/advisory_osv_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOSVReference(BaseModel): """ - AdvisoryOSVReference + advisory.OSVReference """ # noqa: E501 type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_otrs.py b/vulncheck_sdk/models/advisory_otrs.py index 3d58df0c..39047f58 100644 --- a/vulncheck_sdk/models/advisory_otrs.py +++ b/vulncheck_sdk/models/advisory_otrs.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOTRS(BaseModel): """ - AdvisoryOTRS + advisory.OTRS """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_oval_cve.py b/vulncheck_sdk/models/advisory_oval_cve.py index 265dbb8b..95ac3be2 100644 --- a/vulncheck_sdk/models/advisory_oval_cve.py +++ b/vulncheck_sdk/models/advisory_oval_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOvalCVE(BaseModel): """ - AdvisoryOvalCVE + advisory.OvalCVE """ # noqa: E501 href: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_oval_reference.py b/vulncheck_sdk/models/advisory_oval_reference.py index 12c9bb76..f4a1fd81 100644 --- a/vulncheck_sdk/models/advisory_oval_reference.py +++ b/vulncheck_sdk/models/advisory_oval_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOvalReference(BaseModel): """ - AdvisoryOvalReference + advisory.OvalReference """ # noqa: E501 ref_id: Optional[StrictStr] = None ref_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_override.py b/vulncheck_sdk/models/advisory_override.py index 11af427d..42ec9d91 100644 --- a/vulncheck_sdk/models/advisory_override.py +++ b/vulncheck_sdk/models/advisory_override.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryOverride(BaseModel): """ - AdvisoryOverride + advisory.Override """ # noqa: E501 annotation: Optional[AdvisoryOverrideAnnotation] = Field(default=None, alias="_annotation") cve: Optional[AdvisoryOverrideCVE] = None diff --git a/vulncheck_sdk/models/advisory_override_annotation.py b/vulncheck_sdk/models/advisory_override_annotation.py index bb97d69a..a1b11b16 100644 --- a/vulncheck_sdk/models/advisory_override_annotation.py +++ b/vulncheck_sdk/models/advisory_override_annotation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideAnnotation(BaseModel): """ - AdvisoryOverrideAnnotation + advisory.OverrideAnnotation """ # noqa: E501 cve_id: Optional[StrictStr] = None modified: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_override_configuration.py b/vulncheck_sdk/models/advisory_override_configuration.py index ed020505..dd9e8a69 100644 --- a/vulncheck_sdk/models/advisory_override_configuration.py +++ b/vulncheck_sdk/models/advisory_override_configuration.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideConfiguration(BaseModel): """ - AdvisoryOverrideConfiguration + advisory.OverrideConfiguration """ # noqa: E501 nodes: Optional[List[AdvisoryCPENode]] = None __properties: ClassVar[List[str]] = ["nodes"] diff --git a/vulncheck_sdk/models/advisory_override_cve.py b/vulncheck_sdk/models/advisory_override_cve.py index 42075cc3..b9f15962 100644 --- a/vulncheck_sdk/models/advisory_override_cve.py +++ b/vulncheck_sdk/models/advisory_override_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryOverrideCVE(BaseModel): """ - AdvisoryOverrideCVE + advisory.OverrideCVE """ # noqa: E501 configurations: Optional[List[AdvisoryOverrideConfiguration]] = None __properties: ClassVar[List[str]] = ["configurations"] diff --git a/vulncheck_sdk/models/advisory_own_cloud.py b/vulncheck_sdk/models/advisory_own_cloud.py index ee5c62a7..d31259f0 100644 --- a/vulncheck_sdk/models/advisory_own_cloud.py +++ b/vulncheck_sdk/models/advisory_own_cloud.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryOwnCloud(BaseModel): """ - AdvisoryOwnCloud + advisory.OwnCloud """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_package.py b/vulncheck_sdk/models/advisory_package.py index 129fe045..d3a12b1f 100644 --- a/vulncheck_sdk/models/advisory_package.py +++ b/vulncheck_sdk/models/advisory_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPackage(BaseModel): """ - AdvisoryPackage + advisory.Package """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = Field(default=None, description="sort") diff --git a/vulncheck_sdk/models/advisory_package_stat.py b/vulncheck_sdk/models/advisory_package_stat.py index 25d7ce60..2adb0568 100644 --- a/vulncheck_sdk/models/advisory_package_stat.py +++ b/vulncheck_sdk/models/advisory_package_stat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPackageStat(BaseModel): """ - AdvisoryPackageStat + advisory.PackageStat """ # noqa: E501 cpe: Optional[StrictStr] = None fix_state: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_packetstorm_exploit.py b/vulncheck_sdk/models/advisory_packetstorm_exploit.py index 4cbcb7f5..74bf8c6a 100644 --- a/vulncheck_sdk/models/advisory_packetstorm_exploit.py +++ b/vulncheck_sdk/models/advisory_packetstorm_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPacketstormExploit(BaseModel): """ - AdvisoryPacketstormExploit + advisory.PacketstormExploit """ # noqa: E501 author: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_palantir.py b/vulncheck_sdk/models/advisory_palantir.py index abc2d4f9..d6c98fe6 100644 --- a/vulncheck_sdk/models/advisory_palantir.py +++ b/vulncheck_sdk/models/advisory_palantir.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPalantir(BaseModel): """ - AdvisoryPalantir + advisory.Palantir """ # noqa: E501 affected_products: Optional[StrictStr] = None background: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_palo_alto_advisory.py b/vulncheck_sdk/models/advisory_palo_alto_advisory.py index 81d8146f..e0acdcfd 100644 --- a/vulncheck_sdk/models/advisory_palo_alto_advisory.py +++ b/vulncheck_sdk/models/advisory_palo_alto_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPaloAltoAdvisory(BaseModel): """ - AdvisoryPaloAltoAdvisory + advisory.PaloAltoAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None applicable_versions: Optional[StrictStr] = Field(default=None, alias="applicableVersions") diff --git a/vulncheck_sdk/models/advisory_panasonic.py b/vulncheck_sdk/models/advisory_panasonic.py index 76d22a23..65ceb55c 100644 --- a/vulncheck_sdk/models/advisory_panasonic.py +++ b/vulncheck_sdk/models/advisory_panasonic.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPanasonic(BaseModel): """ - AdvisoryPanasonic + advisory.Panasonic """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_paper_cut.py b/vulncheck_sdk/models/advisory_paper_cut.py index 01aa137a..d40b61f8 100644 --- a/vulncheck_sdk/models/advisory_paper_cut.py +++ b/vulncheck_sdk/models/advisory_paper_cut.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPaperCut(BaseModel): """ - AdvisoryPaperCut + advisory.PaperCut """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_patch.py b/vulncheck_sdk/models/advisory_patch.py index 5c6a3893..ee436bdd 100644 --- a/vulncheck_sdk/models/advisory_patch.py +++ b/vulncheck_sdk/models/advisory_patch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPatch(BaseModel): """ - AdvisoryPatch + advisory.Patch """ # noqa: E501 advisory_id: Optional[StrictStr] = None component: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_pega.py b/vulncheck_sdk/models/advisory_pega.py index c5678bfd..31c845cb 100644 --- a/vulncheck_sdk/models/advisory_pega.py +++ b/vulncheck_sdk/models/advisory_pega.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPega(BaseModel): """ - AdvisoryPega + advisory.Pega """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_pg_fix.py b/vulncheck_sdk/models/advisory_pg_fix.py index 1f7e6d5c..945d1fa5 100644 --- a/vulncheck_sdk/models/advisory_pg_fix.py +++ b/vulncheck_sdk/models/advisory_pg_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPGFix(BaseModel): """ - AdvisoryPGFix + advisory.PGFix """ # noqa: E501 affected: Optional[StrictStr] = None fixed: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_philips_advisory.py b/vulncheck_sdk/models/advisory_philips_advisory.py index e93b118f..e334c669 100644 --- a/vulncheck_sdk/models/advisory_philips_advisory.py +++ b/vulncheck_sdk/models/advisory_philips_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPhilipsAdvisory(BaseModel): """ - AdvisoryPhilipsAdvisory + advisory.PhilipsAdvisory """ # noqa: E501 affected_products: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_phoenix_contact_advisory.py b/vulncheck_sdk/models/advisory_phoenix_contact_advisory.py index 1dab01de..5d803792 100644 --- a/vulncheck_sdk/models/advisory_phoenix_contact_advisory.py +++ b/vulncheck_sdk/models/advisory_phoenix_contact_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPhoenixContactAdvisory(BaseModel): """ - AdvisoryPhoenixContactAdvisory + advisory.PhoenixContactAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_phpmy_admin.py b/vulncheck_sdk/models/advisory_phpmy_admin.py index 9ba8bb67..b9836ecb 100644 --- a/vulncheck_sdk/models/advisory_phpmy_admin.py +++ b/vulncheck_sdk/models/advisory_phpmy_admin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPHPMyAdmin(BaseModel): """ - AdvisoryPHPMyAdmin + advisory.PHPMyAdmin """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_pk_cert.py b/vulncheck_sdk/models/advisory_pk_cert.py index e7752d49..8c9ba4b6 100644 --- a/vulncheck_sdk/models/advisory_pk_cert.py +++ b/vulncheck_sdk/models/advisory_pk_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPKCert(BaseModel): """ - AdvisoryPKCert + advisory.PKCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_postgres_sql.py b/vulncheck_sdk/models/advisory_postgres_sql.py index 9313225c..919d76c4 100644 --- a/vulncheck_sdk/models/advisory_postgres_sql.py +++ b/vulncheck_sdk/models/advisory_postgres_sql.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryPostgresSQL(BaseModel): """ - AdvisoryPostgresSQL + advisory.PostgresSQL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_power_dns.py b/vulncheck_sdk/models/advisory_power_dns.py index 1168428c..1b8c1181 100644 --- a/vulncheck_sdk/models/advisory_power_dns.py +++ b/vulncheck_sdk/models/advisory_power_dns.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPowerDNS(BaseModel): """ - AdvisoryPowerDNS + advisory.PowerDNS """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_prime_version.py b/vulncheck_sdk/models/advisory_prime_version.py index 020070fb..a5004ec2 100644 --- a/vulncheck_sdk/models/advisory_prime_version.py +++ b/vulncheck_sdk/models/advisory_prime_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPrimeVersion(BaseModel): """ - AdvisoryPrimeVersion + advisory.PrimeVersion """ # noqa: E501 jd_k: Optional[StrictStr] = Field(default=None, alias="jdK") prime: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_product.py b/vulncheck_sdk/models/advisory_product.py index 471a7195..20a95ecb 100644 --- a/vulncheck_sdk/models/advisory_product.py +++ b/vulncheck_sdk/models/advisory_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,18 +18,18 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self class AdvisoryProduct(BaseModel): """ - AdvisoryProduct + advisory.Product """ # noqa: E501 name: Optional[StrictStr] = None product_id: Optional[StrictStr] = None - product_identification_helper: Optional[Dict[str, Any]] = None + product_identification_helper: Optional[Dict[str, Any]] = Field(default=None, description="advisory.IdentificationHelper") __properties: ClassVar[List[str]] = ["name", "product_id", "product_identification_helper"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/advisory_product_branch.py b/vulncheck_sdk/models/advisory_product_branch.py index c0df8ac5..7e0449b9 100644 --- a/vulncheck_sdk/models/advisory_product_branch.py +++ b/vulncheck_sdk/models/advisory_product_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryProductBranch(BaseModel): """ - AdvisoryProductBranch + ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property """ # noqa: E501 branches: Optional[List[AdvisoryProductBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_product_specific_detail.py b/vulncheck_sdk/models/advisory_product_specific_detail.py index 927c9617..50085a9d 100644 --- a/vulncheck_sdk/models/advisory_product_specific_detail.py +++ b/vulncheck_sdk/models/advisory_product_specific_detail.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProductSpecificDetail(BaseModel): """ - AdvisoryProductSpecificDetail + advisory.ProductSpecificDetail """ # noqa: E501 id: Optional[StrictStr] = Field(default=None, alias="ID") display_value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_products_affected.py b/vulncheck_sdk/models/advisory_products_affected.py index 9588b2cc..9e009236 100644 --- a/vulncheck_sdk/models/advisory_products_affected.py +++ b/vulncheck_sdk/models/advisory_products_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProductsAffected(BaseModel): """ - AdvisoryProductsAffected + advisory.ProductsAffected """ # noqa: E501 cve: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_progress.py b/vulncheck_sdk/models/advisory_progress.py index 071faf9a..3a3811d6 100644 --- a/vulncheck_sdk/models/advisory_progress.py +++ b/vulncheck_sdk/models/advisory_progress.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProgress(BaseModel): """ - AdvisoryProgress + advisory.Progress """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_proofpoint.py b/vulncheck_sdk/models/advisory_proofpoint.py index 41a83064..7fd19899 100644 --- a/vulncheck_sdk/models/advisory_proofpoint.py +++ b/vulncheck_sdk/models/advisory_proofpoint.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryProofpoint(BaseModel): """ - AdvisoryProofpoint + advisory.Proofpoint """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_ptc.py b/vulncheck_sdk/models/advisory_ptc.py index faba95d2..d93320d7 100644 --- a/vulncheck_sdk/models/advisory_ptc.py +++ b/vulncheck_sdk/models/advisory_ptc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPTC(BaseModel): """ - AdvisoryPTC + advisory.PTC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ptm_descriptions.py b/vulncheck_sdk/models/advisory_ptm_descriptions.py index 0b04404e..ac7d5b91 100644 --- a/vulncheck_sdk/models/advisory_ptm_descriptions.py +++ b/vulncheck_sdk/models/advisory_ptm_descriptions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPTMDescriptions(BaseModel): """ - AdvisoryPTMDescriptions + advisory.PTMDescriptions """ # noqa: E501 cwe_id: Optional[StrictStr] = Field(default=None, alias="cweId") description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_publisher.py b/vulncheck_sdk/models/advisory_publisher.py index 77e842a0..e3c7f090 100644 --- a/vulncheck_sdk/models/advisory_publisher.py +++ b/vulncheck_sdk/models/advisory_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPublisher(BaseModel): """ - AdvisoryPublisher + advisory.Publisher """ # noqa: E501 category: Optional[StrictStr] = None contact_details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_pure_storage.py b/vulncheck_sdk/models/advisory_pure_storage.py index 1ee29da4..d7c2e49a 100644 --- a/vulncheck_sdk/models/advisory_pure_storage.py +++ b/vulncheck_sdk/models/advisory_pure_storage.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPureStorage(BaseModel): """ - AdvisoryPureStorage + advisory.PureStorage """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_py_pa_advisory.py b/vulncheck_sdk/models/advisory_py_pa_advisory.py index 4e425246..d0e0eaeb 100644 --- a/vulncheck_sdk/models/advisory_py_pa_advisory.py +++ b/vulncheck_sdk/models/advisory_py_pa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryPyPAAdvisory(BaseModel): """ - AdvisoryPyPAAdvisory + advisory.PyPAAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, description="ID is the PYSEC- identifier") affected: Optional[List[AdvisoryPyPAAffected]] = Field(default=None, description="Affected will list out the vulnerable versions.") diff --git a/vulncheck_sdk/models/advisory_py_pa_affected.py b/vulncheck_sdk/models/advisory_py_pa_affected.py index a8d2a0cc..bcc6094b 100644 --- a/vulncheck_sdk/models/advisory_py_pa_affected.py +++ b/vulncheck_sdk/models/advisory_py_pa_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryPyPAAffected(BaseModel): """ - AdvisoryPyPAAffected + advisory.PyPAAffected """ # noqa: E501 package: Optional[AdvisoryPyPAPackage] = None ranges: Optional[List[AdvisoryPyPARange]] = None diff --git a/vulncheck_sdk/models/advisory_py_pa_event.py b/vulncheck_sdk/models/advisory_py_pa_event.py index 71a5eaa3..27a3e73b 100644 --- a/vulncheck_sdk/models/advisory_py_pa_event.py +++ b/vulncheck_sdk/models/advisory_py_pa_event.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAEvent(BaseModel): """ - AdvisoryPyPAEvent + advisory.PyPAEvent """ # noqa: E501 fixed: Optional[StrictStr] = None introduced: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_py_pa_package.py b/vulncheck_sdk/models/advisory_py_pa_package.py index 8341d926..13bdeb85 100644 --- a/vulncheck_sdk/models/advisory_py_pa_package.py +++ b/vulncheck_sdk/models/advisory_py_pa_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAPackage(BaseModel): """ - AdvisoryPyPAPackage + advisory.PyPAPackage """ # noqa: E501 ecosystem: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_py_pa_range.py b/vulncheck_sdk/models/advisory_py_pa_range.py index 372042aa..11ec5581 100644 --- a/vulncheck_sdk/models/advisory_py_pa_range.py +++ b/vulncheck_sdk/models/advisory_py_pa_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryPyPARange(BaseModel): """ - AdvisoryPyPARange + advisory.PyPARange """ # noqa: E501 events: Optional[List[AdvisoryPyPAEvent]] = None ranges_type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_py_pa_reference.py b/vulncheck_sdk/models/advisory_py_pa_reference.py index ea83bf19..3a77f400 100644 --- a/vulncheck_sdk/models/advisory_py_pa_reference.py +++ b/vulncheck_sdk/models/advisory_py_pa_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryPyPAReference(BaseModel): """ - AdvisoryPyPAReference + advisory.PyPAReference """ # noqa: E501 refs_type: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_qnap_advisory.py b/vulncheck_sdk/models/advisory_qnap_advisory.py index b945d301..26633b36 100644 --- a/vulncheck_sdk/models/advisory_qnap_advisory.py +++ b/vulncheck_sdk/models/advisory_qnap_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQNAPAdvisory(BaseModel): """ - AdvisoryQNAPAdvisory + advisory.QNAPAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_qqid.py b/vulncheck_sdk/models/advisory_qqid.py index bacd276f..2a5a883b 100644 --- a/vulncheck_sdk/models/advisory_qqid.py +++ b/vulncheck_sdk/models/advisory_qqid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQQID(BaseModel): """ - AdvisoryQQID + advisory.QQID """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss3_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_qsb.py b/vulncheck_sdk/models/advisory_qsb.py index b8f58b80..0d87320b 100644 --- a/vulncheck_sdk/models/advisory_qsb.py +++ b/vulncheck_sdk/models/advisory_qsb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQSB(BaseModel): """ - AdvisoryQSB + advisory.QSB """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_qualcomm.py b/vulncheck_sdk/models/advisory_qualcomm.py index 01aa03c2..4f53df73 100644 --- a/vulncheck_sdk/models/advisory_qualcomm.py +++ b/vulncheck_sdk/models/advisory_qualcomm.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQualcomm(BaseModel): """ - AdvisoryQualcomm + advisory.Qualcomm """ # noqa: E501 chipsets: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_qualys.py b/vulncheck_sdk/models/advisory_qualys.py index 5f7d1459..2fa877eb 100644 --- a/vulncheck_sdk/models/advisory_qualys.py +++ b/vulncheck_sdk/models/advisory_qualys.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryQualys(BaseModel): """ - AdvisoryQualys + advisory.Qualys """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_qualys_qid.py b/vulncheck_sdk/models/advisory_qualys_qid.py index a77c9aa0..986adc76 100644 --- a/vulncheck_sdk/models/advisory_qualys_qid.py +++ b/vulncheck_sdk/models/advisory_qualys_qid.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryQualysQID(BaseModel): """ - AdvisoryQualysQID + advisory.QualysQID """ # noqa: E501 consequence: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_r_description.py b/vulncheck_sdk/models/advisory_r_description.py index cfb60fac..5c5b90fa 100644 --- a/vulncheck_sdk/models/advisory_r_description.py +++ b/vulncheck_sdk/models/advisory_r_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRDescription(BaseModel): """ - AdvisoryRDescription + advisory.RDescription """ # noqa: E501 value: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["value"] diff --git a/vulncheck_sdk/models/advisory_r_note.py b/vulncheck_sdk/models/advisory_r_note.py index a78226fe..a106b4e1 100644 --- a/vulncheck_sdk/models/advisory_r_note.py +++ b/vulncheck_sdk/models/advisory_r_note.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRNote(BaseModel): """ - AdvisoryRNote + advisory.RNote """ # noqa: E501 audience: Optional[StrictStr] = None ordinal: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_r_revision.py b/vulncheck_sdk/models/advisory_r_revision.py index fd894d5b..3207554f 100644 --- a/vulncheck_sdk/models/advisory_r_revision.py +++ b/vulncheck_sdk/models/advisory_r_revision.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class AdvisoryRRevision(BaseModel): """ - AdvisoryRRevision + advisory.RRevision """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[AdvisoryRDescription] = None number: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "description", "number"] diff --git a/vulncheck_sdk/models/advisory_r_score_set.py b/vulncheck_sdk/models/advisory_r_score_set.py index a4ca26d7..8433b2d3 100644 --- a/vulncheck_sdk/models/advisory_r_score_set.py +++ b/vulncheck_sdk/models/advisory_r_score_set.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRScoreSet(BaseModel): """ - AdvisoryRScoreSet + advisory.RScoreSet """ # noqa: E501 base_score: Optional[StrictStr] = None product_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_r_threat.py b/vulncheck_sdk/models/advisory_r_threat.py index e1cd0ba9..81b03845 100644 --- a/vulncheck_sdk/models/advisory_r_threat.py +++ b/vulncheck_sdk/models/advisory_r_threat.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class AdvisoryRThreat(BaseModel): """ - AdvisoryRThreat + advisory.RThreat """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="Date") + date: Optional[StrictStr] = Field(default=None, alias="Date") date_specified: Optional[StrictBool] = Field(default=None, alias="DateSpecified") description: Optional[AdvisoryIVal] = Field(default=None, alias="Description") product_id: Optional[List[StrictStr]] = Field(default=None, alias="ProductID") diff --git a/vulncheck_sdk/models/advisory_range.py b/vulncheck_sdk/models/advisory_range.py index d2595abd..b8e700a1 100644 --- a/vulncheck_sdk/models/advisory_range.py +++ b/vulncheck_sdk/models/advisory_range.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRange(BaseModel): """ - AdvisoryRange + advisory.Range """ # noqa: E501 events: Optional[List[AdvisoryEvent]] = None repo: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ransomware_exploit.py b/vulncheck_sdk/models/advisory_ransomware_exploit.py index 95c4c9fd..54403396 100644 --- a/vulncheck_sdk/models/advisory_ransomware_exploit.py +++ b/vulncheck_sdk/models/advisory_ransomware_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class AdvisoryRansomwareExploit(BaseModel): """ - AdvisoryRansomwareExploit + advisory.RansomwareExploit """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/models/advisory_record_type.py b/vulncheck_sdk/models/advisory_record_type.py index c61bd54f..384cd6cf 100644 --- a/vulncheck_sdk/models/advisory_record_type.py +++ b/vulncheck_sdk/models/advisory_record_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRecordType(BaseModel): """ - AdvisoryRecordType + advisory.RecordType """ # noqa: E501 finding: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_red_lion.py b/vulncheck_sdk/models/advisory_red_lion.py index 99b2fec5..8dad4b73 100644 --- a/vulncheck_sdk/models/advisory_red_lion.py +++ b/vulncheck_sdk/models/advisory_red_lion.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRedLion(BaseModel): """ - AdvisoryRedLion + advisory.RedLion """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_redhat_cve.py b/vulncheck_sdk/models/advisory_redhat_cve.py index eab41f67..a9504e96 100644 --- a/vulncheck_sdk/models/advisory_redhat_cve.py +++ b/vulncheck_sdk/models/advisory_redhat_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRedhatCVE(BaseModel): """ - AdvisoryRedhatCVE + advisory.RedhatCVE """ # noqa: E501 advisories: Optional[List[StrictStr]] = None advisory_csaf_vex_url: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_reference.py b/vulncheck_sdk/models/advisory_reference.py index bb08bc80..c5a4f8d1 100644 --- a/vulncheck_sdk/models/advisory_reference.py +++ b/vulncheck_sdk/models/advisory_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryReference(BaseModel): """ - AdvisoryReference + advisory.Reference """ # noqa: E501 href: Optional[StrictStr] = Field(default=None, description="sort") id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_related_rule.py b/vulncheck_sdk/models/advisory_related_rule.py index ce257caa..6ee97bfb 100644 --- a/vulncheck_sdk/models/advisory_related_rule.py +++ b/vulncheck_sdk/models/advisory_related_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRelatedRule(BaseModel): """ - AdvisoryRelatedRule + advisory.RelatedRule """ # noqa: E501 id: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_relationship.py b/vulncheck_sdk/models/advisory_relationship.py deleted file mode 100644 index d921e8c5..00000000 --- a/vulncheck_sdk/models/advisory_relationship.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRelationship(BaseModel): - """ - AdvisoryRelationship - """ # noqa: E501 - product_reference: Optional[StrictStr] = Field(default=None, alias="productReference") - relates_to_product_reference: Optional[StrictStr] = Field(default=None, alias="relatesToProductReference") - relation_type: Optional[StrictStr] = Field(default=None, alias="relationType") - __properties: ClassVar[List[str]] = ["productReference", "relatesToProductReference", "relationType"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productReference": obj.get("productReference"), - "relatesToProductReference": obj.get("relatesToProductReference"), - "relationType": obj.get("relationType") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_remediation_data.py b/vulncheck_sdk/models/advisory_remediation_data.py index 6869b39a..0fb9cc17 100644 --- a/vulncheck_sdk/models/advisory_remediation_data.py +++ b/vulncheck_sdk/models/advisory_remediation_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,10 +26,10 @@ class AdvisoryRemediationData(BaseModel): """ - AdvisoryRemediationData + advisory.RemediationData """ # noqa: E501 category: Optional[StrictStr] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") details: Optional[StrictStr] = None entitlements: Optional[List[StrictStr]] = None group_ids: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_renesas.py b/vulncheck_sdk/models/advisory_renesas.py index fd694561..42a660da 100644 --- a/vulncheck_sdk/models/advisory_renesas.py +++ b/vulncheck_sdk/models/advisory_renesas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRenesas(BaseModel): """ - AdvisoryRenesas + advisory.Renesas """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_reported_exploit.py b/vulncheck_sdk/models/advisory_reported_exploit.py index c40c91b4..2b583e63 100644 --- a/vulncheck_sdk/models/advisory_reported_exploit.py +++ b/vulncheck_sdk/models/advisory_reported_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryReportedExploit(BaseModel): """ - AdvisoryReportedExploit + advisory.ReportedExploit """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_restart_data.py b/vulncheck_sdk/models/advisory_restart_data.py index 1d392b57..e390ad6e 100644 --- a/vulncheck_sdk/models/advisory_restart_data.py +++ b/vulncheck_sdk/models/advisory_restart_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRestartData(BaseModel): """ - AdvisoryRestartData + advisory.RestartData """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_revision.py b/vulncheck_sdk/models/advisory_revision.py deleted file mode 100644 index 66a2d956..00000000 --- a/vulncheck_sdk/models/advisory_revision.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRevision(BaseModel): - """ - AdvisoryRevision - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - description: Optional[StrictStr] = None - number: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["date", "description", "number"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date"), - "description": obj.get("description"), - "number": obj.get("number") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_revision_history.py b/vulncheck_sdk/models/advisory_revision_history.py index 40bc4e29..b4c02296 100644 --- a/vulncheck_sdk/models/advisory_revision_history.py +++ b/vulncheck_sdk/models/advisory_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisoryRevisionHistory(BaseModel): """ - AdvisoryRevisionHistory + advisory.RevisionHistory """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") number: Optional[StrictStr] = None summary: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["date", "number", "summary"] diff --git a/vulncheck_sdk/models/advisory_revive.py b/vulncheck_sdk/models/advisory_revive.py index 5c0774c4..25904fc9 100644 --- a/vulncheck_sdk/models/advisory_revive.py +++ b/vulncheck_sdk/models/advisory_revive.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRevive(BaseModel): """ - AdvisoryRevive + advisory.Revive """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_rhel_cve.py b/vulncheck_sdk/models/advisory_rhel_cve.py index 2989f9f6..44009825 100644 --- a/vulncheck_sdk/models/advisory_rhel_cve.py +++ b/vulncheck_sdk/models/advisory_rhel_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRhelCVE(BaseModel): """ - AdvisoryRhelCVE + advisory.RhelCVE """ # noqa: E501 csaf: Optional[AdvisoryCSAF] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_roche.py b/vulncheck_sdk/models/advisory_roche.py index a7c99149..2c0b6c5e 100644 --- a/vulncheck_sdk/models/advisory_roche.py +++ b/vulncheck_sdk/models/advisory_roche.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRoche(BaseModel): """ - AdvisoryRoche + advisory.Roche """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_roche_cve.py b/vulncheck_sdk/models/advisory_roche_cve.py index ba21de88..ed787a55 100644 --- a/vulncheck_sdk/models/advisory_roche_cve.py +++ b/vulncheck_sdk/models/advisory_roche_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRocheCVE(BaseModel): """ - AdvisoryRocheCVE + advisory.RocheCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_rockwell.py b/vulncheck_sdk/models/advisory_rockwell.py index b39706d1..4fa0ec51 100644 --- a/vulncheck_sdk/models/advisory_rockwell.py +++ b/vulncheck_sdk/models/advisory_rockwell.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryRockwell(BaseModel): """ - AdvisoryRockwell + advisory.Rockwell """ # noqa: E501 affected_products: Optional[List[AdvisoryRockwellAffectedProduct]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_rockwell_affected_product.py b/vulncheck_sdk/models/advisory_rockwell_affected_product.py index e0acce7b..39646b12 100644 --- a/vulncheck_sdk/models/advisory_rockwell_affected_product.py +++ b/vulncheck_sdk/models/advisory_rockwell_affected_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockwellAffectedProduct(BaseModel): """ - AdvisoryRockwellAffectedProduct + advisory.RockwellAffectedProduct """ # noqa: E501 affected_catalog_number: Optional[StrictStr] = Field(default=None, alias="affectedCatalogNumber") affected_version: Optional[StrictStr] = Field(default=None, alias="affectedVersion") diff --git a/vulncheck_sdk/models/advisory_rocky_advisory.py b/vulncheck_sdk/models/advisory_rocky_advisory.py index b3e5391a..15f95277 100644 --- a/vulncheck_sdk/models/advisory_rocky_advisory.py +++ b/vulncheck_sdk/models/advisory_rocky_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRockyAdvisory(BaseModel): """ - AdvisoryRockyAdvisory + advisory.RockyAdvisory """ # noqa: E501 affected_products: Optional[List[StrictStr]] = Field(default=None, alias="affectedProducts") build_references: Optional[List[StrictStr]] = Field(default=None, alias="buildReferences") @@ -39,7 +39,7 @@ class AdvisoryRockyAdvisory(BaseModel): published_at: Optional[StrictStr] = Field(default=None, alias="publishedAt") reboot_suggested: Optional[StrictBool] = Field(default=None, alias="rebootSuggested") references: Optional[List[StrictStr]] = None - rpms: Optional[Dict[str, AdvisoryRockyVersion]] = None + rpms: Optional[Dict[str, AdvisoryRockyVersion]] = Field(default=None, description="advisory.RockyRpms") severity: Optional[StrictStr] = None short_code: Optional[StrictStr] = Field(default=None, alias="shortCode") solution: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_rocky_cve.py b/vulncheck_sdk/models/advisory_rocky_cve.py index 9b13966d..0394ef94 100644 --- a/vulncheck_sdk/models/advisory_rocky_cve.py +++ b/vulncheck_sdk/models/advisory_rocky_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyCve(BaseModel): """ - AdvisoryRockyCve + advisory.RockyCve """ # noqa: E501 cvss3_base_score: Optional[StrictStr] = Field(default=None, alias="cvss3BaseScore") cvss3_scoring_vector: Optional[StrictStr] = Field(default=None, alias="cvss3ScoringVector") diff --git a/vulncheck_sdk/models/advisory_rocky_errata.py b/vulncheck_sdk/models/advisory_rocky_errata.py index 42e0bfa6..a2029e1a 100644 --- a/vulncheck_sdk/models/advisory_rocky_errata.py +++ b/vulncheck_sdk/models/advisory_rocky_errata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryRockyErrata(BaseModel): """ - AdvisoryRockyErrata + advisory.RockyErrata """ # noqa: E501 advisory: Optional[AdvisoryRockyAdvisory] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_rocky_fix.py b/vulncheck_sdk/models/advisory_rocky_fix.py index 9a35ffea..7792dd8f 100644 --- a/vulncheck_sdk/models/advisory_rocky_fix.py +++ b/vulncheck_sdk/models/advisory_rocky_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyFix(BaseModel): """ - AdvisoryRockyFix + advisory.RockyFix """ # noqa: E501 description: Optional[StrictStr] = None source_by: Optional[StrictStr] = Field(default=None, alias="sourceBy") diff --git a/vulncheck_sdk/models/advisory_rocky_package.py b/vulncheck_sdk/models/advisory_rocky_package.py index ee883c84..4c7c9893 100644 --- a/vulncheck_sdk/models/advisory_rocky_package.py +++ b/vulncheck_sdk/models/advisory_rocky_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyPackage(BaseModel): """ - AdvisoryRockyPackage + advisory.RockyPackage """ # noqa: E501 distro: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_rocky_version.py b/vulncheck_sdk/models/advisory_rocky_version.py index 3e8cc845..b7297b5f 100644 --- a/vulncheck_sdk/models/advisory_rocky_version.py +++ b/vulncheck_sdk/models/advisory_rocky_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRockyVersion(BaseModel): """ - AdvisoryRockyVersion + advisory.RockyVersion """ # noqa: E501 nvras: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["nvras"] diff --git a/vulncheck_sdk/models/advisory_rsync.py b/vulncheck_sdk/models/advisory_rsync.py index a6d78e9b..b88c80e2 100644 --- a/vulncheck_sdk/models/advisory_rsync.py +++ b/vulncheck_sdk/models/advisory_rsync.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRsync(BaseModel): """ - AdvisoryRsync + advisory.Rsync """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ruckus.py b/vulncheck_sdk/models/advisory_ruckus.py index 19998c80..60227007 100644 --- a/vulncheck_sdk/models/advisory_ruckus.py +++ b/vulncheck_sdk/models/advisory_ruckus.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRuckus(BaseModel): """ - AdvisoryRuckus + advisory.Ruckus """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_rustsec_advisory.py b/vulncheck_sdk/models/advisory_rustsec_advisory.py index 799159ed..d4ab9620 100644 --- a/vulncheck_sdk/models/advisory_rustsec_advisory.py +++ b/vulncheck_sdk/models/advisory_rustsec_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisoryRustsecAdvisory(BaseModel): """ - AdvisoryRustsecAdvisory + advisory.RustsecAdvisory """ # noqa: E501 advisory: Optional[AdvisoryRustsecFrontMatterAdvisory] = None affected: Optional[AdvisoryRustsecAffected] = None diff --git a/vulncheck_sdk/models/advisory_rustsec_affected.py b/vulncheck_sdk/models/advisory_rustsec_affected.py index 39f56155..9ef7d8f8 100644 --- a/vulncheck_sdk/models/advisory_rustsec_affected.py +++ b/vulncheck_sdk/models/advisory_rustsec_affected.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRustsecAffected(BaseModel): """ - AdvisoryRustsecAffected + advisory.RustsecAffected """ # noqa: E501 arch: Optional[List[StrictStr]] = None functions: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_rustsec_front_matter_advisory.py b/vulncheck_sdk/models/advisory_rustsec_front_matter_advisory.py index c094efdb..fa873474 100644 --- a/vulncheck_sdk/models/advisory_rustsec_front_matter_advisory.py +++ b/vulncheck_sdk/models/advisory_rustsec_front_matter_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,12 +25,12 @@ class AdvisoryRustsecFrontMatterAdvisory(BaseModel): """ - AdvisoryRustsecFrontMatterAdvisory + advisory.RustsecFrontMatterAdvisory """ # noqa: E501 aliases: Optional[List[StrictStr]] = Field(default=None, description="Vulnerability aliases, e.g. CVE IDs (optional but recommended) Request a CVE for your RustSec vulns: https://iwantacve.org/") categories: Optional[List[StrictStr]] = Field(default=None, description="Optional: Categories this advisory falls under. Valid categories are: \"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\" \"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"") cvss: Optional[StrictStr] = Field(default=None, description="Optional: a Common Vulnerability Scoring System score. More information can be found on the CVSS website, https://www.first.org/cvss/.") - var_date: Optional[StrictStr] = Field(default=None, description="Disclosure date of the advisory as an RFC 3339 date (mandatory)", alias="date") + date: Optional[StrictStr] = Field(default=None, description="Disclosure date of the advisory as an RFC 3339 date (mandatory)", alias="date") informational: Optional[StrictStr] = Field(default=None, description="Optional: Indicates the type of informational security advisory - \"unsound\" for soundness issues - \"unmaintained\" for crates that are no longer maintained - \"notice\" for other informational notices") keywords: Optional[List[StrictStr]] = Field(default=None, description="Freeform keywords which describe this vulnerability, similar to Cargo (optional)") package: Optional[StrictStr] = Field(default=None, description="Name of the affected crate (mandatory)") diff --git a/vulncheck_sdk/models/advisory_rustsec_front_matter_versions.py b/vulncheck_sdk/models/advisory_rustsec_front_matter_versions.py index a51f3c0c..f945df10 100644 --- a/vulncheck_sdk/models/advisory_rustsec_front_matter_versions.py +++ b/vulncheck_sdk/models/advisory_rustsec_front_matter_versions.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryRustsecFrontMatterVersions(BaseModel): """ - AdvisoryRustsecFrontMatterVersions + advisory.RustsecFrontMatterVersions """ # noqa: E501 patched: Optional[List[StrictStr]] = None unaffected: Optional[List[StrictStr]] = Field(default=None, description="Versions which were never vulnerable (optional)") diff --git a/vulncheck_sdk/models/advisory_sa_advisory.py b/vulncheck_sdk/models/advisory_sa_advisory.py index 59f2cba8..09766359 100644 --- a/vulncheck_sdk/models/advisory_sa_advisory.py +++ b/vulncheck_sdk/models/advisory_sa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySAAdvisory(BaseModel): """ - AdvisorySAAdvisory + advisory.SAAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_safran.py b/vulncheck_sdk/models/advisory_safran.py index fad05a25..8e838833 100644 --- a/vulncheck_sdk/models/advisory_safran.py +++ b/vulncheck_sdk/models/advisory_safran.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySafran(BaseModel): """ - AdvisorySafran + advisory.Safran """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_saint_exploit.py b/vulncheck_sdk/models/advisory_saint_exploit.py index dc3b97e4..7b6a2f21 100644 --- a/vulncheck_sdk/models/advisory_saint_exploit.py +++ b/vulncheck_sdk/models/advisory_saint_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySaintExploit(BaseModel): """ - AdvisorySaintExploit + advisory.SaintExploit """ # noqa: E501 bid: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sales_force.py b/vulncheck_sdk/models/advisory_sales_force.py index fb5826b4..5a8d0690 100644 --- a/vulncheck_sdk/models/advisory_sales_force.py +++ b/vulncheck_sdk/models/advisory_sales_force.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySalesForce(BaseModel): """ - AdvisorySalesForce + advisory.SalesForce """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_samba.py b/vulncheck_sdk/models/advisory_samba.py index 147f7ce6..1f6dacad 100644 --- a/vulncheck_sdk/models/advisory_samba.py +++ b/vulncheck_sdk/models/advisory_samba.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySamba(BaseModel): """ - AdvisorySamba + advisory.Samba """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sandisk.py b/vulncheck_sdk/models/advisory_sandisk.py index 02acb36f..065a361d 100644 --- a/vulncheck_sdk/models/advisory_sandisk.py +++ b/vulncheck_sdk/models/advisory_sandisk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySandisk(BaseModel): """ - AdvisorySandisk + advisory.Sandisk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sans_dshield.py b/vulncheck_sdk/models/advisory_sans_dshield.py index 41be0124..a2235cf8 100644 --- a/vulncheck_sdk/models/advisory_sans_dshield.py +++ b/vulncheck_sdk/models/advisory_sans_dshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySansDshield(BaseModel): """ - AdvisorySansDshield + advisory.SansDshield """ # noqa: E501 count: Optional[StrictInt] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sap.py b/vulncheck_sdk/models/advisory_sap.py index 0548ceca..65229c48 100644 --- a/vulncheck_sdk/models/advisory_sap.py +++ b/vulncheck_sdk/models/advisory_sap.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySAP(BaseModel): """ - AdvisorySAP + advisory.SAP """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_schneider_cve.py b/vulncheck_sdk/models/advisory_schneider_cve.py index e458a346..dfe2069b 100644 --- a/vulncheck_sdk/models/advisory_schneider_cve.py +++ b/vulncheck_sdk/models/advisory_schneider_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySchneiderCVE(BaseModel): """ - AdvisorySchneiderCVE + advisory.SchneiderCVE """ # noqa: E501 cve: Optional[StrictStr] = None cvss_score3: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_schneider_electric_advisory.py b/vulncheck_sdk/models/advisory_schneider_electric_advisory.py index 245bcbf9..a4fff05b 100644 --- a/vulncheck_sdk/models/advisory_schneider_electric_advisory.py +++ b/vulncheck_sdk/models/advisory_schneider_electric_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySchneiderElectricAdvisory(BaseModel): """ - AdvisorySchneiderElectricAdvisory + advisory.SchneiderElectricAdvisory """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_schutzwerk.py b/vulncheck_sdk/models/advisory_schutzwerk.py index 072ee887..643b366f 100644 --- a/vulncheck_sdk/models/advisory_schutzwerk.py +++ b/vulncheck_sdk/models/advisory_schutzwerk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySchutzwerk(BaseModel): """ - AdvisorySchutzwerk + advisory.Schutzwerk """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_score_set.py b/vulncheck_sdk/models/advisory_score_set.py deleted file mode 100644 index 3de08b7f..00000000 --- a/vulncheck_sdk/models/advisory_score_set.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryScoreSet(BaseModel): - """ - AdvisoryScoreSet - """ # noqa: E501 - base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") - vector: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["baseScore", "vector"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "baseScore": obj.get("baseScore"), - "vector": obj.get("vector") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_sec_consult.py b/vulncheck_sdk/models/advisory_sec_consult.py index b7ace5cf..0de24ee1 100644 --- a/vulncheck_sdk/models/advisory_sec_consult.py +++ b/vulncheck_sdk/models/advisory_sec_consult.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySECConsult(BaseModel): """ - AdvisorySECConsult + advisory.SECConsult """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sec_fix.py b/vulncheck_sdk/models/advisory_sec_fix.py index 1a74c2d6..283b7121 100644 --- a/vulncheck_sdk/models/advisory_sec_fix.py +++ b/vulncheck_sdk/models/advisory_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySecFix(BaseModel): """ - AdvisorySecFix + advisory.SecFix """ # noqa: E501 arch: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_security_bulletin.py b/vulncheck_sdk/models/advisory_security_bulletin.py index d08ddc2d..fe1a92c8 100644 --- a/vulncheck_sdk/models/advisory_security_bulletin.py +++ b/vulncheck_sdk/models/advisory_security_bulletin.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class AdvisorySecurityBulletin(BaseModel): """ - AdvisorySecurityBulletin + advisory.SecurityBulletin """ # noqa: E501 acknowledgement: Optional[StrictStr] = None bulletin_id: Optional[StrictStr] = Field(default=None, alias="bulletinId") diff --git a/vulncheck_sdk/models/advisory_security_lab.py b/vulncheck_sdk/models/advisory_security_lab.py index e04aea1a..06852b33 100644 --- a/vulncheck_sdk/models/advisory_security_lab.py +++ b/vulncheck_sdk/models/advisory_security_lab.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySecurityLab(BaseModel): """ - AdvisorySecurityLab + advisory.SecurityLab """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_seebug_exploit.py b/vulncheck_sdk/models/advisory_seebug_exploit.py index 261b5c2c..ff73984f 100644 --- a/vulncheck_sdk/models/advisory_seebug_exploit.py +++ b/vulncheck_sdk/models/advisory_seebug_exploit.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySeebugExploit(BaseModel): """ - AdvisorySeebugExploit + advisory.SeebugExploit """ # noqa: E501 author: Optional[StrictStr] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sel.py b/vulncheck_sdk/models/advisory_sel.py index 6137bac0..9cded315 100644 --- a/vulncheck_sdk/models/advisory_sel.py +++ b/vulncheck_sdk/models/advisory_sel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySel(BaseModel): """ - AdvisorySel + advisory.Sel """ # noqa: E501 acknowledgement: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sentinel_one.py b/vulncheck_sdk/models/advisory_sentinel_one.py index 9b43944e..e8ab3f39 100644 --- a/vulncheck_sdk/models/advisory_sentinel_one.py +++ b/vulncheck_sdk/models/advisory_sentinel_one.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySentinelOne(BaseModel): """ - AdvisorySentinelOne + advisory.SentinelOne """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_service_now.py b/vulncheck_sdk/models/advisory_service_now.py index f7899b68..925a9ca3 100644 --- a/vulncheck_sdk/models/advisory_service_now.py +++ b/vulncheck_sdk/models/advisory_service_now.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryServiceNow(BaseModel): """ - AdvisoryServiceNow + advisory.ServiceNow """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_seven_zip.py b/vulncheck_sdk/models/advisory_seven_zip.py index a5f7ab25..1fc68a43 100644 --- a/vulncheck_sdk/models/advisory_seven_zip.py +++ b/vulncheck_sdk/models/advisory_seven_zip.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySevenZip(BaseModel): """ - AdvisorySevenZip + advisory.SevenZip """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_severity.py b/vulncheck_sdk/models/advisory_severity.py index f32f1b5f..cb079a6a 100644 --- a/vulncheck_sdk/models/advisory_severity.py +++ b/vulncheck_sdk/models/advisory_severity.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySeverity(BaseModel): """ - AdvisorySeverity + advisory.Severity """ # noqa: E501 score: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_shadow_server_exploited_vulnerability.py b/vulncheck_sdk/models/advisory_shadow_server_exploited_vulnerability.py index 78157fa0..6dddd807 100644 --- a/vulncheck_sdk/models/advisory_shadow_server_exploited_vulnerability.py +++ b/vulncheck_sdk/models/advisory_shadow_server_exploited_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryShadowServerExploitedVulnerability(BaseModel): """ - AdvisoryShadowServerExploitedVulnerability + advisory.ShadowServerExploitedVulnerability """ # noqa: E501 cnvd: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_shielder.py b/vulncheck_sdk/models/advisory_shielder.py index 6307b2fb..36da7f96 100644 --- a/vulncheck_sdk/models/advisory_shielder.py +++ b/vulncheck_sdk/models/advisory_shielder.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryShielder(BaseModel): """ - AdvisoryShielder + advisory.Shielder """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sick.py b/vulncheck_sdk/models/advisory_sick.py index fc036b9d..c1e4218d 100644 --- a/vulncheck_sdk/models/advisory_sick.py +++ b/vulncheck_sdk/models/advisory_sick.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySick(BaseModel): """ - AdvisorySick + advisory.Sick """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_siemens_acknowledgments.py b/vulncheck_sdk/models/advisory_siemens_acknowledgments.py index 15879a7a..bc413b82 100644 --- a/vulncheck_sdk/models/advisory_siemens_acknowledgments.py +++ b/vulncheck_sdk/models/advisory_siemens_acknowledgments.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensAcknowledgments(BaseModel): """ - AdvisorySiemensAcknowledgments + advisory.SiemensAcknowledgments """ # noqa: E501 names: Optional[List[StrictStr]] = None organization: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_advisory.py b/vulncheck_sdk/models/advisory_siemens_advisory.py index 60459619..112ad78a 100644 --- a/vulncheck_sdk/models/advisory_siemens_advisory.py +++ b/vulncheck_sdk/models/advisory_siemens_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensAdvisory(BaseModel): """ - AdvisorySiemensAdvisory + advisory.SiemensAdvisory """ # noqa: E501 csaf_url: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_siemens_branch.py b/vulncheck_sdk/models/advisory_siemens_branch.py index ab3b93eb..f9893b70 100644 --- a/vulncheck_sdk/models/advisory_siemens_branch.py +++ b/vulncheck_sdk/models/advisory_siemens_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensBranch(BaseModel): """ - AdvisorySiemensBranch + advisory.SiemensBranch """ # noqa: E501 branches: Optional[List[AdvisorySiemensSubBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_cvssv3.py b/vulncheck_sdk/models/advisory_siemens_cvssv3.py index 8f11afc3..af4dbcda 100644 --- a/vulncheck_sdk/models/advisory_siemens_cvssv3.py +++ b/vulncheck_sdk/models/advisory_siemens_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensCVSSV3(BaseModel): """ - AdvisorySiemensCVSSV3 + advisory.SiemensCVSSV3 """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") base_severity: Optional[StrictStr] = Field(default=None, alias="baseSeverity") diff --git a/vulncheck_sdk/models/advisory_siemens_cwe.py b/vulncheck_sdk/models/advisory_siemens_cwe.py index b4cdd721..76ed2a12 100644 --- a/vulncheck_sdk/models/advisory_siemens_cwe.py +++ b/vulncheck_sdk/models/advisory_siemens_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensCWE(BaseModel): """ - AdvisorySiemensCWE + advisory.SiemensCWE """ # noqa: E501 id: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_distribution.py b/vulncheck_sdk/models/advisory_siemens_distribution.py index fe906325..bc3c00bf 100644 --- a/vulncheck_sdk/models/advisory_siemens_distribution.py +++ b/vulncheck_sdk/models/advisory_siemens_distribution.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensDistribution(BaseModel): """ - AdvisorySiemensDistribution + advisory.SiemensDistribution """ # noqa: E501 text: Optional[StrictStr] = None tlp: Optional[AdvisorySiemensTLP] = None diff --git a/vulncheck_sdk/models/advisory_siemens_document.py b/vulncheck_sdk/models/advisory_siemens_document.py index ca3025bc..8f869f6a 100644 --- a/vulncheck_sdk/models/advisory_siemens_document.py +++ b/vulncheck_sdk/models/advisory_siemens_document.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisorySiemensDocument(BaseModel): """ - AdvisorySiemensDocument + advisory.SiemensDocument """ # noqa: E501 acknowledgments: Optional[List[AdvisorySiemensAcknowledgments]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_engine.py b/vulncheck_sdk/models/advisory_siemens_engine.py index f2d6d12d..03df1519 100644 --- a/vulncheck_sdk/models/advisory_siemens_engine.py +++ b/vulncheck_sdk/models/advisory_siemens_engine.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensEngine(BaseModel): """ - AdvisorySiemensEngine + advisory.SiemensEngine """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_generator.py b/vulncheck_sdk/models/advisory_siemens_generator.py index 4d98190d..80d90740 100644 --- a/vulncheck_sdk/models/advisory_siemens_generator.py +++ b/vulncheck_sdk/models/advisory_siemens_generator.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensGenerator(BaseModel): """ - AdvisorySiemensGenerator + advisory.SiemensGenerator """ # noqa: E501 engine: Optional[AdvisorySiemensEngine] = None __properties: ClassVar[List[str]] = ["engine"] diff --git a/vulncheck_sdk/models/advisory_siemens_notes.py b/vulncheck_sdk/models/advisory_siemens_notes.py index ad04f91d..5390229d 100644 --- a/vulncheck_sdk/models/advisory_siemens_notes.py +++ b/vulncheck_sdk/models/advisory_siemens_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensNotes(BaseModel): """ - AdvisorySiemensNotes + advisory.SiemensNotes """ # noqa: E501 category: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_product.py b/vulncheck_sdk/models/advisory_siemens_product.py index 17373787..9ea4814c 100644 --- a/vulncheck_sdk/models/advisory_siemens_product.py +++ b/vulncheck_sdk/models/advisory_siemens_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensProduct(BaseModel): """ - AdvisorySiemensProduct + advisory.SiemensProduct """ # noqa: E501 name: Optional[StrictStr] = None product_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_product_identification_helper.py b/vulncheck_sdk/models/advisory_siemens_product_identification_helper.py index 867c5e4d..8bcfa030 100644 --- a/vulncheck_sdk/models/advisory_siemens_product_identification_helper.py +++ b/vulncheck_sdk/models/advisory_siemens_product_identification_helper.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensProductIdentificationHelper(BaseModel): """ - AdvisorySiemensProductIdentificationHelper + advisory.SiemensProductIdentificationHelper """ # noqa: E501 model_numbers: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["model_numbers"] diff --git a/vulncheck_sdk/models/advisory_siemens_product_status.py b/vulncheck_sdk/models/advisory_siemens_product_status.py index 29563734..52bc96f4 100644 --- a/vulncheck_sdk/models/advisory_siemens_product_status.py +++ b/vulncheck_sdk/models/advisory_siemens_product_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensProductStatus(BaseModel): """ - AdvisorySiemensProductStatus + advisory.SiemensProductStatus """ # noqa: E501 known_affected: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["known_affected"] diff --git a/vulncheck_sdk/models/advisory_siemens_product_tree.py b/vulncheck_sdk/models/advisory_siemens_product_tree.py index d789ebf0..de52b184 100644 --- a/vulncheck_sdk/models/advisory_siemens_product_tree.py +++ b/vulncheck_sdk/models/advisory_siemens_product_tree.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensProductTree(BaseModel): """ - AdvisorySiemensProductTree + advisory.SiemensProductTree """ # noqa: E501 branches: Optional[List[AdvisorySiemensBranch]] = None __properties: ClassVar[List[str]] = ["branches"] diff --git a/vulncheck_sdk/models/advisory_siemens_publisher.py b/vulncheck_sdk/models/advisory_siemens_publisher.py index db99d09d..bc8b2f27 100644 --- a/vulncheck_sdk/models/advisory_siemens_publisher.py +++ b/vulncheck_sdk/models/advisory_siemens_publisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensPublisher(BaseModel): """ - AdvisorySiemensPublisher + advisory.SiemensPublisher """ # noqa: E501 category: Optional[StrictStr] = None contact_details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_references.py b/vulncheck_sdk/models/advisory_siemens_references.py index 04e5411d..1f61bf83 100644 --- a/vulncheck_sdk/models/advisory_siemens_references.py +++ b/vulncheck_sdk/models/advisory_siemens_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensReferences(BaseModel): """ - AdvisorySiemensReferences + advisory.SiemensReferences """ # noqa: E501 category: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_remediation.py b/vulncheck_sdk/models/advisory_siemens_remediation.py index 67247d2f..f369af9b 100644 --- a/vulncheck_sdk/models/advisory_siemens_remediation.py +++ b/vulncheck_sdk/models/advisory_siemens_remediation.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensRemediation(BaseModel): """ - AdvisorySiemensRemediation + advisory.SiemensRemediation """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_revision_history.py b/vulncheck_sdk/models/advisory_siemens_revision_history.py index 77a2dd0e..da8348b8 100644 --- a/vulncheck_sdk/models/advisory_siemens_revision_history.py +++ b/vulncheck_sdk/models/advisory_siemens_revision_history.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,9 +25,9 @@ class AdvisorySiemensRevisionHistory(BaseModel): """ - AdvisorySiemensRevisionHistory + advisory.SiemensRevisionHistory """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") legacy_version: Optional[StrictStr] = None number: Optional[StrictStr] = None summary: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_score.py b/vulncheck_sdk/models/advisory_siemens_score.py index f8083ec4..5087da64 100644 --- a/vulncheck_sdk/models/advisory_siemens_score.py +++ b/vulncheck_sdk/models/advisory_siemens_score.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensScore(BaseModel): """ - AdvisorySiemensScore + advisory.SiemensScore """ # noqa: E501 cvss_v3: Optional[AdvisorySiemensCVSSV3] = None products: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_siemens_sub_branch.py b/vulncheck_sdk/models/advisory_siemens_sub_branch.py index b072276c..44f923a9 100644 --- a/vulncheck_sdk/models/advisory_siemens_sub_branch.py +++ b/vulncheck_sdk/models/advisory_siemens_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensSubBranch(BaseModel): """ - AdvisorySiemensSubBranch + advisory.SiemensSubBranch """ # noqa: E501 branches: Optional[List[AdvisorySiemensSubSubBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_sub_sub_branch.py b/vulncheck_sdk/models/advisory_siemens_sub_sub_branch.py index 09730a4d..1fb199cb 100644 --- a/vulncheck_sdk/models/advisory_siemens_sub_sub_branch.py +++ b/vulncheck_sdk/models/advisory_siemens_sub_sub_branch.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySiemensSubSubBranch(BaseModel): """ - AdvisorySiemensSubSubBranch + advisory.SiemensSubSubBranch """ # noqa: E501 category: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_siemens_tlp.py b/vulncheck_sdk/models/advisory_siemens_tlp.py index f32dcba7..8a6238b5 100644 --- a/vulncheck_sdk/models/advisory_siemens_tlp.py +++ b/vulncheck_sdk/models/advisory_siemens_tlp.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySiemensTLP(BaseModel): """ - AdvisorySiemensTLP + advisory.SiemensTLP """ # noqa: E501 label: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["label"] diff --git a/vulncheck_sdk/models/advisory_siemens_tracking.py b/vulncheck_sdk/models/advisory_siemens_tracking.py index db8a790e..d0170c85 100644 --- a/vulncheck_sdk/models/advisory_siemens_tracking.py +++ b/vulncheck_sdk/models/advisory_siemens_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisorySiemensTracking(BaseModel): """ - AdvisorySiemensTracking + advisory.SiemensTracking """ # noqa: E501 current_release_date: Optional[StrictStr] = None generator: Optional[AdvisorySiemensGenerator] = None diff --git a/vulncheck_sdk/models/advisory_siemens_vulnerability.py b/vulncheck_sdk/models/advisory_siemens_vulnerability.py index 2e9cddcd..0dfd1d02 100644 --- a/vulncheck_sdk/models/advisory_siemens_vulnerability.py +++ b/vulncheck_sdk/models/advisory_siemens_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class AdvisorySiemensVulnerability(BaseModel): """ - AdvisorySiemensVulnerability + advisory.SiemensVulnerability """ # noqa: E501 cve: Optional[StrictStr] = None cwe: Optional[AdvisorySiemensCWE] = None diff --git a/vulncheck_sdk/models/advisory_sierra_wireless.py b/vulncheck_sdk/models/advisory_sierra_wireless.py index a4bb7dbf..af52ab75 100644 --- a/vulncheck_sdk/models/advisory_sierra_wireless.py +++ b/vulncheck_sdk/models/advisory_sierra_wireless.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySierraWireless(BaseModel): """ - AdvisorySierraWireless + advisory.SierraWireless """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sigma_rule.py b/vulncheck_sdk/models/advisory_sigma_rule.py index 1945a649..90e230ab 100644 --- a/vulncheck_sdk/models/advisory_sigma_rule.py +++ b/vulncheck_sdk/models/advisory_sigma_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySigmaRule(BaseModel): """ - AdvisorySigmaRule + advisory.SigmaRule """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sigma_rule_rule.py b/vulncheck_sdk/models/advisory_sigma_rule_rule.py index 48f99143..c5112171 100644 --- a/vulncheck_sdk/models/advisory_sigma_rule_rule.py +++ b/vulncheck_sdk/models/advisory_sigma_rule_rule.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,10 +27,10 @@ class AdvisorySigmaRuleRule(BaseModel): """ - AdvisorySigmaRuleRule + advisory.SigmaRuleRule """ # noqa: E501 author: Optional[StrictStr] = None - var_date: Optional[StrictStr] = Field(default=None, alias="date") + date: Optional[StrictStr] = Field(default=None, alias="date") description: Optional[StrictStr] = None detection: Optional[Dict[str, Any]] = None false_positives: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sing_cert.py b/vulncheck_sdk/models/advisory_sing_cert.py index 89ff35b9..c68b75b3 100644 --- a/vulncheck_sdk/models/advisory_sing_cert.py +++ b/vulncheck_sdk/models/advisory_sing_cert.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySingCert(BaseModel): """ - AdvisorySingCert + advisory.SingCert """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sitecore.py b/vulncheck_sdk/models/advisory_sitecore.py index 8e79e681..7bf688cd 100644 --- a/vulncheck_sdk/models/advisory_sitecore.py +++ b/vulncheck_sdk/models/advisory_sitecore.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySitecore(BaseModel): """ - AdvisorySitecore + advisory.Sitecore """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_slackware.py b/vulncheck_sdk/models/advisory_slackware.py index dbe1cafa..84457745 100644 --- a/vulncheck_sdk/models/advisory_slackware.py +++ b/vulncheck_sdk/models/advisory_slackware.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySlackware(BaseModel): """ - AdvisorySlackware + advisory.Slackware """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_software_update.py b/vulncheck_sdk/models/advisory_software_update.py index 4e7b4690..78427e47 100644 --- a/vulncheck_sdk/models/advisory_software_update.py +++ b/vulncheck_sdk/models/advisory_software_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySoftwareUpdate(BaseModel): """ - AdvisorySoftwareUpdate + advisory.SoftwareUpdate """ # noqa: E501 affected_version: Optional[StrictStr] = Field(default=None, alias="affectedVersion") cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_solar_winds_advisory.py b/vulncheck_sdk/models/advisory_solar_winds_advisory.py index 42fa1f3f..34b0bf8c 100644 --- a/vulncheck_sdk/models/advisory_solar_winds_advisory.py +++ b/vulncheck_sdk/models/advisory_solar_winds_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySolarWindsAdvisory(BaseModel): """ - AdvisorySolarWindsAdvisory + advisory.SolarWindsAdvisory """ # noqa: E501 affected_products: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_solr.py b/vulncheck_sdk/models/advisory_solr.py index 03107b11..4d5b17f0 100644 --- a/vulncheck_sdk/models/advisory_solr.py +++ b/vulncheck_sdk/models/advisory_solr.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySolr(BaseModel): """ - AdvisorySolr + advisory.Solr """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sonatype.py b/vulncheck_sdk/models/advisory_sonatype.py index 1705762e..99a96b33 100644 --- a/vulncheck_sdk/models/advisory_sonatype.py +++ b/vulncheck_sdk/models/advisory_sonatype.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySonatype(BaseModel): """ - AdvisorySonatype + advisory.Sonatype """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_sonic_wall_advisory.py b/vulncheck_sdk/models/advisory_sonic_wall_advisory.py index 181d4103..c5a5606b 100644 --- a/vulncheck_sdk/models/advisory_sonic_wall_advisory.py +++ b/vulncheck_sdk/models/advisory_sonic_wall_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySonicWallAdvisory(BaseModel): """ - AdvisorySonicWallAdvisory + advisory.SonicWallAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_products: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_spacelabs_healthcare_advisory.py b/vulncheck_sdk/models/advisory_spacelabs_healthcare_advisory.py index 33a8ca65..5d5c0f34 100644 --- a/vulncheck_sdk/models/advisory_spacelabs_healthcare_advisory.py +++ b/vulncheck_sdk/models/advisory_spacelabs_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySpacelabsHealthcareAdvisory(BaseModel): """ - AdvisorySpacelabsHealthcareAdvisory + advisory.SpacelabsHealthcareAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_splunk.py b/vulncheck_sdk/models/advisory_splunk.py index 477b58ff..886abb13 100644 --- a/vulncheck_sdk/models/advisory_splunk.py +++ b/vulncheck_sdk/models/advisory_splunk.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisorySplunk(BaseModel): """ - AdvisorySplunk + advisory.Splunk """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected_products: Optional[List[AdvisorySplunkProduct]] = None diff --git a/vulncheck_sdk/models/advisory_splunk_product.py b/vulncheck_sdk/models/advisory_splunk_product.py index f3c4109c..72381881 100644 --- a/vulncheck_sdk/models/advisory_splunk_product.py +++ b/vulncheck_sdk/models/advisory_splunk_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySplunkProduct(BaseModel): """ - AdvisorySplunkProduct + advisory.SplunkProduct """ # noqa: E501 affected_version: Optional[StrictStr] = None component: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_spring.py b/vulncheck_sdk/models/advisory_spring.py index 1ec206ac..8e9b9ef0 100644 --- a/vulncheck_sdk/models/advisory_spring.py +++ b/vulncheck_sdk/models/advisory_spring.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySpring(BaseModel): """ - AdvisorySpring + advisory.Spring """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ssa_source.py b/vulncheck_sdk/models/advisory_ssa_source.py index 06d51a41..5779f6aa 100644 --- a/vulncheck_sdk/models/advisory_ssa_source.py +++ b/vulncheck_sdk/models/advisory_ssa_source.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class AdvisorySSASource(BaseModel): """ - AdvisorySSASource + advisory.SSASource """ # noqa: E501 document: Optional[AdvisorySiemensDocument] = None product_tree: Optional[AdvisorySiemensProductTree] = None diff --git a/vulncheck_sdk/models/advisory_ssd_advisory.py b/vulncheck_sdk/models/advisory_ssd_advisory.py index 00186b70..ae3e9eaf 100644 --- a/vulncheck_sdk/models/advisory_ssd_advisory.py +++ b/vulncheck_sdk/models/advisory_ssd_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySSDAdvisory(BaseModel): """ - AdvisorySSDAdvisory + advisory.SSDAdvisory """ # noqa: E501 analysis: Optional[StrictStr] = None credit: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_status.py b/vulncheck_sdk/models/advisory_status.py deleted file mode 100644 index 12b62e4a..00000000 --- a/vulncheck_sdk/models/advisory_status.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryStatus(BaseModel): - """ - AdvisoryStatus - """ # noqa: E501 - product_id: Optional[List[StrictStr]] = Field(default=None, alias="productID") - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["productID", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productID": obj.get("productID"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_stormshield.py b/vulncheck_sdk/models/advisory_stormshield.py index 61519e63..8ba86e90 100644 --- a/vulncheck_sdk/models/advisory_stormshield.py +++ b/vulncheck_sdk/models/advisory_stormshield.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryStormshield(BaseModel): """ - AdvisoryStormshield + advisory.Stormshield """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_stryker_advisory.py b/vulncheck_sdk/models/advisory_stryker_advisory.py index 4a6c1aec..663a47e6 100644 --- a/vulncheck_sdk/models/advisory_stryker_advisory.py +++ b/vulncheck_sdk/models/advisory_stryker_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryStrykerAdvisory(BaseModel): """ - AdvisoryStrykerAdvisory + advisory.StrykerAdvisory """ # noqa: E501 affected_components: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_sudo.py b/vulncheck_sdk/models/advisory_sudo.py index ba1349f4..76f4c9f5 100644 --- a/vulncheck_sdk/models/advisory_sudo.py +++ b/vulncheck_sdk/models/advisory_sudo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySudo(BaseModel): """ - AdvisorySudo + advisory.Sudo """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_suse_security.py b/vulncheck_sdk/models/advisory_suse_security.py index 9657885a..b504cc7a 100644 --- a/vulncheck_sdk/models/advisory_suse_security.py +++ b/vulncheck_sdk/models/advisory_suse_security.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySuseSecurity(BaseModel): """ - AdvisorySuseSecurity + advisory.SuseSecurity """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_swisslog_healthcare_advisory.py b/vulncheck_sdk/models/advisory_swisslog_healthcare_advisory.py index 72518504..7b3579d8 100644 --- a/vulncheck_sdk/models/advisory_swisslog_healthcare_advisory.py +++ b/vulncheck_sdk/models/advisory_swisslog_healthcare_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySwisslogHealthcareAdvisory(BaseModel): """ - AdvisorySwisslogHealthcareAdvisory + advisory.SwisslogHealthcareAdvisory """ # noqa: E501 affected_components: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_symfony.py b/vulncheck_sdk/models/advisory_symfony.py index 9e96dcd0..a5ef47b4 100644 --- a/vulncheck_sdk/models/advisory_symfony.py +++ b/vulncheck_sdk/models/advisory_symfony.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySymfony(BaseModel): """ - AdvisorySymfony + advisory.Symfony """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_synacktiv.py b/vulncheck_sdk/models/advisory_synacktiv.py index 921a5806..781c9e62 100644 --- a/vulncheck_sdk/models/advisory_synacktiv.py +++ b/vulncheck_sdk/models/advisory_synacktiv.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySynacktiv(BaseModel): """ - AdvisorySynacktiv + advisory.Synacktiv """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_syncro_soft.py b/vulncheck_sdk/models/advisory_syncro_soft.py index 49ef9fad..9d3f6bb1 100644 --- a/vulncheck_sdk/models/advisory_syncro_soft.py +++ b/vulncheck_sdk/models/advisory_syncro_soft.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySyncroSoft(BaseModel): """ - AdvisorySyncroSoft + advisory.SyncroSoft """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_synology.py b/vulncheck_sdk/models/advisory_synology.py index b0cefc44..2e66e392 100644 --- a/vulncheck_sdk/models/advisory_synology.py +++ b/vulncheck_sdk/models/advisory_synology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySynology(BaseModel): """ - AdvisorySynology + advisory.Synology """ # noqa: E501 affected_products: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_syss.py b/vulncheck_sdk/models/advisory_syss.py index b5dc1037..5544480d 100644 --- a/vulncheck_sdk/models/advisory_syss.py +++ b/vulncheck_sdk/models/advisory_syss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisorySyss(BaseModel): """ - AdvisorySyss + advisory.Syss """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_tailscale.py b/vulncheck_sdk/models/advisory_tailscale.py index 6e401667..91524dd0 100644 --- a/vulncheck_sdk/models/advisory_tailscale.py +++ b/vulncheck_sdk/models/advisory_tailscale.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTailscale(BaseModel): """ - AdvisoryTailscale + advisory.Tailscale """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_talos_advisory.py b/vulncheck_sdk/models/advisory_talos_advisory.py index c63fc9ad..c1447366 100644 --- a/vulncheck_sdk/models/advisory_talos_advisory.py +++ b/vulncheck_sdk/models/advisory_talos_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTalosAdvisory(BaseModel): """ - AdvisoryTalosAdvisory + advisory.TalosAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_team_viewer.py b/vulncheck_sdk/models/advisory_team_viewer.py index 75f47af2..ef5b5236 100644 --- a/vulncheck_sdk/models/advisory_team_viewer.py +++ b/vulncheck_sdk/models/advisory_team_viewer.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTeamViewer(BaseModel): """ - AdvisoryTeamViewer + advisory.TeamViewer """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_tenable_research_advisory.py b/vulncheck_sdk/models/advisory_tenable_research_advisory.py index 562ca855..c9f5c15d 100644 --- a/vulncheck_sdk/models/advisory_tenable_research_advisory.py +++ b/vulncheck_sdk/models/advisory_tenable_research_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTenableResearchAdvisory(BaseModel): """ - AdvisoryTenableResearchAdvisory + advisory.TenableResearchAdvisory """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_tencent.py b/vulncheck_sdk/models/advisory_tencent.py index 7620eebd..0e8f24ff 100644 --- a/vulncheck_sdk/models/advisory_tencent.py +++ b/vulncheck_sdk/models/advisory_tencent.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTencent(BaseModel): """ - AdvisoryTencent + advisory.Tencent """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_thales.py b/vulncheck_sdk/models/advisory_thales.py index b2f8848b..d74817df 100644 --- a/vulncheck_sdk/models/advisory_thales.py +++ b/vulncheck_sdk/models/advisory_thales.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThales(BaseModel): """ - AdvisoryThales + advisory.Thales """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_the_missing_link.py b/vulncheck_sdk/models/advisory_the_missing_link.py index 6c76e335..d8be1ec1 100644 --- a/vulncheck_sdk/models/advisory_the_missing_link.py +++ b/vulncheck_sdk/models/advisory_the_missing_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTheMissingLink(BaseModel): """ - AdvisoryTheMissingLink + advisory.TheMissingLink """ # noqa: E501 affected_versions: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_thermo_fisher.py b/vulncheck_sdk/models/advisory_thermo_fisher.py index c2a98361..7bacd602 100644 --- a/vulncheck_sdk/models/advisory_thermo_fisher.py +++ b/vulncheck_sdk/models/advisory_thermo_fisher.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThermoFisher(BaseModel): """ - AdvisoryThermoFisher + advisory.ThermoFisher """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_threat.py b/vulncheck_sdk/models/advisory_threat.py deleted file mode 100644 index dab6ea5e..00000000 --- a/vulncheck_sdk/models/advisory_threat.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryThreat(BaseModel): - """ - AdvisoryThreat - """ # noqa: E501 - severity: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["severity", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "severity": obj.get("severity"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_threat_actor_with_external_objects.py b/vulncheck_sdk/models/advisory_threat_actor_with_external_objects.py index c065fe61..e4a255e5 100644 --- a/vulncheck_sdk/models/advisory_threat_actor_with_external_objects.py +++ b/vulncheck_sdk/models/advisory_threat_actor_with_external_objects.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -35,7 +35,7 @@ class AdvisoryThreatActorWithExternalObjects(BaseModel): """ - AdvisoryThreatActorWithExternalObjects + advisory.ThreatActorWithExternalObjects """ # noqa: E501 associated_capecs: Optional[List[AdvisoryCapec]] = None associated_cwes: Optional[List[AdvisoryCweData]] = None diff --git a/vulncheck_sdk/models/advisory_threat_data.py b/vulncheck_sdk/models/advisory_threat_data.py index dc57b9b7..6aeb2334 100644 --- a/vulncheck_sdk/models/advisory_threat_data.py +++ b/vulncheck_sdk/models/advisory_threat_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryThreatData(BaseModel): """ - AdvisoryThreatData + advisory.ThreatData """ # noqa: E501 category: Optional[StrictStr] = None details: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ti.py b/vulncheck_sdk/models/advisory_ti.py index 1a65cde4..74d33622 100644 --- a/vulncheck_sdk/models/advisory_ti.py +++ b/vulncheck_sdk/models/advisory_ti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTI(BaseModel): """ - AdvisoryTI + advisory.TI """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_tibco.py b/vulncheck_sdk/models/advisory_tibco.py index 3f9e1ae2..c9a5b1f5 100644 --- a/vulncheck_sdk/models/advisory_tibco.py +++ b/vulncheck_sdk/models/advisory_tibco.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTibco(BaseModel): """ - AdvisoryTibco + advisory.Tibco """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_timeline.py b/vulncheck_sdk/models/advisory_timeline.py index 0183b081..7a9ca37e 100644 --- a/vulncheck_sdk/models/advisory_timeline.py +++ b/vulncheck_sdk/models/advisory_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTimeline(BaseModel): """ - AdvisoryTimeline + advisory.Timeline """ # noqa: E501 lang: Optional[StrictStr] = None time: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time") diff --git a/vulncheck_sdk/models/advisory_tool.py b/vulncheck_sdk/models/advisory_tool.py index f72c0587..5c6b157a 100644 --- a/vulncheck_sdk/models/advisory_tool.py +++ b/vulncheck_sdk/models/advisory_tool.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryTool(BaseModel): """ - AdvisoryTool + advisory.Tool """ # noqa: E501 name: Optional[StrictStr] = None references: Optional[List[AdvisoryToolRef]] = None diff --git a/vulncheck_sdk/models/advisory_tool_ref.py b/vulncheck_sdk/models/advisory_tool_ref.py index 7c821aee..792e4995 100644 --- a/vulncheck_sdk/models/advisory_tool_ref.py +++ b/vulncheck_sdk/models/advisory_tool_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryToolRef(BaseModel): """ - AdvisoryToolRef + advisory.ToolRef """ # noqa: E501 date_added: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_tp_link.py b/vulncheck_sdk/models/advisory_tp_link.py index 9c4d2e86..dab0c2ed 100644 --- a/vulncheck_sdk/models/advisory_tp_link.py +++ b/vulncheck_sdk/models/advisory_tp_link.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTPLink(BaseModel): """ - AdvisoryTPLink + advisory.TPLink """ # noqa: E501 bulletin_id: Optional[StrictInt] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_tracking.py b/vulncheck_sdk/models/advisory_tracking.py index 4835f145..8d8163b8 100644 --- a/vulncheck_sdk/models/advisory_tracking.py +++ b/vulncheck_sdk/models/advisory_tracking.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryTracking(BaseModel): """ - AdvisoryTracking + advisory.Tracking """ # noqa: E501 current_release_date: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_tracking_id.py b/vulncheck_sdk/models/advisory_tracking_id.py index 60f9937e..f377b3ec 100644 --- a/vulncheck_sdk/models/advisory_tracking_id.py +++ b/vulncheck_sdk/models/advisory_tracking_id.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrackingID(BaseModel): """ - AdvisoryTrackingID + advisory.TrackingID """ # noqa: E501 system_name: Optional[StrictStr] = None text: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_trane_technology.py b/vulncheck_sdk/models/advisory_trane_technology.py index fff5f1fa..40d18488 100644 --- a/vulncheck_sdk/models/advisory_trane_technology.py +++ b/vulncheck_sdk/models/advisory_trane_technology.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTraneTechnology(BaseModel): """ - AdvisoryTraneTechnology + advisory.TraneTechnology """ # noqa: E501 brand: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_trend_micro.py b/vulncheck_sdk/models/advisory_trend_micro.py index eb8844c5..02d610c1 100644 --- a/vulncheck_sdk/models/advisory_trend_micro.py +++ b/vulncheck_sdk/models/advisory_trend_micro.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrendMicro(BaseModel): """ - AdvisoryTrendMicro + advisory.TrendMicro """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_triage_notes.py b/vulncheck_sdk/models/advisory_triage_notes.py index fd8638a0..5cf15117 100644 --- a/vulncheck_sdk/models/advisory_triage_notes.py +++ b/vulncheck_sdk/models/advisory_triage_notes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTriageNotes(BaseModel): """ - AdvisoryTriageNotes + advisory.TriageNotes """ # noqa: E501 references: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["references"] diff --git a/vulncheck_sdk/models/advisory_trustwave.py b/vulncheck_sdk/models/advisory_trustwave.py index 36430c59..7099a44f 100644 --- a/vulncheck_sdk/models/advisory_trustwave.py +++ b/vulncheck_sdk/models/advisory_trustwave.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTrustwave(BaseModel): """ - AdvisoryTrustwave + advisory.Trustwave """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_tw_cert_advisory.py b/vulncheck_sdk/models/advisory_tw_cert_advisory.py index 2e742b3d..7596f3dd 100644 --- a/vulncheck_sdk/models/advisory_tw_cert_advisory.py +++ b/vulncheck_sdk/models/advisory_tw_cert_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryTWCertAdvisory(BaseModel): """ - AdvisoryTWCertAdvisory + advisory.TWCertAdvisory """ # noqa: E501 affected_cn: Optional[StrictStr] = None affected_en: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ubiquiti.py b/vulncheck_sdk/models/advisory_ubiquiti.py index 5c4e1f2b..0db334e2 100644 --- a/vulncheck_sdk/models/advisory_ubiquiti.py +++ b/vulncheck_sdk/models/advisory_ubiquiti.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUbiquiti(BaseModel): """ - AdvisoryUbiquiti + advisory.Ubiquiti """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_ubuntu_cve.py b/vulncheck_sdk/models/advisory_ubuntu_cve.py index 0831ddfe..aa47a374 100644 --- a/vulncheck_sdk/models/advisory_ubuntu_cve.py +++ b/vulncheck_sdk/models/advisory_ubuntu_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryUbuntuCVE(BaseModel): """ - AdvisoryUbuntuCVE + advisory.UbuntuCVE """ # noqa: E501 affected_packages: Optional[List[AdvisoryAffectedUbuntuPackage]] = None cve: Optional[List[StrictStr]] = Field(default=None, description="Candidate") diff --git a/vulncheck_sdk/models/advisory_ubuntu_package_release_status.py b/vulncheck_sdk/models/advisory_ubuntu_package_release_status.py index 8b86f99f..905e7b5e 100644 --- a/vulncheck_sdk/models/advisory_ubuntu_package_release_status.py +++ b/vulncheck_sdk/models/advisory_ubuntu_package_release_status.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUbuntuPackageReleaseStatus(BaseModel): """ - AdvisoryUbuntuPackageReleaseStatus + advisory.UbuntuPackageReleaseStatus """ # noqa: E501 affected: Optional[StrictBool] = None fixed: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/advisory_unify.py b/vulncheck_sdk/models/advisory_unify.py index 1450508f..b51b5f35 100644 --- a/vulncheck_sdk/models/advisory_unify.py +++ b/vulncheck_sdk/models/advisory_unify.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUnify(BaseModel): """ - AdvisoryUnify + advisory.Unify """ # noqa: E501 advisory_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_unisoc.py b/vulncheck_sdk/models/advisory_unisoc.py index 3ddc6213..dca799a8 100644 --- a/vulncheck_sdk/models/advisory_unisoc.py +++ b/vulncheck_sdk/models/advisory_unisoc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUnisoc(BaseModel): """ - AdvisoryUnisoc + advisory.Unisoc """ # noqa: E501 access_vector: Optional[StrictStr] = None affected_chipsets: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_update.py b/vulncheck_sdk/models/advisory_update.py index a5f4b3d3..ce0fa3a4 100644 --- a/vulncheck_sdk/models/advisory_update.py +++ b/vulncheck_sdk/models/advisory_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.models.advisory_package import AdvisoryPackage from vulncheck_sdk.models.advisory_reference import AdvisoryReference from typing import Optional, Set @@ -28,13 +27,13 @@ class AdvisoryUpdate(BaseModel): """ - AdvisoryUpdate + advisory.Update """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[AdvisoryDateTime] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="advisory.DateTime") os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[AdvisoryPackage]] = None @@ -42,7 +41,7 @@ class AdvisoryUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[AdvisoryDateTime] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="advisory.DateTime") __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": AdvisoryDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [AdvisoryPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": AdvisoryDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/advisory_updated.py b/vulncheck_sdk/models/advisory_updated.py deleted file mode 100644 index 7d63dbe0..00000000 --- a/vulncheck_sdk/models/advisory_updated.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryUpdated(BaseModel): - """ - AdvisoryUpdated - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_usd.py b/vulncheck_sdk/models/advisory_usd.py index e8ab1ba1..3d0cdea1 100644 --- a/vulncheck_sdk/models/advisory_usd.py +++ b/vulncheck_sdk/models/advisory_usd.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUSD(BaseModel): """ - AdvisoryUSD + advisory.USD """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_usom_advisory.py b/vulncheck_sdk/models/advisory_usom_advisory.py index 2935b532..4a0eb22f 100644 --- a/vulncheck_sdk/models/advisory_usom_advisory.py +++ b/vulncheck_sdk/models/advisory_usom_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryUSOMAdvisory(BaseModel): """ - AdvisoryUSOMAdvisory + advisory.USOMAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_v3_acceptance_level.py b/vulncheck_sdk/models/advisory_v3_acceptance_level.py index be5c0b01..f711903c 100644 --- a/vulncheck_sdk/models/advisory_v3_acceptance_level.py +++ b/vulncheck_sdk/models/advisory_v3_acceptance_level.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryV3AcceptanceLevel(BaseModel): """ - AdvisoryV3AcceptanceLevel + advisory.V3AcceptanceLevel """ # noqa: E501 description: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/models/advisory_van_dyke.py b/vulncheck_sdk/models/advisory_van_dyke.py index ef6aeef8..726cd466 100644 --- a/vulncheck_sdk/models/advisory_van_dyke.py +++ b/vulncheck_sdk/models/advisory_van_dyke.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVanDyke(BaseModel): """ - AdvisoryVanDyke + advisory.VanDyke """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vapid_labs_advisory.py b/vulncheck_sdk/models/advisory_vapid_labs_advisory.py index 178342aa..b563a767 100644 --- a/vulncheck_sdk/models/advisory_vapid_labs_advisory.py +++ b/vulncheck_sdk/models/advisory_vapid_labs_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVapidLabsAdvisory(BaseModel): """ - AdvisoryVapidLabsAdvisory + advisory.VapidLabsAdvisory """ # noqa: E501 author: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vc_vulnerable_cpes.py b/vulncheck_sdk/models/advisory_vc_vulnerable_cpes.py index 09969b4d..7691f0a5 100644 --- a/vulncheck_sdk/models/advisory_vc_vulnerable_cpes.py +++ b/vulncheck_sdk/models/advisory_vc_vulnerable_cpes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVCVulnerableCPEs(BaseModel): """ - AdvisoryVCVulnerableCPEs + advisory.VCVulnerableCPEs """ # noqa: E501 cve: Optional[StrictStr] = None unrolled: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vccpe_dictionary.py b/vulncheck_sdk/models/advisory_vccpe_dictionary.py index 9ebf0291..4192204b 100644 --- a/vulncheck_sdk/models/advisory_vccpe_dictionary.py +++ b/vulncheck_sdk/models/advisory_vccpe_dictionary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVCCPEDictionary(BaseModel): """ - AdvisoryVCCPEDictionary + advisory.VCCPEDictionary """ # noqa: E501 base_cpe: Optional[StrictStr] = Field(default=None, alias="baseCPE") versions: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vde_advisory.py b/vulncheck_sdk/models/advisory_vde_advisory.py index 566e381b..6a8dfa2a 100644 --- a/vulncheck_sdk/models/advisory_vde_advisory.py +++ b/vulncheck_sdk/models/advisory_vde_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVDEAdvisory(BaseModel): """ - AdvisoryVDEAdvisory + advisory.VDEAdvisory """ # noqa: E501 csaf_json: Optional[AdvisoryCSAF] = None csaf_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_veeam.py b/vulncheck_sdk/models/advisory_veeam.py index 715ed747..1c2dbbbe 100644 --- a/vulncheck_sdk/models/advisory_veeam.py +++ b/vulncheck_sdk/models/advisory_veeam.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVeeam(BaseModel): """ - AdvisoryVeeam + advisory.Veeam """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vendor_name_for_threat_actor.py b/vulncheck_sdk/models/advisory_vendor_name_for_threat_actor.py index a646f195..94a1d4c8 100644 --- a/vulncheck_sdk/models/advisory_vendor_name_for_threat_actor.py +++ b/vulncheck_sdk/models/advisory_vendor_name_for_threat_actor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorNameForThreatActor(BaseModel): """ - AdvisoryVendorNameForThreatActor + advisory.VendorNameForThreatActor """ # noqa: E501 threat_actor_name: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vendor_product.py b/vulncheck_sdk/models/advisory_vendor_product.py index 02760f7f..e4567ca9 100644 --- a/vulncheck_sdk/models/advisory_vendor_product.py +++ b/vulncheck_sdk/models/advisory_vendor_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorProduct(BaseModel): """ - AdvisoryVendorProduct + advisory.VendorProduct """ # noqa: E501 product: Optional[StrictStr] = None vendor: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vendor_ref.py b/vulncheck_sdk/models/advisory_vendor_ref.py index 5c3cb337..65184fc7 100644 --- a/vulncheck_sdk/models/advisory_vendor_ref.py +++ b/vulncheck_sdk/models/advisory_vendor_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVendorRef(BaseModel): """ - AdvisoryVendorRef + advisory.VendorRef """ # noqa: E501 vendor_ref: Optional[StrictStr] = None vendor_ref_url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_veritas.py b/vulncheck_sdk/models/advisory_veritas.py index 87ea191c..46c7c143 100644 --- a/vulncheck_sdk/models/advisory_veritas.py +++ b/vulncheck_sdk/models/advisory_veritas.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVeritas(BaseModel): """ - AdvisoryVeritas + advisory.Veritas """ # noqa: E501 bulletin_id: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_virtuozzo.py b/vulncheck_sdk/models/advisory_virtuozzo.py index 767f8620..f3c5221d 100644 --- a/vulncheck_sdk/models/advisory_virtuozzo.py +++ b/vulncheck_sdk/models/advisory_virtuozzo.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVirtuozzo(BaseModel): """ - AdvisoryVirtuozzo + advisory.Virtuozzo """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vlc.py b/vulncheck_sdk/models/advisory_vlc.py index b691cc11..adf83664 100644 --- a/vulncheck_sdk/models/advisory_vlc.py +++ b/vulncheck_sdk/models/advisory_vlc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVLC(BaseModel): """ - AdvisoryVLC + advisory.VLC """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vm_ware_advisory.py b/vulncheck_sdk/models/advisory_vm_ware_advisory.py index 159f192e..9699439d 100644 --- a/vulncheck_sdk/models/advisory_vm_ware_advisory.py +++ b/vulncheck_sdk/models/advisory_vm_ware_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVMWareAdvisory(BaseModel): """ - AdvisoryVMWareAdvisory + advisory.VMWareAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="AdvisoryID") advisory_url: Optional[StrictStr] = Field(default=None, alias="AdvisoryURL") diff --git a/vulncheck_sdk/models/advisory_void_sec.py b/vulncheck_sdk/models/advisory_void_sec.py index 876bc1eb..168ad40d 100644 --- a/vulncheck_sdk/models/advisory_void_sec.py +++ b/vulncheck_sdk/models/advisory_void_sec.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVoidSec(BaseModel): """ - AdvisoryVoidSec + advisory.VoidSec """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vuln_check.py b/vulncheck_sdk/models/advisory_vuln_check.py index 8df62392..a37d0566 100644 --- a/vulncheck_sdk/models/advisory_vuln_check.py +++ b/vulncheck_sdk/models/advisory_vuln_check.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnCheck(BaseModel): """ - AdvisoryVulnCheck + advisory.VulnCheck """ # noqa: E501 affecting: Optional[List[StrictStr]] = None credit: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vuln_check_config.py b/vulncheck_sdk/models/advisory_vuln_check_config.py index 122a396f..e575d412 100644 --- a/vulncheck_sdk/models/advisory_vuln_check_config.py +++ b/vulncheck_sdk/models/advisory_vuln_check_config.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnCheckConfig(BaseModel): """ - AdvisoryVulnCheckConfig + advisory.VulnCheckConfig """ # noqa: E501 config: Optional[List[AdvisoryNVD20Configuration]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vuln_check_cve_list_v5.py b/vulncheck_sdk/models/advisory_vuln_check_cve_list_v5.py index a1cfd7a2..e02bb296 100644 --- a/vulncheck_sdk/models/advisory_vuln_check_cve_list_v5.py +++ b/vulncheck_sdk/models/advisory_vuln_check_cve_list_v5.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnCheckCVEListV5(BaseModel): """ - AdvisoryVulnCheckCVEListV5 + advisory.VulnCheckCVEListV5 """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vuln_check_kev.py b/vulncheck_sdk/models/advisory_vuln_check_kev.py index 0ef20d5b..a8d50cb8 100644 --- a/vulncheck_sdk/models/advisory_vuln_check_kev.py +++ b/vulncheck_sdk/models/advisory_vuln_check_kev.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnCheckKEV(BaseModel): """ - AdvisoryVulnCheckKEV + advisory.VulnCheckKEV """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") cisa_date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vuln_check_package.py b/vulncheck_sdk/models/advisory_vuln_check_package.py index a2da057a..aaa1747e 100644 --- a/vulncheck_sdk/models/advisory_vuln_check_package.py +++ b/vulncheck_sdk/models/advisory_vuln_check_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnCheckPackage(BaseModel): """ - AdvisoryVulnCheckPackage + advisory.VulnCheckPackage """ # noqa: E501 arch: Optional[StrictStr] = None distro: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vulnerability.py b/vulncheck_sdk/models/advisory_vulnerability.py deleted file mode 100644 index fff51956..00000000 --- a/vulncheck_sdk/models/advisory_vulnerability.py +++ /dev/null @@ -1,136 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet -from vulncheck_sdk.models.advisory_status import AdvisoryStatus -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat -from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryVulnerability(BaseModel): - """ - AdvisoryVulnerability - """ # noqa: E501 - cve: Optional[StrictStr] = None - cvssscore_sets: Optional[AdvisoryScoreSet] = Field(default=None, alias="cvssscoreSets") - description: Optional[StrictStr] = None - packages: Optional[List[AdvisoryVulnCheckPackage]] = Field(default=None, description="vulncheck addition") - product_statuses: Optional[List[AdvisoryStatus]] = Field(default=None, alias="productStatuses") - references: Optional[List[AdvisoryCVRFReference]] = None - threats: Optional[List[AdvisoryThreat]] = None - __properties: ClassVar[List[str]] = ["cve", "cvssscoreSets", "description", "packages", "productStatuses", "references", "threats"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of cvssscore_sets - if self.cvssscore_sets: - _dict['cvssscoreSets'] = self.cvssscore_sets.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in packages (list) - _items = [] - if self.packages: - for _item_packages in self.packages: - if _item_packages: - _items.append(_item_packages.to_dict()) - _dict['packages'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in product_statuses (list) - _items = [] - if self.product_statuses: - for _item_product_statuses in self.product_statuses: - if _item_product_statuses: - _items.append(_item_product_statuses.to_dict()) - _dict['productStatuses'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in threats (list) - _items = [] - if self.threats: - for _item_threats in self.threats: - if _item_threats: - _items.append(_item_threats.to_dict()) - _dict['threats'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cve": obj.get("cve"), - "cvssscoreSets": AdvisoryScoreSet.from_dict(obj["cvssscoreSets"]) if obj.get("cvssscoreSets") is not None else None, - "description": obj.get("description"), - "packages": [AdvisoryVulnCheckPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, - "productStatuses": [AdvisoryStatus.from_dict(_item) for _item in obj["productStatuses"]] if obj.get("productStatuses") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "threats": [AdvisoryThreat.from_dict(_item) for _item in obj["threats"]] if obj.get("threats") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_vulnerable_debian_package.py b/vulncheck_sdk/models/advisory_vulnerable_debian_package.py index 617690c8..cb8ec5de 100644 --- a/vulncheck_sdk/models/advisory_vulnerable_debian_package.py +++ b/vulncheck_sdk/models/advisory_vulnerable_debian_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnerableDebianPackage(BaseModel): """ - AdvisoryVulnerableDebianPackage + advisory.VulnerableDebianPackage """ # noqa: E501 associated_cves: Optional[List[AdvisoryDebianCVE]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_vulnerable_product.py b/vulncheck_sdk/models/advisory_vulnerable_product.py index 9f8cea7c..0a48b6b7 100644 --- a/vulncheck_sdk/models/advisory_vulnerable_product.py +++ b/vulncheck_sdk/models/advisory_vulnerable_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnerableProduct(BaseModel): """ - AdvisoryVulnerableProduct + advisory.VulnerableProduct """ # noqa: E501 name: Optional[StrictStr] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vulnrichment.py b/vulncheck_sdk/models/advisory_vulnrichment.py index 2b8f4387..8993a502 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment.py +++ b/vulncheck_sdk/models/advisory_vulnrichment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichment(BaseModel): """ - AdvisoryVulnrichment + advisory.Vulnrichment """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vulnrichment_containers.py b/vulncheck_sdk/models/advisory_vulnrichment_containers.py index 7cee03df..041a6b01 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_containers.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_containers.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnrichmentContainers(BaseModel): """ - AdvisoryVulnrichmentContainers + advisory.VulnrichmentContainers """ # noqa: E501 adp: Optional[List[AdvisoryADP]] = None cna: Optional[AdvisoryMCna] = None diff --git a/vulncheck_sdk/models/advisory_vulnrichment_content.py b/vulncheck_sdk/models/advisory_vulnrichment_content.py index 658a8e03..adc9544a 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_content.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_content.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentContent(BaseModel): """ - AdvisoryVulnrichmentContent + advisory.VulnrichmentContent """ # noqa: E501 id: Optional[StrictStr] = None options: Optional[List[AdvisoryVulnrichmentOption]] = None diff --git a/vulncheck_sdk/models/advisory_vulnrichment_cve_ref.py b/vulncheck_sdk/models/advisory_vulnrichment_cve_ref.py index 03d75a23..e80a723f 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_cve_ref.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_cve_ref.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryVulnrichmentCVERef(BaseModel): """ - AdvisoryVulnrichmentCVERef + advisory.VulnrichmentCVERef """ # noqa: E501 containers: Optional[AdvisoryVulnrichmentContainers] = None cve_metadata: Optional[AdvisoryMCveMetadata] = Field(default=None, alias="cveMetadata") diff --git a/vulncheck_sdk/models/advisory_vulnrichment_metric.py b/vulncheck_sdk/models/advisory_vulnrichment_metric.py index 49c17eb0..75cd939b 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_metric.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentMetric(BaseModel): """ - AdvisoryVulnrichmentMetric + advisory.VulnrichmentMetric """ # noqa: E501 other: Optional[AdvisoryVulnrichmentOther] = None __properties: ClassVar[List[str]] = ["other"] diff --git a/vulncheck_sdk/models/advisory_vulnrichment_option.py b/vulncheck_sdk/models/advisory_vulnrichment_option.py index e3d9cc86..e60836c6 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_option.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_option.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVulnrichmentOption(BaseModel): """ - AdvisoryVulnrichmentOption + advisory.VulnrichmentOption """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") exploitation: Optional[StrictStr] = Field(default=None, alias="Exploitation") diff --git a/vulncheck_sdk/models/advisory_vulnrichment_other.py b/vulncheck_sdk/models/advisory_vulnrichment_other.py index 8b06e390..2b890178 100644 --- a/vulncheck_sdk/models/advisory_vulnrichment_other.py +++ b/vulncheck_sdk/models/advisory_vulnrichment_other.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryVulnrichmentOther(BaseModel): """ - AdvisoryVulnrichmentOther + advisory.VulnrichmentOther """ # noqa: E501 content: Optional[AdvisoryVulnrichmentContent] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_vyaire_advisory.py b/vulncheck_sdk/models/advisory_vyaire_advisory.py index 3dda7d70..8a372c96 100644 --- a/vulncheck_sdk/models/advisory_vyaire_advisory.py +++ b/vulncheck_sdk/models/advisory_vyaire_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryVYAIREAdvisory(BaseModel): """ - AdvisoryVYAIREAdvisory + advisory.VYAIREAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_watch_guard.py b/vulncheck_sdk/models/advisory_watch_guard.py index 7bb40cca..e325c939 100644 --- a/vulncheck_sdk/models/advisory_watch_guard.py +++ b/vulncheck_sdk/models/advisory_watch_guard.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWatchGuard(BaseModel): """ - AdvisoryWatchGuard + advisory.WatchGuard """ # noqa: E501 advisory_id: Optional[StrictStr] = None affected: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_whats_app.py b/vulncheck_sdk/models/advisory_whats_app.py index f9afccb7..e8158373 100644 --- a/vulncheck_sdk/models/advisory_whats_app.py +++ b/vulncheck_sdk/models/advisory_whats_app.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWhatsApp(BaseModel): """ - AdvisoryWhatsApp + advisory.WhatsApp """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_wibu.py b/vulncheck_sdk/models/advisory_wibu.py index 332e8448..cc37e74f 100644 --- a/vulncheck_sdk/models/advisory_wibu.py +++ b/vulncheck_sdk/models/advisory_wibu.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWibu(BaseModel): """ - AdvisoryWibu + advisory.Wibu """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_wireshark.py b/vulncheck_sdk/models/advisory_wireshark.py index 626387bf..ff538c70 100644 --- a/vulncheck_sdk/models/advisory_wireshark.py +++ b/vulncheck_sdk/models/advisory_wireshark.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWireshark(BaseModel): """ - AdvisoryWireshark + advisory.Wireshark """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_with_secure.py b/vulncheck_sdk/models/advisory_with_secure.py index 71a14ca2..74aeb4bd 100644 --- a/vulncheck_sdk/models/advisory_with_secure.py +++ b/vulncheck_sdk/models/advisory_with_secure.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWithSecure(BaseModel): """ - AdvisoryWithSecure + advisory.WithSecure """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_wolf_ssl.py b/vulncheck_sdk/models/advisory_wolf_ssl.py index b343e1d5..488eb412 100644 --- a/vulncheck_sdk/models/advisory_wolf_ssl.py +++ b/vulncheck_sdk/models/advisory_wolf_ssl.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWolfSSL(BaseModel): """ - AdvisoryWolfSSL + advisory.WolfSSL """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_wolfi.py b/vulncheck_sdk/models/advisory_wolfi.py index 0cfb3e4c..38f504c9 100644 --- a/vulncheck_sdk/models/advisory_wolfi.py +++ b/vulncheck_sdk/models/advisory_wolfi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryWolfi(BaseModel): """ - AdvisoryWolfi + advisory.Wolfi """ # noqa: E501 apkurl: Optional[StrictStr] = None archs: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_wolfi_package.py b/vulncheck_sdk/models/advisory_wolfi_package.py index b590d59c..045d420d 100644 --- a/vulncheck_sdk/models/advisory_wolfi_package.py +++ b/vulncheck_sdk/models/advisory_wolfi_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryWolfiPackage(BaseModel): """ - AdvisoryWolfiPackage + advisory.WolfiPackage """ # noqa: E501 name: Optional[StrictStr] = None secfixes: Optional[List[AdvisoryWolfiSecFix]] = None diff --git a/vulncheck_sdk/models/advisory_wolfi_sec_fix.py b/vulncheck_sdk/models/advisory_wolfi_sec_fix.py index 559739d7..c4043d1f 100644 --- a/vulncheck_sdk/models/advisory_wolfi_sec_fix.py +++ b/vulncheck_sdk/models/advisory_wolfi_sec_fix.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWolfiSecFix(BaseModel): """ - AdvisoryWolfiSecFix + advisory.WolfiSecFix """ # noqa: E501 cve: Optional[List[StrictStr]] = None version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_wordfence.py b/vulncheck_sdk/models/advisory_wordfence.py index e0a174e7..3ef02e68 100644 --- a/vulncheck_sdk/models/advisory_wordfence.py +++ b/vulncheck_sdk/models/advisory_wordfence.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWordfence(BaseModel): """ - AdvisoryWordfence + advisory.Wordfence """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_wrt.py b/vulncheck_sdk/models/advisory_wrt.py index 6d0917a4..6cd8be37 100644 --- a/vulncheck_sdk/models/advisory_wrt.py +++ b/vulncheck_sdk/models/advisory_wrt.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryWRT(BaseModel): """ - AdvisoryWRT + advisory.WRT """ # noqa: E501 advisory: Optional[StrictStr] = None affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") diff --git a/vulncheck_sdk/models/advisory_xdb.py b/vulncheck_sdk/models/advisory_xdb.py index f60a960d..0519f336 100644 --- a/vulncheck_sdk/models/advisory_xdb.py +++ b/vulncheck_sdk/models/advisory_xdb.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXDB(BaseModel): """ - AdvisoryXDB + advisory.XDB """ # noqa: E501 clone_ssh_url: Optional[StrictStr] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_xen.py b/vulncheck_sdk/models/advisory_xen.py index b82af059..b2967af4 100644 --- a/vulncheck_sdk/models/advisory_xen.py +++ b/vulncheck_sdk/models/advisory_xen.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXen(BaseModel): """ - AdvisoryXen + advisory.Xen """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_xerox.py b/vulncheck_sdk/models/advisory_xerox.py index 824bf6e4..cb62df9f 100644 --- a/vulncheck_sdk/models/advisory_xerox.py +++ b/vulncheck_sdk/models/advisory_xerox.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXerox(BaseModel): """ - AdvisoryXerox + advisory.Xerox """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_xiaomi.py b/vulncheck_sdk/models/advisory_xiaomi.py index b7016c05..4ffeee37 100644 --- a/vulncheck_sdk/models/advisory_xiaomi.py +++ b/vulncheck_sdk/models/advisory_xiaomi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXiaomi(BaseModel): """ - AdvisoryXiaomi + advisory.Xiaomi """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_xylem.py b/vulncheck_sdk/models/advisory_xylem.py index 3fc2ced0..fb8a401c 100644 --- a/vulncheck_sdk/models/advisory_xylem.py +++ b/vulncheck_sdk/models/advisory_xylem.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryXylem(BaseModel): """ - AdvisoryXylem + advisory.Xylem """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_yamaha.py b/vulncheck_sdk/models/advisory_yamaha.py index d46e4e2e..73d63cf1 100644 --- a/vulncheck_sdk/models/advisory_yamaha.py +++ b/vulncheck_sdk/models/advisory_yamaha.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYamaha(BaseModel): """ - AdvisoryYamaha + advisory.Yamaha """ # noqa: E501 affected: Optional[StrictStr] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_yokogawa_advisory.py b/vulncheck_sdk/models/advisory_yokogawa_advisory.py index 6abb2931..4d96c0f5 100644 --- a/vulncheck_sdk/models/advisory_yokogawa_advisory.py +++ b/vulncheck_sdk/models/advisory_yokogawa_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYokogawaAdvisory(BaseModel): """ - AdvisoryYokogawaAdvisory + advisory.YokogawaAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None cwe: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_yubico.py b/vulncheck_sdk/models/advisory_yubico.py index 956ea430..857e5f9a 100644 --- a/vulncheck_sdk/models/advisory_yubico.py +++ b/vulncheck_sdk/models/advisory_yubico.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryYubico(BaseModel): """ - AdvisoryYubico + advisory.Yubico """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zdi.py b/vulncheck_sdk/models/advisory_zdi.py index e400bd5b..1a6e637e 100644 --- a/vulncheck_sdk/models/advisory_zdi.py +++ b/vulncheck_sdk/models/advisory_zdi.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class AdvisoryZDI(BaseModel): """ - AdvisoryZDI + advisory.ZDI """ # noqa: E501 cves: Optional[List[StrictStr]] = None cvss_score: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zdi_product.py b/vulncheck_sdk/models/advisory_zdi_product.py index b38ac33d..57546cf4 100644 --- a/vulncheck_sdk/models/advisory_zdi_product.py +++ b/vulncheck_sdk/models/advisory_zdi_product.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZDIProduct(BaseModel): """ - AdvisoryZDIProduct + advisory.ZDIProduct """ # noqa: E501 name: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zdi_response.py b/vulncheck_sdk/models/advisory_zdi_response.py index 5fbad4d9..83a77663 100644 --- a/vulncheck_sdk/models/advisory_zdi_response.py +++ b/vulncheck_sdk/models/advisory_zdi_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZDIResponse(BaseModel): """ - AdvisoryZDIResponse + advisory.ZDIResponse """ # noqa: E501 text: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zdi_response_vendor.py b/vulncheck_sdk/models/advisory_zdi_response_vendor.py index d0c36325..3f22378b 100644 --- a/vulncheck_sdk/models/advisory_zdi_response_vendor.py +++ b/vulncheck_sdk/models/advisory_zdi_response_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZDIResponseVendor(BaseModel): """ - AdvisoryZDIResponseVendor + advisory.ZDIResponseVendor """ # noqa: E501 name: Optional[StrictStr] = None __properties: ClassVar[List[str]] = ["name"] diff --git a/vulncheck_sdk/models/advisory_zdi_vendor.py b/vulncheck_sdk/models/advisory_zdi_vendor.py index e6b0b124..db23bd0b 100644 --- a/vulncheck_sdk/models/advisory_zdi_vendor.py +++ b/vulncheck_sdk/models/advisory_zdi_vendor.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZDIVendor(BaseModel): """ - AdvisoryZDIVendor + advisory.ZDIVendor """ # noqa: E501 name: Optional[StrictStr] = None uri: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zebra.py b/vulncheck_sdk/models/advisory_zebra.py index b2ff49e2..b31cfb13 100644 --- a/vulncheck_sdk/models/advisory_zebra.py +++ b/vulncheck_sdk/models/advisory_zebra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZebra(BaseModel): """ - AdvisoryZebra + advisory.Zebra """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zero_day_advisory.py b/vulncheck_sdk/models/advisory_zero_day_advisory.py index 19fa1a72..2f9084f2 100644 --- a/vulncheck_sdk/models/advisory_zero_day_advisory.py +++ b/vulncheck_sdk/models/advisory_zero_day_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class AdvisoryZeroDayAdvisory(BaseModel): """ - AdvisoryZeroDayAdvisory + advisory.ZeroDayAdvisory """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zero_science_advisory.py b/vulncheck_sdk/models/advisory_zero_science_advisory.py index 2b686175..614f735d 100644 --- a/vulncheck_sdk/models/advisory_zero_science_advisory.py +++ b/vulncheck_sdk/models/advisory_zero_science_advisory.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZeroScienceAdvisory(BaseModel): """ - AdvisoryZeroScienceAdvisory + advisory.ZeroScienceAdvisory """ # noqa: E501 advisory_id: Optional[StrictStr] = Field(default=None, alias="advisoryId") affected_versions: Optional[StrictStr] = Field(default=None, alias="affectedVersions") diff --git a/vulncheck_sdk/models/advisory_zimbra.py b/vulncheck_sdk/models/advisory_zimbra.py index 87e41ce7..f9a942d4 100644 --- a/vulncheck_sdk/models/advisory_zimbra.py +++ b/vulncheck_sdk/models/advisory_zimbra.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZimbra(BaseModel): """ - AdvisoryZimbra + advisory.Zimbra """ # noqa: E501 bugs: Optional[List[StrictInt]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_zoom.py b/vulncheck_sdk/models/advisory_zoom.py index 977443c1..d560e560 100644 --- a/vulncheck_sdk/models/advisory_zoom.py +++ b/vulncheck_sdk/models/advisory_zoom.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZoom(BaseModel): """ - AdvisoryZoom + advisory.Zoom """ # noqa: E501 affected: Optional[List[StrictStr]] = None cve: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/advisory_zscaler.py b/vulncheck_sdk/models/advisory_zscaler.py index e14fc0df..1a5041c4 100644 --- a/vulncheck_sdk/models/advisory_zscaler.py +++ b/vulncheck_sdk/models/advisory_zscaler.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZscaler(BaseModel): """ - AdvisoryZscaler + advisory.Zscaler """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zulu_version.py b/vulncheck_sdk/models/advisory_zulu_version.py index 293368dc..bf78031e 100644 --- a/vulncheck_sdk/models/advisory_zulu_version.py +++ b/vulncheck_sdk/models/advisory_zulu_version.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZuluVersion(BaseModel): """ - AdvisoryZuluVersion + advisory.ZuluVersion """ # noqa: E501 jdk: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zuso.py b/vulncheck_sdk/models/advisory_zuso.py index 41216b96..35c0e7c2 100644 --- a/vulncheck_sdk/models/advisory_zuso.py +++ b/vulncheck_sdk/models/advisory_zuso.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZuso(BaseModel): """ - AdvisoryZuso + advisory.Zuso """ # noqa: E501 cve: Optional[List[StrictStr]] = None cvss: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_zyxel.py b/vulncheck_sdk/models/advisory_zyxel.py index 3d2b7f2a..b781847f 100644 --- a/vulncheck_sdk/models/advisory_zyxel.py +++ b/vulncheck_sdk/models/advisory_zyxel.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class AdvisoryZyxel(BaseModel): """ - AdvisoryZyxel + advisory.Zyxel """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_base_metric_v2.py b/vulncheck_sdk/models/api_base_metric_v2.py index 4defb3f9..d0f18e55 100644 --- a/vulncheck_sdk/models/api_base_metric_v2.py +++ b/vulncheck_sdk/models/api_base_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiBaseMetricV2(BaseModel): """ - ApiBaseMetricV2 + api.BaseMetricV2 """ # noqa: E501 ac_insuf_info: Optional[StrictBool] = Field(default=None, alias="acInsufInfo") cvss_v2: Optional[ApiCVSSV2] = Field(default=None, alias="cvssV2") diff --git a/vulncheck_sdk/models/api_base_metric_v3.py b/vulncheck_sdk/models/api_base_metric_v3.py index 7126446b..1054c9b5 100644 --- a/vulncheck_sdk/models/api_base_metric_v3.py +++ b/vulncheck_sdk/models/api_base_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiBaseMetricV3(BaseModel): """ - ApiBaseMetricV3 + api.BaseMetricV3 """ # noqa: E501 cvss_v3: Optional[ApiCVSSV3] = Field(default=None, alias="cvssV3") exploitability_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="exploitabilityScore") diff --git a/vulncheck_sdk/models/api_categorization_extended.py b/vulncheck_sdk/models/api_categorization_extended.py index 40328709..84718bbd 100644 --- a/vulncheck_sdk/models/api_categorization_extended.py +++ b/vulncheck_sdk/models/api_categorization_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCategorizationExtended(BaseModel): """ - ApiCategorizationExtended + api.CategorizationExtended """ # noqa: E501 tags: Optional[List[StrictStr]] = None __properties: ClassVar[List[str]] = ["tags"] diff --git a/vulncheck_sdk/models/api_client_fingerprints.py b/vulncheck_sdk/models/api_client_fingerprints.py index 1556a90d..ca72f967 100644 --- a/vulncheck_sdk/models/api_client_fingerprints.py +++ b/vulncheck_sdk/models/api_client_fingerprints.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiClientFingerprints(BaseModel): """ - ApiClientFingerprints + api.ClientFingerprints """ # noqa: E501 hassh: Optional[StrictStr] = None ja3: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_configurations.py b/vulncheck_sdk/models/api_configurations.py index 9322500a..ae244efb 100644 --- a/vulncheck_sdk/models/api_configurations.py +++ b/vulncheck_sdk/models/api_configurations.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiConfigurations(BaseModel): """ - ApiConfigurations + api.Configurations """ # noqa: E501 cve_data_version: Optional[StrictStr] = Field(default=None, alias="CVE_data_version") nodes: Optional[List[ApiNodes]] = None diff --git a/vulncheck_sdk/models/api_cpe.py b/vulncheck_sdk/models/api_cpe.py index f07fc1f2..f3b2f96e 100644 --- a/vulncheck_sdk/models/api_cpe.py +++ b/vulncheck_sdk/models/api_cpe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCPE(BaseModel): """ - ApiCPE + api.CPE """ # noqa: E501 edition: Optional[StrictStr] = None language: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_cpe_match.py b/vulncheck_sdk/models/api_cpe_match.py index 840d8f0a..d6be20ea 100644 --- a/vulncheck_sdk/models/api_cpe_match.py +++ b/vulncheck_sdk/models/api_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiCPEMatch(BaseModel): """ - ApiCPEMatch + api.CPEMatch """ # noqa: E501 cpe22_uri: Optional[StrictStr] = Field(default=None, alias="cpe22Uri") cpe23_uri: Optional[StrictStr] = Field(default=None, alias="cpe23Uri") diff --git a/vulncheck_sdk/models/api_cpe_name.py b/vulncheck_sdk/models/api_cpe_name.py index 542e8b0e..8b0c77f1 100644 --- a/vulncheck_sdk/models/api_cpe_name.py +++ b/vulncheck_sdk/models/api_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCPEName(BaseModel): """ - ApiCPEName + api.CPEName """ # noqa: E501 cpe22_uri: Optional[StrictStr] = Field(default=None, alias="cpe22Uri") cpe23_uri: Optional[StrictStr] = Field(default=None, alias="cpe23Uri") diff --git a/vulncheck_sdk/models/api_cve.py b/vulncheck_sdk/models/api_cve.py index be974749..cc3528bc 100644 --- a/vulncheck_sdk/models/api_cve.py +++ b/vulncheck_sdk/models/api_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -29,7 +29,7 @@ class ApiCVE(BaseModel): """ - ApiCVE + api.CVE """ # noqa: E501 cve_data_meta: Optional[ApiCVEDataMeta] = Field(default=None, alias="CVE_data_meta") data_format: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_cve_data_meta.py b/vulncheck_sdk/models/api_cve_data_meta.py index 7003c6bd..493fb6fe 100644 --- a/vulncheck_sdk/models/api_cve_data_meta.py +++ b/vulncheck_sdk/models/api_cve_data_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVEDataMeta(BaseModel): """ - ApiCVEDataMeta + api.CVEDataMeta """ # noqa: E501 assigner: Optional[StrictStr] = Field(default=None, alias="ASSIGNER") id: Optional[StrictStr] = Field(default=None, alias="ID") diff --git a/vulncheck_sdk/models/api_cve_data_meta_extended.py b/vulncheck_sdk/models/api_cve_data_meta_extended.py index 0cc15498..b725e691 100644 --- a/vulncheck_sdk/models/api_cve_data_meta_extended.py +++ b/vulncheck_sdk/models/api_cve_data_meta_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVEDataMetaExtended(BaseModel): """ - ApiCVEDataMetaExtended + api.CVEDataMetaExtended """ # noqa: E501 alias: Optional[StrictStr] = Field(default=None, alias="ALIAS") assigner: Optional[StrictStr] = Field(default=None, alias="ASSIGNER") diff --git a/vulncheck_sdk/models/api_cve_extended.py b/vulncheck_sdk/models/api_cve_extended.py index 16b98cf2..f91fafe3 100644 --- a/vulncheck_sdk/models/api_cve_extended.py +++ b/vulncheck_sdk/models/api_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class ApiCVEExtended(BaseModel): """ - ApiCVEExtended + api.CVEExtended """ # noqa: E501 cve_data_meta: Optional[ApiCVEDataMetaExtended] = Field(default=None, alias="CVE_data_meta") categorization: Optional[ApiCategorizationExtended] = None diff --git a/vulncheck_sdk/models/api_cve_items.py b/vulncheck_sdk/models/api_cve_items.py index 50508a7d..415a23ff 100644 --- a/vulncheck_sdk/models/api_cve_items.py +++ b/vulncheck_sdk/models/api_cve_items.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiCveItems(BaseModel): """ - ApiCveItems + api.CveItems """ # noqa: E501 configurations: Optional[ApiConfigurations] = None cve: Optional[ApiCVE] = None diff --git a/vulncheck_sdk/models/api_cve_items_extended.py b/vulncheck_sdk/models/api_cve_items_extended.py index 049b9448..e2def340 100644 --- a/vulncheck_sdk/models/api_cve_items_extended.py +++ b/vulncheck_sdk/models/api_cve_items_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -30,7 +30,7 @@ class ApiCveItemsExtended(BaseModel): """ - ApiCveItemsExtended + api.CveItemsExtended """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") configurations: Optional[ApiConfigurations] = None diff --git a/vulncheck_sdk/models/api_cvssv2.py b/vulncheck_sdk/models/api_cvssv2.py index 65316955..e548dfb0 100644 --- a/vulncheck_sdk/models/api_cvssv2.py +++ b/vulncheck_sdk/models/api_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVSSV2(BaseModel): """ - ApiCVSSV2 + api.CVSSV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/models/api_cvssv3.py b/vulncheck_sdk/models/api_cvssv3.py index bd62c7d6..67d99b4c 100644 --- a/vulncheck_sdk/models/api_cvssv3.py +++ b/vulncheck_sdk/models/api_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCVSSV3(BaseModel): """ - ApiCVSSV3 + api.CVSSV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/models/api_cwe.py b/vulncheck_sdk/models/api_cwe.py index 94244031..1ffb29b7 100644 --- a/vulncheck_sdk/models/api_cwe.py +++ b/vulncheck_sdk/models/api_cwe.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiCWE(BaseModel): """ - ApiCWE + api.CWE """ # noqa: E501 abstraction: Optional[StrictStr] = None description: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_date_time.py b/vulncheck_sdk/models/api_date_time.py deleted file mode 100644 index 1fd4a11d..00000000 --- a/vulncheck_sdk/models/api_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class ApiDateTime(BaseModel): - """ - ApiDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of ApiDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of ApiDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/api_description.py b/vulncheck_sdk/models/api_description.py index a57f5e27..b27f2394 100644 --- a/vulncheck_sdk/models/api_description.py +++ b/vulncheck_sdk/models/api_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiDescription(BaseModel): """ - ApiDescription + api.Description """ # noqa: E501 description_data: Optional[List[ApiDescriptionData]] = None __properties: ClassVar[List[str]] = ["description_data"] diff --git a/vulncheck_sdk/models/api_description_data.py b/vulncheck_sdk/models/api_description_data.py index c727b5d3..715b12dd 100644 --- a/vulncheck_sdk/models/api_description_data.py +++ b/vulncheck_sdk/models/api_description_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiDescriptionData(BaseModel): """ - ApiDescriptionData + api.DescriptionData """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_epss.py b/vulncheck_sdk/models/api_epss.py index 3b5069f3..35886ce2 100644 --- a/vulncheck_sdk/models/api_epss.py +++ b/vulncheck_sdk/models/api_epss.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiEPSS(BaseModel): """ - ApiEPSS + exclude EPSS from changelog """ # noqa: E501 epss_percentile: Optional[Union[StrictFloat, StrictInt]] = None epss_score: Optional[Union[StrictFloat, StrictInt]] = None diff --git a/vulncheck_sdk/models/api_epss_data.py b/vulncheck_sdk/models/api_epss_data.py index b6346eb3..f8f5a1a9 100644 --- a/vulncheck_sdk/models/api_epss_data.py +++ b/vulncheck_sdk/models/api_epss_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiEPSSData(BaseModel): """ - ApiEPSSData + api.EPSSData """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, alias="_timestamp") cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_exploit_chain.py b/vulncheck_sdk/models/api_exploit_chain.py index a452e759..8f2ca4cc 100644 --- a/vulncheck_sdk/models/api_exploit_chain.py +++ b/vulncheck_sdk/models/api_exploit_chain.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiExploitChain(BaseModel): """ - ApiExploitChain + api.ExploitChain """ # noqa: E501 cves: Optional[List[ApiExploitChainCVE]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_exploit_chain_cve.py b/vulncheck_sdk/models/api_exploit_chain_cve.py index 8f00a87e..92f6ec48 100644 --- a/vulncheck_sdk/models/api_exploit_chain_cve.py +++ b/vulncheck_sdk/models/api_exploit_chain_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitChainCVE(BaseModel): """ - ApiExploitChainCVE + api.ExploitChainCVE """ # noqa: E501 cve: Optional[StrictStr] = None type: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_exploit_v3_result.py b/vulncheck_sdk/models/api_exploit_v3_result.py index 65a61cdb..c8db2cfe 100644 --- a/vulncheck_sdk/models/api_exploit_v3_result.py +++ b/vulncheck_sdk/models/api_exploit_v3_result.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,13 +31,13 @@ class ApiExploitV3Result(BaseModel): """ - ApiExploitV3Result + api.ExploitV3Result """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, description="ignore this field when checking for differences/changes", alias="_timestamp") commercial_exploit_found: Optional[StrictBool] = None counts: Optional[ApiExploitsV3Count] = None date_added: Optional[StrictStr] = None - epss: Optional[ApiEPSS] = Field(default=None, description="exclude EPSS from changelog") + epss: Optional[ApiEPSS] = None exploits: Optional[List[ApiNormalizedExploitV3Entry]] = None id: Optional[StrictStr] = None in_kev: Optional[StrictBool] = Field(default=None, alias="inKEV") diff --git a/vulncheck_sdk/models/api_exploits_change.py b/vulncheck_sdk/models/api_exploits_change.py index 185c98cc..e6d0374d 100644 --- a/vulncheck_sdk/models/api_exploits_change.py +++ b/vulncheck_sdk/models/api_exploits_change.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,13 +25,13 @@ class ApiExploitsChange(BaseModel): """ - ApiExploitsChange + api.ExploitsChange """ # noqa: E501 change_time: Optional[StrictStr] = None change_type: Optional[StrictStr] = None var_field: Optional[StrictStr] = Field(default=None, alias="field") - new_value: Optional[Dict[str, Any]] = None - old_value: Optional[Dict[str, Any]] = None + new_value: Optional[Any] = None + old_value: Optional[Any] = None __properties: ClassVar[List[str]] = ["change_time", "change_type", "field", "new_value", "old_value"] model_config = ConfigDict( @@ -73,6 +73,16 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if new_value (nullable) is None + # and model_fields_set contains the field + if self.new_value is None and "new_value" in self.model_fields_set: + _dict['new_value'] = None + + # set to None if old_value (nullable) is None + # and model_fields_set contains the field + if self.old_value is None and "old_value" in self.model_fields_set: + _dict['old_value'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/api_exploits_changelog.py b/vulncheck_sdk/models/api_exploits_changelog.py index e09b940e..21c2c17d 100644 --- a/vulncheck_sdk/models/api_exploits_changelog.py +++ b/vulncheck_sdk/models/api_exploits_changelog.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiExploitsChangelog(BaseModel): """ - ApiExploitsChangelog + api.ExploitsChangelog """ # noqa: E501 changes: Optional[List[ApiExploitsChange]] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_exploits_trending.py b/vulncheck_sdk/models/api_exploits_trending.py index 63d2b822..614a78ba 100644 --- a/vulncheck_sdk/models/api_exploits_trending.py +++ b/vulncheck_sdk/models/api_exploits_trending.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsTrending(BaseModel): """ - ApiExploitsTrending + api.ExploitsTrending """ # noqa: E501 github: Optional[StrictBool] = None __properties: ClassVar[List[str]] = ["github"] diff --git a/vulncheck_sdk/models/api_exploits_v3_count.py b/vulncheck_sdk/models/api_exploits_v3_count.py index 748449a5..1f100fd6 100644 --- a/vulncheck_sdk/models/api_exploits_v3_count.py +++ b/vulncheck_sdk/models/api_exploits_v3_count.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsV3Count(BaseModel): """ - ApiExploitsV3Count + api.ExploitsV3Count """ # noqa: E501 botnets: Optional[StrictInt] = None exploits: Optional[StrictInt] = None diff --git a/vulncheck_sdk/models/api_exploits_v3_timeline.py b/vulncheck_sdk/models/api_exploits_v3_timeline.py index a10396cd..1749f9aa 100644 --- a/vulncheck_sdk/models/api_exploits_v3_timeline.py +++ b/vulncheck_sdk/models/api_exploits_v3_timeline.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiExploitsV3Timeline(BaseModel): """ - ApiExploitsV3Timeline + api.ExploitsV3Timeline """ # noqa: E501 cisa_kev_date_added: Optional[StrictStr] = None cisa_kev_date_due: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_http_details.py b/vulncheck_sdk/models/api_http_details.py index 8b0fe287..21fba4ee 100644 --- a/vulncheck_sdk/models/api_http_details.py +++ b/vulncheck_sdk/models/api_http_details.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiHTTPDetails(BaseModel): """ - ApiHTTPDetails + api.HTTPDetails """ # noqa: E501 http_request_body: Optional[StrictStr] = None http_user_agent: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_impact.py b/vulncheck_sdk/models/api_impact.py index 4e37b1bb..f53af529 100644 --- a/vulncheck_sdk/models/api_impact.py +++ b/vulncheck_sdk/models/api_impact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,11 +28,11 @@ class ApiImpact(BaseModel): """ - ApiImpact + api.Impact """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") - metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, description="this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics", alias="metricV40") + metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, alias="metricV40") __properties: ClassVar[List[str]] = ["baseMetricV2", "baseMetricV3", "metricV40"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/api_impact_extended.py b/vulncheck_sdk/models/api_impact_extended.py index 276803e1..90ac7e08 100644 --- a/vulncheck_sdk/models/api_impact_extended.py +++ b/vulncheck_sdk/models/api_impact_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class ApiImpactExtended(BaseModel): """ - ApiImpactExtended + api.ImpactExtended """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") diff --git a/vulncheck_sdk/models/api_initial_access.py b/vulncheck_sdk/models/api_initial_access.py index ddb6d888..4af30d4f 100644 --- a/vulncheck_sdk/models/api_initial_access.py +++ b/vulncheck_sdk/models/api_initial_access.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiInitialAccess(BaseModel): """ - ApiInitialAccess + api.InitialAccess """ # noqa: E501 artifacts: Optional[List[ApiInitialAccessArtifact]] = Field(default=None, description="Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.") cve: Optional[StrictStr] = Field(default=None, description="CVE identifier for the given initial access record.") diff --git a/vulncheck_sdk/models/api_initial_access_artifact.py b/vulncheck_sdk/models/api_initial_access_artifact.py index 21ae8625..b06964bf 100644 --- a/vulncheck_sdk/models/api_initial_access_artifact.py +++ b/vulncheck_sdk/models/api_initial_access_artifact.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiInitialAccessArtifact(BaseModel): """ - ApiInitialAccessArtifact + api.InitialAccessArtifact """ # noqa: E501 artifact_name: Optional[StrictStr] = Field(default=None, description="ArtifactName is a title to associate with this artifact.", alias="artifactName") artifacts_url: Optional[List[StrictStr]] = Field(default=None, description="ArtifactsURL are URLs to the available artifact.", alias="artifactsURL") diff --git a/vulncheck_sdk/models/api_mitre_attack_tech.py b/vulncheck_sdk/models/api_mitre_attack_tech.py index 85dff6b6..861ff2d5 100644 --- a/vulncheck_sdk/models/api_mitre_attack_tech.py +++ b/vulncheck_sdk/models/api_mitre_attack_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiMitreAttackTech(BaseModel): """ - ApiMitreAttackTech + api.MitreAttackTech """ # noqa: E501 d3fendmapping: Optional[List[ApiMitreMitigation2D3fendMapping]] = None detections: Optional[List[ApiMitreDetectionTech]] = None diff --git a/vulncheck_sdk/models/api_mitre_attack_to_cve.py b/vulncheck_sdk/models/api_mitre_attack_to_cve.py index 27848497..aa6adbec 100644 --- a/vulncheck_sdk/models/api_mitre_attack_to_cve.py +++ b/vulncheck_sdk/models/api_mitre_attack_to_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiMitreAttackToCVE(BaseModel): """ - ApiMitreAttackToCVE + api.MitreAttackToCVE """ # noqa: E501 cve_list: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_mitre_d3fend_technique.py b/vulncheck_sdk/models/api_mitre_d3fend_technique.py index c466f95d..d6da8d98 100644 --- a/vulncheck_sdk/models/api_mitre_d3fend_technique.py +++ b/vulncheck_sdk/models/api_mitre_d3fend_technique.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreD3fendTechnique(BaseModel): """ - ApiMitreD3fendTechnique + api.MitreD3fendTechnique """ # noqa: E501 id: Optional[StrictStr] = None url: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_mitre_detection_tech.py b/vulncheck_sdk/models/api_mitre_detection_tech.py index 9def96b3..4040c1a9 100644 --- a/vulncheck_sdk/models/api_mitre_detection_tech.py +++ b/vulncheck_sdk/models/api_mitre_detection_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreDetectionTech(BaseModel): """ - ApiMitreDetectionTech + api.MitreDetectionTech """ # noqa: E501 datacomponent: Optional[StrictStr] = None datasource: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_mitre_mitigation2_d3fend_mapping.py b/vulncheck_sdk/models/api_mitre_mitigation2_d3fend_mapping.py index d49f330f..ee97ec79 100644 --- a/vulncheck_sdk/models/api_mitre_mitigation2_d3fend_mapping.py +++ b/vulncheck_sdk/models/api_mitre_mitigation2_d3fend_mapping.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiMitreMitigation2D3fendMapping(BaseModel): """ - ApiMitreMitigation2D3fendMapping + api.MitreMitigation2D3fendMapping """ # noqa: E501 d3fendtechniques: Optional[List[ApiMitreD3fendTechnique]] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_mitre_mitigation_tech.py b/vulncheck_sdk/models/api_mitre_mitigation_tech.py index f0898630..e6e9b700 100644 --- a/vulncheck_sdk/models/api_mitre_mitigation_tech.py +++ b/vulncheck_sdk/models/api_mitre_mitigation_tech.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiMitreMitigationTech(BaseModel): """ - ApiMitreMitigationTech + api.MitreMitigationTech """ # noqa: E501 description: Optional[StrictStr] = None id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nodes.py b/vulncheck_sdk/models/api_nodes.py index d11e5461..9b897284 100644 --- a/vulncheck_sdk/models/api_nodes.py +++ b/vulncheck_sdk/models/api_nodes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNodes(BaseModel): """ - ApiNodes + api.Nodes """ # noqa: E501 children: Optional[List[ApiNodes]] = None cpe_match: Optional[List[ApiCPEMatch]] = None diff --git a/vulncheck_sdk/models/api_normalized_exploit_v3_entry.py b/vulncheck_sdk/models/api_normalized_exploit_v3_entry.py index b58d3368..a50f88a1 100644 --- a/vulncheck_sdk/models/api_normalized_exploit_v3_entry.py +++ b/vulncheck_sdk/models/api_normalized_exploit_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNormalizedExploitV3Entry(BaseModel): """ - ApiNormalizedExploitV3Entry + api.NormalizedExploitV3Entry """ # noqa: E501 clone_ssh_url: Optional[StrictStr] = None clone_ssh_url_cached: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_normalized_report_v3_entry.py b/vulncheck_sdk/models/api_normalized_report_v3_entry.py index 33d76d6a..b23d3891 100644 --- a/vulncheck_sdk/models/api_normalized_report_v3_entry.py +++ b/vulncheck_sdk/models/api_normalized_report_v3_entry.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNormalizedReportV3Entry(BaseModel): """ - ApiNormalizedReportV3Entry + api.NormalizedReportV3Entry """ # noqa: E501 date_added: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_cpe_match.py b/vulncheck_sdk/models/api_nvd20_cpe_match.py index 6b186de4..125d58d4 100644 --- a/vulncheck_sdk/models/api_nvd20_cpe_match.py +++ b/vulncheck_sdk/models/api_nvd20_cpe_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CPEMatch(BaseModel): """ - ApiNVD20CPEMatch + api.NVD20CPEMatch """ # noqa: E501 cpe_last_modified: Optional[StrictStr] = Field(default=None, alias="cpeLastModified") created: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_cpe_name.py b/vulncheck_sdk/models/api_nvd20_cpe_name.py index 94139461..ebbbc445 100644 --- a/vulncheck_sdk/models/api_nvd20_cpe_name.py +++ b/vulncheck_sdk/models/api_nvd20_cpe_name.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CPEName(BaseModel): """ - ApiNVD20CPEName + api.NVD20CPEName """ # noqa: E501 cpe_name: Optional[StrictStr] = Field(default=None, alias="cpeName") cpe_name_id: Optional[StrictStr] = Field(default=None, alias="cpeNameId") diff --git a/vulncheck_sdk/models/api_nvd20_cve.py b/vulncheck_sdk/models/api_nvd20_cve.py index dfc0f3c1..2475a781 100644 --- a/vulncheck_sdk/models/api_nvd20_cve.py +++ b/vulncheck_sdk/models/api_nvd20_cve.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -31,7 +31,7 @@ class ApiNVD20CVE(BaseModel): """ - ApiNVD20CVE + api.NVD20CVE """ # noqa: E501 cisa_action_due: Optional[StrictStr] = Field(default=None, alias="cisaActionDue") cisa_exploit_add: Optional[StrictStr] = Field(default=None, alias="cisaExploitAdd") diff --git a/vulncheck_sdk/models/api_nvd20_cve_extended.py b/vulncheck_sdk/models/api_nvd20_cve_extended.py index a29ccd88..2351e248 100644 --- a/vulncheck_sdk/models/api_nvd20_cve_extended.py +++ b/vulncheck_sdk/models/api_nvd20_cve_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -34,7 +34,7 @@ class ApiNVD20CVEExtended(BaseModel): """ - ApiNVD20CVEExtended + api.NVD20CVEExtended """ # noqa: E501 alias: Optional[StrictStr] = Field(default=None, alias="ALIAS") status: Optional[StrictStr] = Field(default=None, alias="STATUS") diff --git a/vulncheck_sdk/models/api_nvd20_cvss_data_v2.py b/vulncheck_sdk/models/api_nvd20_cvss_data_v2.py index 25c34e91..4d563801 100644 --- a/vulncheck_sdk/models/api_nvd20_cvss_data_v2.py +++ b/vulncheck_sdk/models/api_nvd20_cvss_data_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CvssDataV2(BaseModel): """ - ApiNVD20CvssDataV2 + api.NVD20CvssDataV2 """ # noqa: E501 access_complexity: Optional[StrictStr] = Field(default=None, alias="accessComplexity") access_vector: Optional[StrictStr] = Field(default=None, alias="accessVector") diff --git a/vulncheck_sdk/models/api_nvd20_cvss_data_v3.py b/vulncheck_sdk/models/api_nvd20_cvss_data_v3.py index f978646f..d8fb3f70 100644 --- a/vulncheck_sdk/models/api_nvd20_cvss_data_v3.py +++ b/vulncheck_sdk/models/api_nvd20_cvss_data_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20CvssDataV3(BaseModel): """ - ApiNVD20CvssDataV3 + api.NVD20CvssDataV3 """ # noqa: E501 attack_complexity: Optional[StrictStr] = Field(default=None, alias="attackComplexity") attack_vector: Optional[StrictStr] = Field(default=None, alias="attackVector") diff --git a/vulncheck_sdk/models/api_nvd20_cvss_metric_v2.py b/vulncheck_sdk/models/api_nvd20_cvss_metric_v2.py index e6a79161..dc5236a9 100644 --- a/vulncheck_sdk/models/api_nvd20_cvss_metric_v2.py +++ b/vulncheck_sdk/models/api_nvd20_cvss_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV2(BaseModel): """ - ApiNVD20CvssMetricV2 + api.NVD20CvssMetricV2 """ # noqa: E501 ac_insuf_info: Optional[StrictBool] = Field(default=None, alias="acInsufInfo") base_severity: Optional[StrictStr] = Field(default=None, alias="baseSeverity") diff --git a/vulncheck_sdk/models/api_nvd20_cvss_metric_v3.py b/vulncheck_sdk/models/api_nvd20_cvss_metric_v3.py index f5fdb23c..09c6c686 100644 --- a/vulncheck_sdk/models/api_nvd20_cvss_metric_v3.py +++ b/vulncheck_sdk/models/api_nvd20_cvss_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV3(BaseModel): """ - ApiNVD20CvssMetricV3 + api.NVD20CvssMetricV3 """ # noqa: E501 cvss_data: Optional[ApiNVD20CvssDataV3] = Field(default=None, alias="cvssData") exploitability_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="exploitabilityScore") diff --git a/vulncheck_sdk/models/api_nvd20_cvss_metric_v40.py b/vulncheck_sdk/models/api_nvd20_cvss_metric_v40.py index a05aaf63..6dfd193a 100644 --- a/vulncheck_sdk/models/api_nvd20_cvss_metric_v40.py +++ b/vulncheck_sdk/models/api_nvd20_cvss_metric_v40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20CvssMetricV40(BaseModel): """ - ApiNVD20CvssMetricV40 + api.NVD20CvssMetricV40 """ # noqa: E501 cvss_data: Optional[AdvisoryCVSSV40] = Field(default=None, alias="cvssData") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_description.py b/vulncheck_sdk/models/api_nvd20_description.py index 0efa4275..21e10bfc 100644 --- a/vulncheck_sdk/models/api_nvd20_description.py +++ b/vulncheck_sdk/models/api_nvd20_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20Description(BaseModel): """ - ApiNVD20Description + api.NVD20Description """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_metric.py b/vulncheck_sdk/models/api_nvd20_metric.py index c429fb19..0ffe986e 100644 --- a/vulncheck_sdk/models/api_nvd20_metric.py +++ b/vulncheck_sdk/models/api_nvd20_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiNVD20Metric(BaseModel): """ - ApiNVD20Metric + api.NVD20Metric """ # noqa: E501 cvss_metric_v2: Optional[List[ApiNVD20CvssMetricV2]] = Field(default=None, alias="cvssMetricV2") cvss_metric_v30: Optional[List[ApiNVD20CvssMetricV3]] = Field(default=None, alias="cvssMetricV30") diff --git a/vulncheck_sdk/models/api_nvd20_metric_extended.py b/vulncheck_sdk/models/api_nvd20_metric_extended.py index 77091c56..64967850 100644 --- a/vulncheck_sdk/models/api_nvd20_metric_extended.py +++ b/vulncheck_sdk/models/api_nvd20_metric_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -33,7 +33,7 @@ class ApiNVD20MetricExtended(BaseModel): """ - ApiNVD20MetricExtended + api.NVD20MetricExtended """ # noqa: E501 cvss_metric_v2: Optional[List[ApiNVD20CvssMetricV2]] = Field(default=None, alias="cvssMetricV2") cvss_metric_v30: Optional[List[ApiNVD20CvssMetricV3]] = Field(default=None, alias="cvssMetricV30") diff --git a/vulncheck_sdk/models/api_nvd20_reference.py b/vulncheck_sdk/models/api_nvd20_reference.py index b644a22e..716aef04 100644 --- a/vulncheck_sdk/models/api_nvd20_reference.py +++ b/vulncheck_sdk/models/api_nvd20_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20Reference(BaseModel): """ - ApiNVD20Reference + api.NVD20Reference """ # noqa: E501 source: Optional[StrictStr] = None tags: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/api_nvd20_reference_extended.py b/vulncheck_sdk/models/api_nvd20_reference_extended.py index 497d984c..092a693d 100644 --- a/vulncheck_sdk/models/api_nvd20_reference_extended.py +++ b/vulncheck_sdk/models/api_nvd20_reference_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20ReferenceExtended(BaseModel): """ - ApiNVD20ReferenceExtended + api.NVD20ReferenceExtended """ # noqa: E501 date_added: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_temporal_associated_base_metric.py b/vulncheck_sdk/models/api_nvd20_temporal_associated_base_metric.py index a6c0f838..d720ac93 100644 --- a/vulncheck_sdk/models/api_nvd20_temporal_associated_base_metric.py +++ b/vulncheck_sdk/models/api_nvd20_temporal_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20TemporalAssociatedBaseMetric(BaseModel): """ - ApiNVD20TemporalAssociatedBaseMetric + api.NVD20TemporalAssociatedBaseMetric """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_temporal_cvssv2.py b/vulncheck_sdk/models/api_nvd20_temporal_cvssv2.py index ceb2249c..0e199bdc 100644 --- a/vulncheck_sdk/models/api_nvd20_temporal_cvssv2.py +++ b/vulncheck_sdk/models/api_nvd20_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20TemporalCVSSV2(BaseModel): """ - ApiNVD20TemporalCVSSV2 + api.NVD20TemporalCVSSV2 """ # noqa: E501 associated_base_metric_v2: Optional[ApiNVD20TemporalAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV2") exploitability: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_temporal_cvssv3.py b/vulncheck_sdk/models/api_nvd20_temporal_cvssv3.py index 59c3b5c1..e02b3178 100644 --- a/vulncheck_sdk/models/api_nvd20_temporal_cvssv3.py +++ b/vulncheck_sdk/models/api_nvd20_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20TemporalCVSSV3(BaseModel): """ - ApiNVD20TemporalCVSSV3 + api.NVD20TemporalCVSSV3 """ # noqa: E501 associated_base_metric_v3: Optional[ApiNVD20TemporalAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV3") exploit_code_maturity: Optional[StrictStr] = Field(default=None, alias="exploitCodeMaturity") diff --git a/vulncheck_sdk/models/api_nvd20_threat_associated_base_metric.py b/vulncheck_sdk/models/api_nvd20_threat_associated_base_metric.py index 26ffd24b..e557367e 100644 --- a/vulncheck_sdk/models/api_nvd20_threat_associated_base_metric.py +++ b/vulncheck_sdk/models/api_nvd20_threat_associated_base_metric.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20ThreatAssociatedBaseMetric(BaseModel): """ - ApiNVD20ThreatAssociatedBaseMetric + api.NVD20ThreatAssociatedBaseMetric """ # noqa: E501 base_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseScore") source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_threat_cvssv40.py b/vulncheck_sdk/models/api_nvd20_threat_cvssv40.py index 81900583..8a0e90fc 100644 --- a/vulncheck_sdk/models/api_nvd20_threat_cvssv40.py +++ b/vulncheck_sdk/models/api_nvd20_threat_cvssv40.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20ThreatCVSSV40(BaseModel): """ - ApiNVD20ThreatCVSSV40 + api.NVD20ThreatCVSSV40 """ # noqa: E501 associated_base_metric_v40: Optional[ApiNVD20ThreatAssociatedBaseMetric] = Field(default=None, alias="associatedBaseMetricV40") base_threat_score: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="baseThreatScore") diff --git a/vulncheck_sdk/models/api_nvd20_vendor_comment.py b/vulncheck_sdk/models/api_nvd20_vendor_comment.py index 1fad1eb0..31b64752 100644 --- a/vulncheck_sdk/models/api_nvd20_vendor_comment.py +++ b/vulncheck_sdk/models/api_nvd20_vendor_comment.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20VendorComment(BaseModel): """ - ApiNVD20VendorComment + api.NVD20VendorComment """ # noqa: E501 comment: Optional[StrictStr] = None last_modified: Optional[StrictStr] = Field(default=None, alias="lastModified") diff --git a/vulncheck_sdk/models/api_nvd20_weakness.py b/vulncheck_sdk/models/api_nvd20_weakness.py index aff789ae..ec68dc6f 100644 --- a/vulncheck_sdk/models/api_nvd20_weakness.py +++ b/vulncheck_sdk/models/api_nvd20_weakness.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20Weakness(BaseModel): """ - ApiNVD20Weakness + api.NVD20Weakness """ # noqa: E501 description: Optional[List[ApiNVD20Description]] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_weakness_desc_extended.py b/vulncheck_sdk/models/api_nvd20_weakness_desc_extended.py index cde274ca..023fafa5 100644 --- a/vulncheck_sdk/models/api_nvd20_weakness_desc_extended.py +++ b/vulncheck_sdk/models/api_nvd20_weakness_desc_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiNVD20WeaknessDescExtended(BaseModel): """ - ApiNVD20WeaknessDescExtended + api.NVD20WeaknessDescExtended """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_nvd20_weakness_extended.py b/vulncheck_sdk/models/api_nvd20_weakness_extended.py index 8888cb9b..f01859c3 100644 --- a/vulncheck_sdk/models/api_nvd20_weakness_extended.py +++ b/vulncheck_sdk/models/api_nvd20_weakness_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiNVD20WeaknessExtended(BaseModel): """ - ApiNVD20WeaknessExtended + api.NVD20WeaknessExtended """ # noqa: E501 description: Optional[List[ApiNVD20WeaknessDescExtended]] = None source: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_oss_package.py b/vulncheck_sdk/models/api_oss_package.py index 797dc8ca..af329bb5 100644 --- a/vulncheck_sdk/models/api_oss_package.py +++ b/vulncheck_sdk/models/api_oss_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,7 +28,7 @@ class ApiOSSPackage(BaseModel): """ - ApiOSSPackage + api.OSSPackage """ # noqa: E501 artifacts: Optional[ApiOSSPackageArtifacts] = None cves: Optional[List[StrictStr]] = None diff --git a/vulncheck_sdk/models/api_oss_package_artifacts.py b/vulncheck_sdk/models/api_oss_package_artifacts.py index c38f13c0..70e5bb08 100644 --- a/vulncheck_sdk/models/api_oss_package_artifacts.py +++ b/vulncheck_sdk/models/api_oss_package_artifacts.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiOSSPackageArtifacts(BaseModel): """ - ApiOSSPackageArtifacts + api.OSSPackageArtifacts """ # noqa: E501 binary: Optional[List[ApiOSSPackageDownloadInfo]] = None source: Optional[List[ApiOSSPackageDownloadInfo]] = None diff --git a/vulncheck_sdk/models/api_oss_package_download_info.py b/vulncheck_sdk/models/api_oss_package_download_info.py index 8338dec4..f82d080c 100644 --- a/vulncheck_sdk/models/api_oss_package_download_info.py +++ b/vulncheck_sdk/models/api_oss_package_download_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiOSSPackageDownloadInfo(BaseModel): """ - ApiOSSPackageDownloadInfo + api.OSSPackageDownloadInfo """ # noqa: E501 hashes: Optional[List[ApiOSSPackageHashInfo]] = None reference: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_oss_package_hash_info.py b/vulncheck_sdk/models/api_oss_package_hash_info.py index 69127d85..1f70b0ce 100644 --- a/vulncheck_sdk/models/api_oss_package_hash_info.py +++ b/vulncheck_sdk/models/api_oss_package_hash_info.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageHashInfo(BaseModel): """ - ApiOSSPackageHashInfo + api.OSSPackageHashInfo """ # noqa: E501 algorithm: Optional[StrictStr] = Field(default=None, description="See OSSPackageHashInfoAlgo* consts") type: Optional[StrictStr] = Field(default=None, description="See OSSPackageHashInfoType* consts") diff --git a/vulncheck_sdk/models/api_oss_package_research_attributes.py b/vulncheck_sdk/models/api_oss_package_research_attributes.py index 8270d560..ad7a4996 100644 --- a/vulncheck_sdk/models/api_oss_package_research_attributes.py +++ b/vulncheck_sdk/models/api_oss_package_research_attributes.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageResearchAttributes(BaseModel): """ - ApiOSSPackageResearchAttributes + api.OSSPackageResearchAttributes """ # noqa: E501 abandoned: Optional[StrictBool] = None eol: Optional[StrictBool] = None diff --git a/vulncheck_sdk/models/api_oss_package_vulnerability.py b/vulncheck_sdk/models/api_oss_package_vulnerability.py index 4396ced4..268db590 100644 --- a/vulncheck_sdk/models/api_oss_package_vulnerability.py +++ b/vulncheck_sdk/models/api_oss_package_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiOSSPackageVulnerability(BaseModel): """ - ApiOSSPackageVulnerability + api.OSSPackageVulnerability """ # noqa: E501 detection: Optional[StrictStr] = None fixed_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_package.py b/vulncheck_sdk/models/api_package.py index 4ce53125..fdb9b622 100644 --- a/vulncheck_sdk/models/api_package.py +++ b/vulncheck_sdk/models/api_package.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiPackage(BaseModel): """ - ApiPackage + api.Package """ # noqa: E501 filename: Optional[StrictStr] = None name: Optional[StrictStr] = Field(default=None, description="sort") diff --git a/vulncheck_sdk/models/api_problem_type.py b/vulncheck_sdk/models/api_problem_type.py index 6c900485..82addac2 100644 --- a/vulncheck_sdk/models/api_problem_type.py +++ b/vulncheck_sdk/models/api_problem_type.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemType(BaseModel): """ - ApiProblemType + api.ProblemType """ # noqa: E501 problemtype_data: Optional[List[ApiProblemTypeData]] = None __properties: ClassVar[List[str]] = ["problemtype_data"] diff --git a/vulncheck_sdk/models/api_problem_type_data.py b/vulncheck_sdk/models/api_problem_type_data.py index 8a1ee6ed..ff6448f1 100644 --- a/vulncheck_sdk/models/api_problem_type_data.py +++ b/vulncheck_sdk/models/api_problem_type_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeData(BaseModel): """ - ApiProblemTypeData + api.ProblemTypeData """ # noqa: E501 description: Optional[List[ApiProblemTypeDescription]] = None __properties: ClassVar[List[str]] = ["description"] diff --git a/vulncheck_sdk/models/api_problem_type_data_extended.py b/vulncheck_sdk/models/api_problem_type_data_extended.py index 75b16481..8eab986c 100644 --- a/vulncheck_sdk/models/api_problem_type_data_extended.py +++ b/vulncheck_sdk/models/api_problem_type_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeDataExtended(BaseModel): """ - ApiProblemTypeDataExtended + api.ProblemTypeDataExtended """ # noqa: E501 description: Optional[List[ApiProblemTypeDescriptionExtended]] = None __properties: ClassVar[List[str]] = ["description"] diff --git a/vulncheck_sdk/models/api_problem_type_description.py b/vulncheck_sdk/models/api_problem_type_description.py index 86ac9430..78c5be19 100644 --- a/vulncheck_sdk/models/api_problem_type_description.py +++ b/vulncheck_sdk/models/api_problem_type_description.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiProblemTypeDescription(BaseModel): """ - ApiProblemTypeDescription + api.ProblemTypeDescription """ # noqa: E501 lang: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_problem_type_description_extended.py b/vulncheck_sdk/models/api_problem_type_description_extended.py index cc2277fd..0390e44d 100644 --- a/vulncheck_sdk/models/api_problem_type_description_extended.py +++ b/vulncheck_sdk/models/api_problem_type_description_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiProblemTypeDescriptionExtended(BaseModel): """ - ApiProblemTypeDescriptionExtended + api.ProblemTypeDescriptionExtended """ # noqa: E501 lang: Optional[StrictStr] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_problem_type_extended.py b/vulncheck_sdk/models/api_problem_type_extended.py index efc34824..f14dc86c 100644 --- a/vulncheck_sdk/models/api_problem_type_extended.py +++ b/vulncheck_sdk/models/api_problem_type_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiProblemTypeExtended(BaseModel): """ - ApiProblemTypeExtended + api.ProblemTypeExtended """ # noqa: E501 problemtype_data: Optional[List[ApiProblemTypeDataExtended]] = None __properties: ClassVar[List[str]] = ["problemtype_data"] diff --git a/vulncheck_sdk/models/api_reference.py b/vulncheck_sdk/models/api_reference.py index 1f4c17af..8e082aad 100644 --- a/vulncheck_sdk/models/api_reference.py +++ b/vulncheck_sdk/models/api_reference.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReference(BaseModel): """ - ApiReference + api.Reference """ # noqa: E501 href: Optional[StrictStr] = Field(default=None, description="sort") id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_reference_data.py b/vulncheck_sdk/models/api_reference_data.py index d4bc1639..87e4ced4 100644 --- a/vulncheck_sdk/models/api_reference_data.py +++ b/vulncheck_sdk/models/api_reference_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReferenceData(BaseModel): """ - ApiReferenceData + api.ReferenceData """ # noqa: E501 name: Optional[StrictStr] = None refsource: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_reference_data_extended.py b/vulncheck_sdk/models/api_reference_data_extended.py index b2b98c4a..5cdc1c74 100644 --- a/vulncheck_sdk/models/api_reference_data_extended.py +++ b/vulncheck_sdk/models/api_reference_data_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiReferenceDataExtended(BaseModel): """ - ApiReferenceDataExtended + api.ReferenceDataExtended """ # noqa: E501 date_added: Optional[StrictStr] = None external_id: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_references.py b/vulncheck_sdk/models/api_references.py index fafc7f23..ed6e4546 100644 --- a/vulncheck_sdk/models/api_references.py +++ b/vulncheck_sdk/models/api_references.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiReferences(BaseModel): """ - ApiReferences + api.References """ # noqa: E501 reference_data: Optional[List[ApiReferenceData]] = None __properties: ClassVar[List[str]] = ["reference_data"] diff --git a/vulncheck_sdk/models/api_references_extended.py b/vulncheck_sdk/models/api_references_extended.py index 08481e8d..e17338b9 100644 --- a/vulncheck_sdk/models/api_references_extended.py +++ b/vulncheck_sdk/models/api_references_extended.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiReferencesExtended(BaseModel): """ - ApiReferencesExtended + api.ReferencesExtended """ # noqa: E501 reference_data: Optional[List[ApiReferenceDataExtended]] = Field(default=None, description="ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"` ThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"` RansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"` AdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"` IdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`") __properties: ClassVar[List[str]] = ["reference_data"] diff --git a/vulncheck_sdk/models/api_related_attack_pattern.py b/vulncheck_sdk/models/api_related_attack_pattern.py index 5f43c4b4..a4b9e07e 100644 --- a/vulncheck_sdk/models/api_related_attack_pattern.py +++ b/vulncheck_sdk/models/api_related_attack_pattern.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiRelatedAttackPattern(BaseModel): """ - ApiRelatedAttackPattern + api.RelatedAttackPattern """ # noqa: E501 capec_id: Optional[StrictStr] = None capec_name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_ssvc.py b/vulncheck_sdk/models/api_ssvc.py index f8d6d4d5..f7f001cf 100644 --- a/vulncheck_sdk/models/api_ssvc.py +++ b/vulncheck_sdk/models/api_ssvc.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiSSVC(BaseModel): """ - ApiSSVC + api.SSVC """ # noqa: E501 automatable: Optional[StrictStr] = None exploitation: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/api_temporal_cvssv2.py b/vulncheck_sdk/models/api_temporal_cvssv2.py index af1dd13c..4cb7c379 100644 --- a/vulncheck_sdk/models/api_temporal_cvssv2.py +++ b/vulncheck_sdk/models/api_temporal_cvssv2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiTemporalCVSSV2(BaseModel): """ - ApiTemporalCVSSV2 + api.TemporalCVSSV2 """ # noqa: E501 exploitability: Optional[StrictStr] = None remediation_level: Optional[StrictStr] = Field(default=None, alias="remediationLevel") diff --git a/vulncheck_sdk/models/api_temporal_cvssv3.py b/vulncheck_sdk/models/api_temporal_cvssv3.py index 8973c901..bfeeed2c 100644 --- a/vulncheck_sdk/models/api_temporal_cvssv3.py +++ b/vulncheck_sdk/models/api_temporal_cvssv3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiTemporalCVSSV3(BaseModel): """ - ApiTemporalCVSSV3 + api.TemporalCVSSV3 """ # noqa: E501 exploit_code_maturity: Optional[StrictStr] = Field(default=None, alias="exploitCodeMaturity") remediation_level: Optional[StrictStr] = Field(default=None, alias="remediationLevel") diff --git a/vulncheck_sdk/models/api_temporal_metric_v2.py b/vulncheck_sdk/models/api_temporal_metric_v2.py index 3e7569e4..95c79f77 100644 --- a/vulncheck_sdk/models/api_temporal_metric_v2.py +++ b/vulncheck_sdk/models/api_temporal_metric_v2.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiTemporalMetricV2(BaseModel): """ - ApiTemporalMetricV2 + api.TemporalMetricV2 """ # noqa: E501 cvss_v2: Optional[ApiTemporalCVSSV2] = Field(default=None, alias="cvssV2") __properties: ClassVar[List[str]] = ["cvssV2"] diff --git a/vulncheck_sdk/models/api_temporal_metric_v3.py b/vulncheck_sdk/models/api_temporal_metric_v3.py index 25b6dc77..5c3856e6 100644 --- a/vulncheck_sdk/models/api_temporal_metric_v3.py +++ b/vulncheck_sdk/models/api_temporal_metric_v3.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class ApiTemporalMetricV3(BaseModel): """ - ApiTemporalMetricV3 + api.TemporalMetricV3 """ # noqa: E501 cvss_v3: Optional[ApiTemporalCVSSV3] = Field(default=None, alias="cvssV3") __properties: ClassVar[List[str]] = ["cvssV3"] diff --git a/vulncheck_sdk/models/api_update.py b/vulncheck_sdk/models/api_update.py index a35d5986..1adc597b 100644 --- a/vulncheck_sdk/models/api_update.py +++ b/vulncheck_sdk/models/api_update.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.api_date_time import ApiDateTime from vulncheck_sdk.models.api_package import ApiPackage from vulncheck_sdk.models.api_reference import ApiReference from typing import Optional, Set @@ -28,13 +27,13 @@ class ApiUpdate(BaseModel): """ - ApiUpdate + api.Update """ # noqa: E501 cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[ApiDateTime] = None + issued: Optional[Dict[str, Any]] = Field(default=None, description="api.DateTime") os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[ApiPackage]] = None @@ -42,7 +41,7 @@ class ApiUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[ApiDateTime] = None + updated: Optional[Dict[str, Any]] = Field(default=None, description="api.DateTime") __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": ApiDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [ApiPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": ApiDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/api_vuln_check_canary.py b/vulncheck_sdk/models/api_vuln_check_canary.py index 46e7f411..15cc2be7 100644 --- a/vulncheck_sdk/models/api_vuln_check_canary.py +++ b/vulncheck_sdk/models/api_vuln_check_canary.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class ApiVulnCheckCanary(BaseModel): """ - ApiVulnCheckCanary + api.VulnCheckCanary """ # noqa: E501 category: Optional[StrictStr] = None client_fingerprints: Optional[ApiClientFingerprints] = None diff --git a/vulncheck_sdk/models/api_vulnerability_alias.py b/vulncheck_sdk/models/api_vulnerability_alias.py index e511dcbd..37290e95 100644 --- a/vulncheck_sdk/models/api_vulnerability_alias.py +++ b/vulncheck_sdk/models/api_vulnerability_alias.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ApiVulnerabilityAlias(BaseModel): """ - ApiVulnerabilityAlias + api.VulnerabilityAlias """ # noqa: E501 alias: Optional[StrictStr] = None cve: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/models_entitlements.py b/vulncheck_sdk/models/models_entitlements.py index d4ac7aa4..e36157fd 100644 --- a/vulncheck_sdk/models/models_entitlements.py +++ b/vulncheck_sdk/models/models_entitlements.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ModelsEntitlements(BaseModel): """ - ModelsEntitlements + models.Entitlements """ # noqa: E501 entitlements: Optional[Dict[str, List[StrictStr]]] = Field(default=None, description="Entitlements provides a map of roles to a list of entitlements") __properties: ClassVar[List[str]] = ["entitlements"] diff --git a/vulncheck_sdk/models/paginate_match.py b/vulncheck_sdk/models/paginate_match.py index 8a9215e3..ae68f4cf 100644 --- a/vulncheck_sdk/models/paginate_match.py +++ b/vulncheck_sdk/models/paginate_match.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PaginateMatch(BaseModel): """ - PaginateMatch + paginate.Match """ # noqa: E501 var_field: Optional[StrictStr] = Field(default=None, alias="field") value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/paginate_pagination.py b/vulncheck_sdk/models/paginate_pagination.py index 0af5e684..c2b7ce5b 100644 --- a/vulncheck_sdk/models/paginate_pagination.py +++ b/vulncheck_sdk/models/paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class PaginatePagination(BaseModel): """ - PaginatePagination + paginate.Pagination """ # noqa: E501 cursor: Optional[StrictStr] = Field(default=None, description="Cursor for the current page") first_item: Optional[StrictInt] = Field(default=None, description="First and last Item") diff --git a/vulncheck_sdk/models/paginate_param.py b/vulncheck_sdk/models/paginate_param.py index 491e3085..043f0c5c 100644 --- a/vulncheck_sdk/models/paginate_param.py +++ b/vulncheck_sdk/models/paginate_param.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PaginateParam(BaseModel): """ - PaginateParam + paginate.Param """ # noqa: E501 filtering: Optional[StrictStr] = None format: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/params_index_backup.py b/vulncheck_sdk/models/params_index_backup.py index bfb13c73..35cd6309 100644 --- a/vulncheck_sdk/models/params_index_backup.py +++ b/vulncheck_sdk/models/params_index_backup.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexBackup(BaseModel): """ - ParamsIndexBackup + params.IndexBackup """ # noqa: E501 date_added: Optional[StrictStr] = None filename: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/params_index_backup_list.py b/vulncheck_sdk/models/params_index_backup_list.py index eeab7ede..f6e4b843 100644 --- a/vulncheck_sdk/models/params_index_backup_list.py +++ b/vulncheck_sdk/models/params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexBackupList(BaseModel): """ - ParamsIndexBackupList + params.IndexBackupList """ # noqa: E501 description: Optional[StrictStr] = None href: Optional[StrictStr] = Field(default=None, description="Href API endpoint URI to detailed backup information") diff --git a/vulncheck_sdk/models/params_index_list.py b/vulncheck_sdk/models/params_index_list.py index c82eb752..6e5d3755 100644 --- a/vulncheck_sdk/models/params_index_list.py +++ b/vulncheck_sdk/models/params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class ParamsIndexList(BaseModel): """ - ParamsIndexList + params.IndexList """ # noqa: E501 description: Optional[StrictStr] = None href: Optional[StrictStr] = Field(default=None, description="Href API endpoint URI to detailed index information") diff --git a/vulncheck_sdk/models/purl_batch_vuln_finding.py b/vulncheck_sdk/models/purl_batch_vuln_finding.py index b9618c92..56f593b6 100644 --- a/vulncheck_sdk/models/purl_batch_vuln_finding.py +++ b/vulncheck_sdk/models/purl_batch_vuln_finding.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -28,11 +28,11 @@ class PurlBatchVulnFinding(BaseModel): """ - PurlBatchVulnFinding + purl.BatchVulnFinding """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") purl: Optional[StrictStr] = Field(default=None, description="the purl, ex. hex/coherence@0.1.2") - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None research_attributes: Optional[ApiOSSPackageResearchAttributes] = None vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") __properties: ClassVar[List[str]] = ["cves", "purl", "purl_struct", "research_attributes", "vulnerabilities"] diff --git a/vulncheck_sdk/models/purl_package_urljson.py b/vulncheck_sdk/models/purl_package_urljson.py index dd8b3b90..72bf36e2 100644 --- a/vulncheck_sdk/models/purl_package_urljson.py +++ b/vulncheck_sdk/models/purl_package_urljson.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class PurlPackageURLJSON(BaseModel): """ - PurlPackageURLJSON + meta-data about the purl """ # noqa: E501 name: Optional[StrictStr] = None namespace: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/purl_qualifier_json.py b/vulncheck_sdk/models/purl_qualifier_json.py index 4378c7dc..a7e42eb5 100644 --- a/vulncheck_sdk/models/purl_qualifier_json.py +++ b/vulncheck_sdk/models/purl_qualifier_json.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PurlQualifierJSON(BaseModel): """ - PurlQualifierJSON + purl.QualifierJSON """ # noqa: E501 key: Optional[StrictStr] = None value: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/purls_purl_response.py b/vulncheck_sdk/models/purls_purl_response.py index 45a0cd97..081d0f75 100644 --- a/vulncheck_sdk/models/purls_purl_response.py +++ b/vulncheck_sdk/models/purls_purl_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.models.purls_vulnerability import PurlsVulnerability from typing import Optional, Set @@ -26,9 +26,9 @@ class PurlsPurlResponse(BaseModel): """ - PurlsPurlResponse + purls.PurlResponse """ # noqa: E501 - artifacts: Optional[Dict[str, Any]] = None + artifacts: Optional[Dict[str, Any]] = Field(default=None, description="purls.Artifact") cves: Optional[List[StrictStr]] = None licenses: Optional[List[StrictStr]] = None name: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/purls_vulnerability.py b/vulncheck_sdk/models/purls_vulnerability.py index 146342b1..44203f0b 100644 --- a/vulncheck_sdk/models/purls_vulnerability.py +++ b/vulncheck_sdk/models/purls_vulnerability.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class PurlsVulnerability(BaseModel): """ - PurlsVulnerability + purls.Vulnerability """ # noqa: E501 arch: Optional[StrictStr] = None detection: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/render_response_array_params_index_backup_list.py b/vulncheck_sdk/models/render_response_array_params_index_backup_list.py index 531e13dc..6a75e8cc 100644 --- a/vulncheck_sdk/models/render_response_array_params_index_backup_list.py +++ b/vulncheck_sdk/models/render_response_array_params_index_backup_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseArrayParamsIndexBackupList(BaseModel): """ - RenderResponseArrayParamsIndexBackupList + render.Response-array_params_IndexBackupList """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") data: Optional[List[ParamsIndexBackupList]] = None diff --git a/vulncheck_sdk/models/render_response_array_params_index_list.py b/vulncheck_sdk/models/render_response_array_params_index_list.py index d0655c98..c9276a89 100644 --- a/vulncheck_sdk/models/render_response_array_params_index_list.py +++ b/vulncheck_sdk/models/render_response_array_params_index_list.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseArrayParamsIndexList(BaseModel): """ - RenderResponseArrayParamsIndexList + render.Response-array_params_IndexList """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") data: Optional[List[ParamsIndexList]] = None diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py index ace64778..6cdd5f96 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_a10_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination + render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py index 0eb95de2..91888a6e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index 90ca5649..dc6b87d2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination + render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index 74cc08ad..2c87c8c2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination + render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py index 164f2f79..fa7a4554 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_acronis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination + render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index e210c712..15654723 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py index 88432b21..663a5a22 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advantech_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination + render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py index b75d99b5..3f268f78 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py index 2a1d1afe..415b549d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_advisory_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination + render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py index 89ab89b7..048803c3 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination + render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py index ef86ed0e..6df8bf38 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aleph_research_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination + render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py index d18f364b..a7740d0f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination + render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py index 74d6b5f5..0d26a7c7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alma_linux_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination + render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py index bf1732f5..e3bafed7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_alpine_linux_sec_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination + render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py index e023d1f0..a72a2d6c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amazon_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py index d9817803..0e4515b7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_amd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination + render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py index d89fa14d..57ba9286 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ami_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination + render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py index 11f41595..64a8d8ba 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_anchore_nvd_override_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination + render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py index b7eb6246..57542b37 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_android_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py index 83e4a000..068d022c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_active_mq_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py index 933f8817..cc9e3b29 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_archiva_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index 4bd25a9c..32365502 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py index 4e9ada49..593d3853 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_camel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py index a9bad08e..249e336f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_commons_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index 042b12b1..e17f905a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py index 3bd737a7..d8f8c88c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_flink_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index e7e1218d..ab433fb6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py index 2b000012..5156e01c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_hadoop_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py index 84e53964..fd9b85e5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_http_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 653cdd31..855394b1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 725e8719..26f78503 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py index 085c071b..bfda88ad 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_logging_services_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py index ec5e37b6..b5d11b4b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_ni_fi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index 5ae3644b..210d3366 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index 248a26d6..051eb656 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index b436a709..a7f5b1a0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py index b48b7742..f0d1fab5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_pulsar_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination + render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py index 95f587c6..e590157b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_shiro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index 948c6fb9..61e464fd 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py index 9d371579..6a20810f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_struts_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py index 546c33d9..228009d9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_subversion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py index 6c17a30e..81ead497 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_superset_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index 934dd739..fcc15cc1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index 8550ec48..de98d566 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination + render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 40fbf28f..743ceccc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination + render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py index 99eba0f1..28257921 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_appgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination + render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py index d62efe06..ce70a23c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_apple_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py index 15aa3694..e9826398 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arch_issue_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination + render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py index cb33a4f9..601f6c91 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_arista_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination + render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py index c11a15d1..5ae1fa69 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aruba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination + render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py index 17e56634..91c52941 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asrg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination + render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index f067afc2..bb70a2ac 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination + render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py index 2b7058e2..8f704cbe 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asterisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination + render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py index 067eebea..9a262bd9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_astra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination + render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py index 91f56ee9..47261a2b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_asus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination + render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py index a8e1395a..12469744 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py index 08aeddc4..513cc323 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atlassian_vuln_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination + render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py index b69a020c..51a62c95 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_atredis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination + render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 08ccd072..fd6712ab 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination + render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py index 004c47e1..6b5cf27e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aus_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination + render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py index 314827fe..63eeede4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_autodesk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination + render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py index e19f7aaf..0830cb72 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avaya_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination + render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py index fd9a5d6c..220917ec 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aveva_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py index 5bfb78da..ecd3b4b7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avidml_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination + render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index 4f781280..ea86c6b7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination + render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py index f7d56b38..ad968f26 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_aws_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination + render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py index 1aaba3d2..f4fc59f9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination + render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py index bd60a8a2..2c9b7492 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_azul_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination + render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py index 8689f1d1..0fa4aadf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_b_braun_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py index 9e8d1f71..cf16bdaf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bandr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination + render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py index 87866803..cf0c0ee0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_baxter_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index ced2508f..671678aa 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py index 0484fb1d..0ed6ce63 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckhoff_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index 8247d94b..c0837d4c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination + render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py index 440047f3..c9958200 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_becton_dickinson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py index fcc22132..453338e0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_belden_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index eba62858..3001c208 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination + render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py index b6a34b4e..e462395e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_binarly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination + render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py index 9dd5861f..74478899 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bit_defender_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination + render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py index 522db926..37871af4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_black_berry_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination + render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py index f0439b08..442c31cb 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination + render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py index 5d96fcf4..0702fd63 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_bosch_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py index ec033d52..e699ae51 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_boston_scientific_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py index 5b026c34..6488d937 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_botnet_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination + render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py index 195681e8..cf5942d2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ca_cyber_centre_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py index 05995e87..4349ee5b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_canvas_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py index ed6f4c16..fc2a9fcf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carestream_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py index 4188a0e2..ac91486a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_carrier_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination + render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py index 4735d6ff..1cac4b0a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cbl_mariner_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination + render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py index 4e6200e0..20368d8b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_be_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination + render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py index 7ac33936..c0f8e71e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_fr_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index 9b4f8647..eb31a591 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination + render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py index f1e8af94..3c6ce745 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ir_security_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py index 830d4adb..d5b49337 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_se_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination + render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py index 5e555277..422d3983 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cert_ua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination + render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py index b4518835..c45bfda5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_certeu_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py index 59fd72cb..8ee597d1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cesa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination + render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py index a707c933..7ee2ca22 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chain_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination + render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py index 18667f03..dffd1005 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_check_point_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination + render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py index eea7e674..d7135f5b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_chrome_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination + render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py index 7389f561..63d6a124 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ciena_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination + render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py index 352dad5d..af958415 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 5f312866..66862ef5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination + render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py index d2b6eff9..7a5d02fa 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index 216d715f..6561d4b9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py index fa0600ad..d2510f2a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cisco_known_good_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination + render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py index 05d619a5..8abefb3c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_citrix_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py index 9f9c2e7a..960fa3d0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_claroty_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index d743b605..b863a4e4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination + render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py index b30acd67..2857f1fe 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cloud_vuln_db_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py index e8deb322..0e897335 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnnvd_entry_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination + render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py index ff6b8d26..4cd8ad62 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination + render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py index a5a16821..f9134e2a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cnvd_flaw_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination + render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py index 61da6363..46ea338b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_codesys_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py index 8688abc8..99b804ff 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_comm_vault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination + render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py index 77ea5e94..225005cc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_compass_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py index c84effab..b5252a2d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_container_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination + render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py index 51081848..ddefd55f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_core_impact_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py index 98e32f0c..86eeef8a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crestron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination + render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py index 71d83a1a..0452433e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_crowd_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination + render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py index e4ff01d9..4fd04c8a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_curl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination + render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index 8c0e3a25..7f31490a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination + render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index 085aac29..f98b7f4f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 9a903512..c12c1480 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination + render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py index bfaf4e8d..70e8f7aa 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_danfoss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination + render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py index 89cdf649..448b4fd2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dassault_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination + render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index e7e3d7ca..e8a08648 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py index 1682ceb8..9b84ecf5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination + render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py index 07d75eef..0897e60e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_delta_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py index d9e1cc40..877b944f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dfn_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination + render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py index 6813cc8d..14a87fc6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_distro_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py index c6ac9d0d..8d3b28a2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_django_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination + render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index 7dc8b1fa..07c5f263 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination + render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py index 09c68770..39d254e0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dot_cms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination + render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py index 29ec954e..b7a5991b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_dragos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index 87783fad..90e22461 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination + render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py index f48ab46a..c3dab197 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_drupal_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination + render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py index bb5b030b..73493104 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eaton_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py index 2c5f77f0..13c08850 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elastic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination + render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py index c5dbdf2a..3035dc8e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_elspec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination + render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py index 30f39e54..9b56da9c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerging_threats_snort_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination + render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py index c69c30aa..29a6098b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_emerson_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index a7519c3c..b0bcbd11 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination + render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py index 9ef3c66d..eadd0f80 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_endress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination + render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py index 15cf3cb6..469ab679 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_alibaba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py index cfab4fd7..2be56915 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_microsoft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py index e093acd8..eb7a3237 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_eol_release_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination + render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py index 664f5319..6b68495d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_euvd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination + render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py index c57123d8..30fa4a2c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exodus_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination + render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py index b29b84b3..35472cd1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_exploit_db_exploitv2_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination + render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py index 4ad50a58..c63cc4b2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination + render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index 17ba9d0f..9836fa8f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination + render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py index 72efc3b1..1bb98af7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fanuc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination + render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index ff64be74..39fb0d48 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination + render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py index 9099c1cf..fe022c5b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_festo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination + render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py index dad767a2..bb961fab 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination + render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index 20c00e2b..18177e26 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination + render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index 84648fad..e21c0a2f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py index a7b5ad67..3e2b5df0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_forge_rock_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination + render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py index 7490e419..08643237 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py index 26761f7f..4ef947c1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fortinet_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination + render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py index 3e006ac6..2c39b6cd 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_foxit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination + render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py index 09803658..738da56c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_fresenius_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination + render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py index 38131479..27a1b042 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gallagher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination + render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index af4d2cb4..16faeb06 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination + render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index 0b7fc4d0..385cb0d4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination + render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py index 62c6ea0d..f32b424a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ge_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py index bcf02402..4e7a1dbe 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination + render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 49f1f3f8..40e6c147 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination + render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index f767d8ef..45ad9406 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination + render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index e2a26ff0..59b44756 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination + render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index f940ba4a..8a96cf62 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination + render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py index 24c6724a..8be18abf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_hub_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py index 9193083d..78eccbda 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_git_lab_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index 72e18b56..3c9e7497 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py index d44e2da5..e1e1b9d6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gitlab_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py index 2f44b3d0..80360a75 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_glibc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination + render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py index 56653dbd..9841380e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gmo_cyber_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py index 827facac..5070817d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_gnu_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination + render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index a0f2054c..6fde9bbd 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination + render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py index c26ee806..93549faa 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grafana_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination + render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py index 3ff08e79..69a6c1e7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_grey_noise_detection_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination + render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py index fe0636ae..4b0cad7e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hacktivity_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination + render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index f99e523c..7a80929c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination + render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py index c11abbc0..4c3a79bb 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hashi_corp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination + render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index 6b3f3704..43819a16 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py index f3f7400d..fac528e1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hcl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination + render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py index a0f23551..c818f900 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hik_vision_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination + render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py index 858e8464..7be1693f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hillrom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py index 5e92c6c1..9e7a726d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_energy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination + render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py index 80ec36cf..972989ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hitachi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination + render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py index 52e330c2..867ee85b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination + render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py index a495025e..161851a9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hms_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination + render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index ab515724..86c96732 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination + render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py index 827c4570..536ae9b2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination + render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py index bf128fe7..a69f45e6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_hpe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination + render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py index e196cc7a..7c91d0ab 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_euler_os_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination + render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py index c2ce390b..1c9186de 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_ips_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination + render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py index 1ff9037e..12d6295b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_huawei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination + render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py index 82e1b88a..6f6e2f75 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_iava_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination + render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index 661a734b..a2d0ec21 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination + render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py index e338b002..845f1ea2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_idemia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination + render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py index fc8e97c0..191c7cc6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_igel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination + render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py index a402001d..8ee14285 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_incibe_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py index 373c1c60..9f83b5b4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_intel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination + render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py index 0f453619..54aafd0f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ip_intel_record_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination + render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py index 7b6bb7b3..cf6a48dd 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_alert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination + render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py index 95413244..4bcdf401 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_israeli_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py index aafb493f..e58aa485 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_istio_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination + render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py index 47743086..1ce98eb6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_itw_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index 0c0df38c..a4e77663 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination + render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index 0c15e580..dab23f39 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination + render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py index 7f1083d0..8dc3ef62 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_j_frog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination + render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py index 259b3a03..212d853c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jenkins_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination + render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py index b04a20a1..619ce8a7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jet_brains_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination + render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index 0cfee8e1..aea6ff74 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py index ee8c1c16..1400c35f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_johnson_controls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination + render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py index f07a6568..ddca0a6c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_juniper_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination + render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py index a0845fbc..52cfd2bf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_advisory_item_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination + render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py index d048e3bb..5f82037d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_jvn_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination + render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py index 057458d2..10ca7cb7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_k8_s_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination + render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py index 5ac682fc..fd6c6b9a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kaspersky_icscert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py index e63f5c1d..57d86d1f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kev_catalog_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py index 82d10110..dd085f10 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kore_logic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination + render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py index 0527a1f7..d1f5e8ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kr_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index 38430ec1..9d13587e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination + render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py index c648385e..7fb2f487 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lantronix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination + render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py index e2f208b5..c60411c5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lenovo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination + render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py index a23d0617..1d85eae2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lexmark_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py index d3c580a4..39621fc0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination + render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py index 3dff4532..e97c40ef 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_libre_office_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination + render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py index dd09cd40..b173b323 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination + render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index 2dbca6fe..93295d7a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination + render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index 0c14e9f7..d5d1a766 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination + render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py index cffe389e..f85ec45f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ma_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination + render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index 1fb9ea11..f207d3dc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index 14e7baa0..c322a6c2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py index 67092019..ee77bf3b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mbed_tls_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination + render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py index ea00eb48..58cf0e25 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mc_afee_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination + render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py index c58d0a8c..29e7c61d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mediatek_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination + render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py index 8a3b63a7..3b2dae2c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_medtronic_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py index 96a3d602..6ec91a79 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mendix_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination + render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py index 76c07ec0..69d7ce91 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_advisories_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination + render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index df6e7e32..6105bcd6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination + render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py index cf368bdf..04ee972d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_metasploit_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index 3bdfaa00..46d20857 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index fa9d00b1..033382be 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index c3d64739..3c5eb42b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py index fa5a66bf..4a344d13 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_microsoft_kb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination + render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index cf1ec3a4..0346d6b9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination + render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index b5c8508c..dcc9b013 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination + render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py index 87599414..ed527b7d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_misp_value_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination + render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index 44be063f..f801d95a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination + render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index 02245eaa..edd731c4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination + render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py index d8a26ad7..eeff3001 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mitsubishi_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py index dcaffb87..49df6f9c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mongo_db_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination + render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index dfe1ce66..827aba4c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py index 19409692..48caefc6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_mozilla_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 217f63d6..ba618c40 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination + render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index 1a63eb21..d5743962 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination + render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index 119b528a..b40c459a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py index 0e7bb4f6..b7ad2927 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination + render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py index 056e5e2f..cf7b1fbf 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nessus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination + render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py index 9e5bcfad..152b8bf4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_net_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination + render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py index 983ab41c..4442ec83 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netatalk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination + render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index 08434ffe..29d92bfc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination + render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py index 518a0a51..6d2b4b4a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netgear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination + render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py index bdd9b0a9..fb0768b9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_netskope_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination + render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py index 7cc5060f..92b731d8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nexpose_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination + render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py index 895272eb..238a53da 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nginx_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py index 8b08ab7b..251a98a8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nhs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination + render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py index cd85fc0d..ec6c1080 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ni_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination + render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py index 32cd73c3..fb2f175a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_js_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination + render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py index 0327f547..b8ac3204 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_node_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index fa99f4b8..9aaa5f81 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination + render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index 00f7049c..e3daa97b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination + render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index a0489e7a..1dd021f0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination + render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py index 18d05616..a433f50c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ntp_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination + render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py index 462c4c0e..92b0d183 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nuclei_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination + render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index d0d76a41..281d30e5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination + render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py index 28d93ce1..a22160af 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nvdcpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination + render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py index 82034c5b..22cb9203 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_nz_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py index 923ae383..3ee7b9a8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_octopus_deploy_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination + render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py index 478458dd..16d8d31e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_okta_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination + render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 0c01fca1..545c3b81 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination + render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index de6674d3..a239ab4d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination + render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py index 182eceb7..81bce1e2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_bsd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py index e8489a42..408838ae 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_cvdb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index 9c9d1fb0..600a83a0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index 446e2f6c..8bce6ffc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py index 54fc8658..1f69a88b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_ssl_sec_adv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py index 30b20b9b..2c45c7e6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_open_stack_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination + render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 712c5d22..fd74697a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination + render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py index 44d6a06e..ec324a12 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination + render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 2aaadd4b..9e3f18ee 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination + render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py index 90bf7ad5..a28d6987 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination + render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py index dd60e06d..4c4c5eef 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_otrs_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination + render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index 8f20d2b7..f37e964b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination + render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py index 3b48652c..844d9345 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_packetstorm_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py index 24e6c889..e1797102 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palantir_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination + render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py index dc2de2be..dc5f677f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_palo_alto_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index 6fec00cf..7a7270ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination + render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py index 4eeb9a54..56161ee0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_paper_cut_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination + render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py index af78c6cb..8b816c97 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pega_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination + render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py index fa595e03..28b47e9b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_philips_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py index 2253ffb7..65489f7c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phoenix_contact_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index 02f1122a..6504ee5e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination + render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index 878578f2..257989a7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination + render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py index 404de690..995b62c3 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_postgres_sql_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination + render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index 5c92e8d7..cbe23aab 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination + render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py index c4a8df70..163ae205 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination + render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index 79741e12..c22a2e0e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination + render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index 31231ed1..5257b994 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination + render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py index 69bf3b95..a6b3643b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_pure_storage_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination + render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index bc7ef7a5..2e072480 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py index a28e8c6f..1936e37f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qnap_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py index 21a5e646..ce2846ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qqid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination + render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index d0b74d84..0a82eeb8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination + render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py index 0f811419..ea4bf6c1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualcomm_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination + render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py index 78a1901e..85a1a346 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination + render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py index 03bbbe5a..a62e9e2d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_qualys_qid_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination + render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py index c864b7ea..21104737 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ransomware_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 25dbaa82..9a98c165 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination + render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py index 178652b1..8ce292ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_redhat_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index 0cdd2599..311190bc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination + render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py index d26bffcb..843a8b04 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_revive_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination + render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index 867b8c7a..546a2eb4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py index c9ce8d8b..d9be4c83 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination + render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py index 5dda465d..f5d12445 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rockwell_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination + render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py index 2a97a270..17b1fc03 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rocky_errata_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination + render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 1dd67c68..d7758278 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination + render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index e2ae541d..6f6da578 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination + render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py index e0b04821..04aa17bc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_rustsec_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py index a0f0b6c9..3f9cde4c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py index b1868e1b..4d541acb 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination + render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py index 94b68715..b8a8f1c5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_saint_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py index 0d828f9d..440d1c07 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sales_force_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination + render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py index 0404fd91..8d4255d1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_samba_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination + render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index ff15c378..59482781 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination + render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py index 34691bd2..02451389 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sans_dshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination + render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py index bcce7c15..ae945e1b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sap_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination + render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py index 6f73effe..cd2a367c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schneider_electric_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index e2e820ca..e72f09e0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination + render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index 98e909d3..96ca3bf7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination + render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py index 5658ab46..fb8bc782 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_bulletin_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination + render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py index 91251216..679ed303 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_security_lab_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination + render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py index 27f17acf..299e1337 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seebug_exploit_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination + render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py index 4f56b27c..61240328 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySelPaginatePagination + render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py index fb6face1..253949ac 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sentinel_one_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination + render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index 0d7b00a7..20ea1791 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination + render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index 2ed5ffa0..8888e597 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination + render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py index 677d0acc..ffe381d3 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shadow_server_exploited_vulnerability_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination + render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index 692d27aa..51bf6cc9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination + render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py index 07b02e64..3ae758c7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sick_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySickPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySickPaginatePagination + render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index c93c942a..b3d6b05f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py index df4a673b..53573072 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sierra_wireless_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination + render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index 1de09ae0..50dd5d01 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination + render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py index 1dfda4fc..24a6756b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sing_cert_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination + render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py index 91983656..e79236ae 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sitecore_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination + render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index 2a60c682..590fe892 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination + render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py index 76330e6a..e98baff4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solar_winds_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 7c60ed2a..11962440 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination + render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index da530fd8..52b72b68 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination + render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py index 118542fb..09faa854 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sonic_wall_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index 10cf07b2..11dd09ea 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py index 66cadd18..67d9c5cd 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_splunk_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination + render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py index c271401d..67311b47 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_spring_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination + render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py index 6709a9da..60ca746f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ssd_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py index 6e55288c..d8bc2b4e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stormshield_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination + render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py index bb335ac0..3e829363 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_stryker_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py index 35cf43ec..252f6da1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_sudo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination + render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 4a74f902..711d52fc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination + render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py index ca7e5a36..a651ed3d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_swisslog_healthcare_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index 9b9afdcc..482c67ca 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination + render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index 377ad2c2..d7298e99 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination + render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py index 0ac0d7e7..2a760600 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syncro_soft_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination + render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py index 16a33d84..d895c17a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_synology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination + render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py index 04e9ebda..51a9a62b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_syss_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination + render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index d7c90d39..a9f9af19 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination + render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py index e93e24f3..e3cbee80 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_talos_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py index faa151b2..e5d08387 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_team_viewer_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination + render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py index 54747239..dcdc5330 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tenable_research_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py index b7e26bc3..f789445d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tencent_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination + render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py index b5a48f15..85088e32 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thales_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination + render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py index 227f5931..07403df1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_the_missing_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index 368477f9..be82d937 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination + render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py index f76f8fae..8182ea92 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_threat_actor_with_external_objects_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination + render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py index 122f56d6..24ef8c2e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination + render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py index 5ae98c4c..08927297 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tibco_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination + render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py index 94e39dc6..330b6fbe 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tp_link_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination + render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py index b42e49d0..215f12f7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trane_technology_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination + render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py index e3d12de2..ee565643 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trend_micro_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination + render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index a609b768..6793c0a8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination + render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py index c44369d3..2ca8d5ad 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_tw_cert_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py index 190286e9..f5008e32 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubiquiti_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination + render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py index 45218e54..1baa093a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_ubuntu_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination + render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py index b97b52fa..99c8ef04 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unify_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination + render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py index 6f9ef1ee..709a2202 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_unisoc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination + render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py index 9a9d5102..9757e87f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination + render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py index 718b994d..3d9ff532 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usd_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination + render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py index e30c6442..b94fd3c6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_usom_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 2c389c0b..9fcbdbe8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination + render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py index 7bf8e38e..c50d85e4 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vapid_labs_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py index c09084c4..78a20d1a 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vc_vulnerable_cpes_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination + render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py index 3205af04..7b4db011 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vccpe_dictionary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination + render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index 321e87e4..8e715bb8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py index 69a0bbc2..79af66e8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veeam_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination + render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py index c4e12593..abd36aca 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_veritas_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination + render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py index a185bf16..41bd854d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_virtuozzo_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination + render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index eaf69593..77ef2a54 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination + render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py index 98ccee80..8e94b30e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vm_ware_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index ea4517b6..98fbab90 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination + render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py index 41382404..62326e89 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_config_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index accd69a9..4ca298bc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index 885ae35f..0b7dcb0f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py index 0f544369..be66a6c9 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vuln_check_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination + render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py index 9b388f07..7ae0a6f7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnerable_debian_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination + render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index 315de73e..15c7272b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination + render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index 806f32a2..a89d1e33 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py index 19dc8fbe..44b44c8d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_watch_guard_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination + render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index 840e4c05..1c9c2ae5 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination + render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 09cb7a03..611371bc 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination + render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index d5527885..4ea3ed6e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination + render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index 2196adc3..a2bb523f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination + render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py index 48bf6762..8c8a2324 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolf_ssl_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination + render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index 4a69cdb8..3a027283 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination + render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py index 2ea70058..a84721fe 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wordfence_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination + render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py index e2bd69fe..cf9ea0e2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_wrt_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination + render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py index 088d9cf4..632ebc1e 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xen_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination + render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index 9083cea2..a4b00241 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination + render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py index 117dcb6a..10b7bd6c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xiaomi_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination + render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py index f3f66be1..380ccd83 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_xylem_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination + render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py index 8667b495..8287a257 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yamaha_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination + render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py index 43a712cd..63c3d577 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yokogawa_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index d2b91d80..5c535160 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination + render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index ed421796..e3699ea2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination + render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py index 797edf12..19ad7b3d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_day_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py index 2621de24..da12f0c2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zero_science_advisory_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination + render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py index 8ba14f9f..10aa0835 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zimbra_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination + render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py index 124b37cf..2d1c7baa 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zoom_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination + render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index d554fdc4..bfc4c54c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination + render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py index 6565b76d..4b3a4841 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zuso_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination + render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index 37ab6c05..e0d454a8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination + render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index 4a713a38..daa97f69 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination + render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py index 0003d828..3d912663 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCveItemsPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCveItemsPaginatePagination + render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py index 7605d759..2e0b0ab0 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_cwe_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiCWEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiCWEPaginatePagination + render.ResponseWithMetadata-array_api_CWE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py index 26456443..2567566d 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_epss_data_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination + render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py index bc71cd0c..4a0ead99 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_chain_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitChainPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitChainPaginatePagination + render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index 036bafc6..d71e9a8b 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination + render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index 8291d3b0..23df83a1 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination + render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py index 18c97058..145cfea2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_initial_access_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination + render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py index 56b64c8b..87e86349 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_mitre_attack_to_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination + render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py index fb721df9..2c2bca35 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cpe_match_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index 5e1b5ad1..4a9b3a04 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index 50a01d52..b35ff12c 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination + render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py index 00ea9112..4e410f06 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_oss_package_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination + render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_update_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_update_paginate_pagination.py index c162d69a..9036aec2 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_update_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiUpdatePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiUpdatePaginatePagination + render.ResponseWithMetadata-array_api_Update-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 267f27f7..958783e8 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination + render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py index 2835927b..8a7b4cc7 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_api_vulnerability_alias_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination + render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/vulncheck_sdk/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index 63e4911f..d7dd23d3 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination(BaseModel): """ - RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination + render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[PaginatePagination] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py b/vulncheck_sdk/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py index c133f85d..ab0cae34 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py +++ b/vulncheck_sdk/models/render_response_with_metadata_array_string_v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class RenderResponseWithMetadataArrayStringV3controllersResponseMetadata(BaseModel): """ - RenderResponseWithMetadataArrayStringV3controllersResponseMetadata + render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py index db8ff2ad..9100839f 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py +++ b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_backup_response_data_v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersBackupResponseDataV3controllersBackupResponseMetadata + render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersBackupResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index 01e7c941..a225c436 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata + render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersPurlResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index 00822f22..08a8c5c6 100644 --- a/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/vulncheck_sdk/models/render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -27,7 +27,7 @@ class RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata(BaseModel): """ - RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata + render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata """ # noqa: E501 benchmark: Optional[Union[StrictFloat, StrictInt]] = Field(default=None, alias="_benchmark") meta: Optional[V3controllersPurlsResponseMetadata] = Field(default=None, alias="_meta") diff --git a/vulncheck_sdk/aio/models/advisory_issued.py b/vulncheck_sdk/models/search_error_response.py similarity index 77% rename from vulncheck_sdk/aio/models/advisory_issued.py rename to vulncheck_sdk/models/search_error_response.py index 13353408..189d5c57 100644 --- a/vulncheck_sdk/aio/models/advisory_issued.py +++ b/vulncheck_sdk/models/search_error_response.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,17 +18,18 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictBool, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self -class AdvisoryIssued(BaseModel): +class SearchErrorResponse(BaseModel): """ - AdvisoryIssued + search.ErrorResponse """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] + error: Optional[StrictBool] = None + errors: Optional[List[StrictStr]] = None + __properties: ClassVar[List[str]] = ["error", "errors"] model_config = ConfigDict( populate_by_name=True, @@ -48,7 +49,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a JSON string""" + """Create an instance of SearchErrorResponse from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -73,7 +74,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a dict""" + """Create an instance of SearchErrorResponse from a dict""" if obj is None: return None @@ -81,7 +82,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "date": obj.get("date") + "error": obj.get("error"), + "errors": obj.get("errors") }) return _obj diff --git a/vulncheck_sdk/models/advisory_document_note.py b/vulncheck_sdk/models/search_v4_advisory_meta.py similarity index 66% rename from vulncheck_sdk/models/advisory_document_note.py rename to vulncheck_sdk/models/search_v4_advisory_meta.py index fbdc7eb4..faf0788f 100644 --- a/vulncheck_sdk/models/advisory_document_note.py +++ b/vulncheck_sdk/models/search_v4_advisory_meta.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,19 +18,23 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, StrictStr +from pydantic import BaseModel, ConfigDict, StrictInt, StrictStr from typing import Any, ClassVar, Dict, List, Optional from typing import Optional, Set from typing_extensions import Self -class AdvisoryDocumentNote(BaseModel): +class SearchV4AdvisoryMeta(BaseModel): """ - AdvisoryDocumentNote + search.V4AdvisoryMeta """ # noqa: E501 - text: Optional[StrictStr] = None - title: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["text", "title", "type"] + cursor: Optional[StrictStr] = None + filtered: Optional[StrictInt] = None + limit: Optional[StrictInt] = None + next_cursor: Optional[StrictStr] = None + page: Optional[StrictInt] = None + pages: Optional[StrictInt] = None + total: Optional[StrictInt] = None + __properties: ClassVar[List[str]] = ["cursor", "filtered", "limit", "next_cursor", "page", "pages", "total"] model_config = ConfigDict( populate_by_name=True, @@ -50,7 +54,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a JSON string""" + """Create an instance of SearchV4AdvisoryMeta from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -75,7 +79,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a dict""" + """Create an instance of SearchV4AdvisoryMeta from a dict""" if obj is None: return None @@ -83,9 +87,13 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "text": obj.get("text"), - "title": obj.get("title"), - "type": obj.get("type") + "cursor": obj.get("cursor"), + "filtered": obj.get("filtered"), + "limit": obj.get("limit"), + "next_cursor": obj.get("next_cursor"), + "page": obj.get("page"), + "pages": obj.get("pages"), + "total": obj.get("total") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_date_time.py b/vulncheck_sdk/models/search_v4_advisory_return_value.py similarity index 58% rename from vulncheck_sdk/aio/models/advisory_date_time.py rename to vulncheck_sdk/models/search_v4_advisory_return_value.py index cd1d72b0..79806e1b 100644 --- a/vulncheck_sdk/aio/models/advisory_date_time.py +++ b/vulncheck_sdk/models/search_v4_advisory_return_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -18,17 +18,20 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, Field from typing import Any, ClassVar, Dict, List, Optional +from vulncheck_sdk.models.advisory_mitre_cve_list_v5_ref import AdvisoryMitreCVEListV5Ref +from vulncheck_sdk.models.search_v4_advisory_meta import SearchV4AdvisoryMeta from typing import Optional, Set from typing_extensions import Self -class AdvisoryDateTime(BaseModel): +class SearchV4AdvisoryReturnValue(BaseModel): """ - AdvisoryDateTime + search.V4AdvisoryReturnValue """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] + meta: Optional[SearchV4AdvisoryMeta] = Field(default=None, alias="_meta") + data: Optional[List[AdvisoryMitreCVEListV5Ref]] = None + __properties: ClassVar[List[str]] = ["_meta", "data"] model_config = ConfigDict( populate_by_name=True, @@ -48,7 +51,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a JSON string""" + """Create an instance of SearchV4AdvisoryReturnValue from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -69,11 +72,21 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # override the default output from pydantic by calling `to_dict()` of meta + if self.meta: + _dict['_meta'] = self.meta.to_dict() + # override the default output from pydantic by calling `to_dict()` of each item in data (list) + _items = [] + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items return _dict @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a dict""" + """Create an instance of SearchV4AdvisoryReturnValue from a dict""" if obj is None: return None @@ -81,7 +94,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "date": obj.get("date") + "_meta": SearchV4AdvisoryMeta.from_dict(obj["_meta"]) if obj.get("_meta") is not None else None, + "data": [AdvisoryMitreCVEListV5Ref.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_cwe_node.py b/vulncheck_sdk/models/search_v4_feed_item.py similarity index 81% rename from vulncheck_sdk/aio/models/advisory_cwe_node.py rename to vulncheck_sdk/models/search_v4_feed_item.py index 477c9d42..b08d74a8 100644 --- a/vulncheck_sdk/aio/models/advisory_cwe_node.py +++ b/vulncheck_sdk/models/search_v4_feed_item.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -23,15 +23,14 @@ from typing import Optional, Set from typing_extensions import Self -class AdvisoryCWENode(BaseModel): +class SearchV4FeedItem(BaseModel): """ - AdvisoryCWENode + search.V4FeedItem """ # noqa: E501 - cweid: Optional[StrictStr] = None description: Optional[StrictStr] = None - id: Optional[StrictStr] = None + href: Optional[StrictStr] = None name: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["cweid", "description", "id", "name"] + __properties: ClassVar[List[str]] = ["description", "href", "name"] model_config = ConfigDict( populate_by_name=True, @@ -51,7 +50,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a JSON string""" + """Create an instance of SearchV4FeedItem from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -76,7 +75,7 @@ def to_dict(self) -> Dict[str, Any]: @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a dict""" + """Create an instance of SearchV4FeedItem from a dict""" if obj is None: return None @@ -84,9 +83,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cweid": obj.get("cweid"), "description": obj.get("description"), - "id": obj.get("id"), + "href": obj.get("href"), "name": obj.get("name") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_product_tree.py b/vulncheck_sdk/models/search_v4_list_feed_return_value.py similarity index 69% rename from vulncheck_sdk/aio/models/advisory_product_tree.py rename to vulncheck_sdk/models/search_v4_list_feed_return_value.py index 3d7e104a..da9a3c68 100644 --- a/vulncheck_sdk/aio/models/advisory_product_tree.py +++ b/vulncheck_sdk/models/search_v4_list_feed_return_value.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -20,16 +20,16 @@ from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship +from vulncheck_sdk.models.search_v4_feed_item import SearchV4FeedItem from typing import Optional, Set from typing_extensions import Self -class AdvisoryProductTree(BaseModel): +class SearchV4ListFeedReturnValue(BaseModel): """ - AdvisoryProductTree + search.V4ListFeedReturnValue """ # noqa: E501 - relationships: Optional[List[AdvisoryRelationship]] = None - __properties: ClassVar[List[str]] = ["relationships"] + data: Optional[List[SearchV4FeedItem]] = None + __properties: ClassVar[List[str]] = ["data"] model_config = ConfigDict( populate_by_name=True, @@ -49,7 +49,7 @@ def to_json(self) -> str: @classmethod def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a JSON string""" + """Create an instance of SearchV4ListFeedReturnValue from a JSON string""" return cls.from_dict(json.loads(json_str)) def to_dict(self) -> Dict[str, Any]: @@ -70,18 +70,18 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in relationships (list) + # override the default output from pydantic by calling `to_dict()` of each item in data (list) _items = [] - if self.relationships: - for _item_relationships in self.relationships: - if _item_relationships: - _items.append(_item_relationships.to_dict()) - _dict['relationships'] = _items + if self.data: + for _item_data in self.data: + if _item_data: + _items.append(_item_data.to_dict()) + _dict['data'] = _items return _dict @classmethod def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a dict""" + """Create an instance of SearchV4ListFeedReturnValue from a dict""" if obj is None: return None @@ -89,7 +89,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "relationships": [AdvisoryRelationship.from_dict(_item) for _item in obj["relationships"]] if obj.get("relationships") is not None else None + "data": [SearchV4FeedItem.from_dict(_item) for _item in obj["data"]] if obj.get("data") is not None else None }) return _obj diff --git a/vulncheck_sdk/models/v3controllers_backup_response_metadata.py b/vulncheck_sdk/models/v3controllers_backup_response_metadata.py index db62c35e..1062db45 100644 --- a/vulncheck_sdk/models/v3controllers_backup_response_metadata.py +++ b/vulncheck_sdk/models/v3controllers_backup_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class V3controllersBackupResponseMetadata(BaseModel): """ - V3controllersBackupResponseMetadata + v3controllers.BackupResponseMetadata """ # noqa: E501 index: Optional[StrictStr] = None timestamp: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/v3controllers_purl_response_data.py b/vulncheck_sdk/models/v3controllers_purl_response_data.py index e8717106..de8a445d 100644 --- a/vulncheck_sdk/models/v3controllers_purl_response_data.py +++ b/vulncheck_sdk/models/v3controllers_purl_response_data.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class V3controllersPurlResponseData(BaseModel): """ - V3controllersPurlResponseData + v3controllers.PurlResponseData """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") diff --git a/vulncheck_sdk/models/v3controllers_purl_response_metadata.py b/vulncheck_sdk/models/v3controllers_purl_response_metadata.py index c669ed04..c13a4692 100644 --- a/vulncheck_sdk/models/v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/models/v3controllers_purl_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,9 +26,9 @@ class V3controllersPurlResponseMetadata(BaseModel): """ - V3controllersPurlResponseMetadata + v3controllers.PurlResponseMetadata """ # noqa: E501 - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") __properties: ClassVar[List[str]] = ["purl_struct", "timestamp", "total_documents"] diff --git a/vulncheck_sdk/models/v3controllers_purls_response_metadata.py b/vulncheck_sdk/models/v3controllers_purls_response_metadata.py index d378269a..ef95d61d 100644 --- a/vulncheck_sdk/models/v3controllers_purls_response_metadata.py +++ b/vulncheck_sdk/models/v3controllers_purls_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -25,7 +25,7 @@ class V3controllersPurlsResponseMetadata(BaseModel): """ - V3controllersPurlsResponseMetadata + v3controllers.PurlsResponseMetadata """ # noqa: E501 timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") diff --git a/vulncheck_sdk/models/v3controllers_response_metadata.py b/vulncheck_sdk/models/v3controllers_response_metadata.py index a4de287c..1e897fec 100644 --- a/vulncheck_sdk/models/v3controllers_response_metadata.py +++ b/vulncheck_sdk/models/v3controllers_response_metadata.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech) @@ -26,7 +26,7 @@ class V3controllersResponseMetadata(BaseModel): """ - V3controllersResponseMetadata + v3controllers.ResponseMetadata """ # noqa: E501 cpe: Optional[StrictStr] = None cpe_struct: Optional[ApiCPE] = None diff --git a/vulncheck_sdk/rest.py b/vulncheck_sdk/rest.py index 7827ae2f..f0b591b4 100644 --- a/vulncheck_sdk/rest.py +++ b/vulncheck_sdk/rest.py @@ -3,9 +3,9 @@ """ VulnCheck API - Version 3 of the VulnCheck API + VulnCheck API (v3 + v4) - The version of the OpenAPI document: 3.0 + The version of the OpenAPI document: latest Contact: support@vulncheck.com Generated by OpenAPI Generator (https://openapi-generator.tech)